Analysis

  • max time kernel
    144s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14-09-2024 11:07

General

  • Target

    e00f2f041d4c88d7294da2a3a5c7b85e_JaffaCakes118.exe

  • Size

    361KB

  • MD5

    e00f2f041d4c88d7294da2a3a5c7b85e

  • SHA1

    7b44584eaf96466cf501c27b2c8bcd50507dafe9

  • SHA256

    6a1b91e518c454ada77d66005d1f1dff19620939567c04129992d1a1811f0517

  • SHA512

    1cfef6c178093e0377aeb85e536e344ebd88b9a10ebe688bc2998b78bb9649c1567ab01a717099a2c6f2135b636c7c5f9462d5b5e612be54531dd33e1da6638a

  • SSDEEP

    6144:ZKlLkXRRcBaIxm15ybiEg+QO8bMebp9pMXt8f9m:ZKlLkXRR+aIxml+Tle1pU

Malware Config

Signatures

  • Locky

    Ransomware strain released in 2016, with advanced features like anti-analysis.

  • Locky (Osiris variant)

    Variant of the Locky ransomware seen in the wild since early 2017.

  • Deletes itself 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e00f2f041d4c88d7294da2a3a5c7b85e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e00f2f041d4c88d7294da2a3a5c7b85e_JaffaCakes118.exe"
    1⤵
    • Sets desktop wallpaper using registry
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Suspicious use of WriteProcessMemory
    PID:2112
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\DesktopOSIRIS.htm
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:684
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:684 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2848
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\e00f2f041d4c88d7294da2a3a5c7b85e_JaffaCakes118.exe"
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2728
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    PID:2796

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\OSIRIS-fec3.htm
    Filesize

    8KB

    MD5

    a08ad26478269155a330a88a80ff237a

    SHA1

    8485310e09ceb2d2d325a8ef07f6c85819dc0398

    SHA256

    1125777355a12c6856b5b18b4998d0457a4d185d53e531b4efcc4d3357b9340c

    SHA512

    3c7c28d27580e2f00d2509eec05ffe0fd7e0c35a2c8e1917a75d39ca549736333de59451c4e8444143fea4189720f684e8cda354715f9770b3782c02a8fc45e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    322aba8296307d7d86e90418e9c92388

    SHA1

    9441c62c82ee2ea94a4a71c921b64444da4ae22f

    SHA256

    8ff1b6e3b20768947f2b5908b0543bc977fb2b6f0d1b9e2fc2cee50b402d0906

    SHA512

    00b0b8dc5c9d18e2e2abd940246cd9badf710bb941d3315a1de84b37427bd43dbf74515ffde56b7956e334d32bc8bf8e8f69ca5e853cdacbd7d39019a347c97a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    425f256772e6bb51fe071ff80cb536d6

    SHA1

    1b2aed10b4e36ac62da65864a7a04dec0ccba0b9

    SHA256

    93812dbd685b684295635d9fedcc4dd609001378b1fd1d2b95646d2174e74779

    SHA512

    a20ca39f8f07a7eb6215df7421611e4d5f46555c065298a7e207a44df1b73ac00bf43b65eb8b8a934ae0b151bcbf386e05362139fab48bcf3eab10da6cefb1e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    63ac9d19420577c8e033abb2bc92ee30

    SHA1

    02ac1cf0ddbde09f4e954a9de806a821af870ff2

    SHA256

    6e6ddb65cb95cbd180c4098c05dd00c4158e34ad458b0f48d8dff9d07dd2a366

    SHA512

    bf71941311af462b306d11ece06db92a1446c1b4cf36b73a8680adcfc45be015d1d11c6030d8ddd2a73f7ce5629dcb4390cd3013a740f1978f2c864c535501a3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    aaae645e7f57ba81a1efcebfdc4efb7f

    SHA1

    e1ea3c2bebd396061da5e5b817ad56cd82523a5b

    SHA256

    fc2d5231aff0f3cda4694e813ea3e08341085ee2138fb18449b8189237897c9b

    SHA512

    9fa58469752abaf2233d4dc1c593a927fdea125b7850a99349b07eb740f4d3cee09ca746374a2d632a52a5409b882e74b678d167c91422676a18599a6ab2e1b1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    30d5bfac9833fef61419d33644bdd1bd

    SHA1

    fafc63f65a826c5d55a5eef90198cead33455df9

    SHA256

    ae7390225d843854ec218bcbdf5975314f3632ec6424a3d75284535467cefe19

    SHA512

    97997d0d5893fa58aaece9a4d2861385c6da5c9cb83db791790387c10cb27b4070d360207d46b159dc752ca9c5ffdddbd37c0d234e6fc89ece5b671e701e485d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    5d9064d67fef8a59e2a319aa26154b09

    SHA1

    f0e18e5de43ab78f285ec10e4dd711eab3719bf8

    SHA256

    392247657d83bfb90989cc7159970ec650133ea1a70978f23e50a2088bd4b3c6

    SHA512

    1048f13d16e817a315411332e41019ecbe01c31465e2b539ab0da903f9c2148f4a53051766a72bedb0b3d68e9c23d91976c0aad230da414cbd969260f606d2ea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    ab0e3fef6df14eb448a79930dc8a89b9

    SHA1

    5d1d43f2db88c529ca3495c5051be636d25e79bc

    SHA256

    75afab380de2e6bf0313a3ffc3b727fce3583d9ef17a141c3e792c2240086beb

    SHA512

    e7151510d1df6ccc8296b4caefb479bec284eed83ba65620ad88b347d8c2676e88e5b1ad1f0f20159c65db065b2a6bebe8cedf7652cc86469b8c3debcd66ebdd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    3e8b628e0765b61071e4eeee212dece6

    SHA1

    fbcf53f7b5339db443d43c07df153db546a3c6d7

    SHA256

    7cf198151a8ec35ea2e9d72a70e05fde2fbffac0d6b86da06b1f00c97515ef6e

    SHA512

    a10d4e2d6b4f69583ab3b853e908e8eba12e2a7edb033a4d8549da3c7cb33eb41cbbad35346313acf4e1256394bb93a3428dde9abcbb0bd88c8ead91fd82ca57

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    bb21bb8f6ad90df7ca7c998eefd9b703

    SHA1

    7f26df8b75365a9a590faf9819aac0f1c3bf7aeb

    SHA256

    80bbb0246f01cabb9a0baaf8452c854a3fc5a60f5f4b157b479deba312cd77c5

    SHA512

    e5863a117704d00364ce5d9547134b33f6f0437372cedfa8bcf70d45246e74c39d92f1770bf91ffbe922dd0725e3b37cbb24f1a4ab505ebf77dbaa1b06cb82ac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    205fa34addc69bb78cdd707ab2f708d2

    SHA1

    5cb6f07c81b622703848fdf5010a5d5f5c1b89ba

    SHA256

    322905ccb1960d6a9d146c54fb27fdf96aea81a46ad7909e337c1f7cf2b2d69e

    SHA512

    7d7cee26fcb29d1f08ff94537f3da994123c0dc73fa6a9d2a38391949fc525f986abdc300223e98e77ee6e5d3b93509f4e3fc4a234c2ba916359187da923da1e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    16136c2dc716f9ec41507b89149f5155

    SHA1

    a055aed4d0ea74479976955b86858e9737ed26ae

    SHA256

    455f2aefe3ea0a80fb60fa510438ee31ab1b9ea284632f98f94e947908d24dc4

    SHA512

    2b3b7115b96932d6ad4392b2d20e479bf9c2f623f6e1a203d1623d629e9cc07cb584aa0a7717d6cd92272a1e5cd6092c97525b803ebfb58b90d14e92a5200766

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    cde13e8301305374d34c93ef4c582bdc

    SHA1

    1c501abcf0f9a28a0d3f547de568eec5f6b66d6d

    SHA256

    abea71ed6775ceb7683b94f368f9182c20b6c8cc101fe4c32d4d24eb51db6b11

    SHA512

    8d285abb291d02fa7157cf1a3ee37439436dac5efec2386136cbcc669d6125ddd23b80ea93b5b5875cb859e688a0f3617ff7f67d49583bf06f4c375a3d09be79

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    3782bb319f502de46c94519d612b2aab

    SHA1

    ff4987bd400e840aaf2f12daeeb20b9beb242717

    SHA256

    552977f24a196ea7785cb271954bffda6ca590e578dfe56d5bf2816fcf362b8d

    SHA512

    91c3a87d629a11acabe939591938e4aba2a6cc46bef6c82f6d42b3439c49d276afe994d09583154fd395f4aded14c4ceaa7bf785c60cb466f99d251bb948e77f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    53e52908a6e5cd9f961226b069201803

    SHA1

    199fce376a646c39142f71363721173eb3087c80

    SHA256

    df6e91236893c3c8c9b58bd1ebdc9cbf489d4249059ce7e29719ba8a30b8b550

    SHA512

    5794b5fb4a88e75f61df6bfd0da4201ed59ef424e9947b42c55d5189a2d40b4fc71abc3c27502c443f47ec0f7fa5e379fe626336d4f41b3bcb681293ea5f8d61

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    9a448b6e06afc8b19867510b95408654

    SHA1

    613ef791ebf5a15cbbdec9c6aa7793c2bce01424

    SHA256

    0dcf99c228a393f0475ca4da4a9b0eb748809202320b7ab34462d63589206af3

    SHA512

    e13d37bd82043232e36cf1f9679a388ee3b7057ba144ca04f6652b8217e8a19d75394a59a04de33748a95cf051d3f892ed691c4a515ddf18955ba2254546e35e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    668434ef450a71286853d3f3b35df3f1

    SHA1

    78ee809946cdb0a0738e372061591f8f8d7fa212

    SHA256

    9b59844fab7f32a28177b3aed6ac5a445cd0206c0cf79ddfb09e8f41be56df99

    SHA512

    ba2c5393952d779d2f6b96910f8baddc5d395c767beb01fe79a7d16c3518e561583da58141f29a42188c921d4b868d43c79e1f272bfb2b878b53aed66b7ef5a4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    f31577ec0aac953e6b60a5b323caa377

    SHA1

    db246b163ea170c5ff9f4f72a61b76655b6c0674

    SHA256

    f08e52f0c17f2d48768a28325503a1eed911af64232e00aa4d9151c95e4cfb92

    SHA512

    c86b4aea1e94d1053a676b2c68ba5d0fa410cdf6b5aaced562baaff569f831fff6b4d95c2dfda2bedf14f81e17fce3aa643bd1b6f4d4849cd438f99b1e1f4b2f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    90ce0a311ba8914b6dec665f482d5d81

    SHA1

    9d649d0649714969486a091ae3ab8c3f7e6db577

    SHA256

    f2bcc1eb821566c039af1bd60796d03772bcfeb4dbb5653303a7c985878607e1

    SHA512

    3435aa7976e933ee04b34fae63a1a51ccec44c77546d5fb511c1b998461c42167f339314ad7f8f36cd13ca07fe5ddb939282191ab0d5c1a8be6cb5abfb3a0732

  • C:\Users\Admin\AppData\Local\Temp\CabAFC.tmp
    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarB6C.tmp
    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\DesktopOSIRIS.bmp
    Filesize

    3.7MB

    MD5

    8b21cf9582c8c0eb3a734de335ae19b1

    SHA1

    75378a3f1f2c12a6db4bce9f8c492cd01ae01a47

    SHA256

    a2ea0472dba2e0674d45bd79ff2c9e7aefd6353a212c41fea5ea01c2ab261f87

    SHA512

    64efae8014e482d8b1b805c1dc137e6a00464ed882ea9a7a544d22b59446db03d786937c89b6b4e72571e26f395f80cd1b4861f89b9a4e2101ff1f3ff483aa0f

  • memory/2112-6-0x0000000000310000-0x0000000000311000-memory.dmp
    Filesize

    4KB

  • memory/2112-10-0x0000000001D50000-0x0000000001D77000-memory.dmp
    Filesize

    156KB

  • memory/2112-1-0x0000000000310000-0x0000000000311000-memory.dmp
    Filesize

    4KB

  • memory/2112-346-0x0000000000400000-0x000000000045F000-memory.dmp
    Filesize

    380KB

  • memory/2112-342-0x0000000001D50000-0x0000000001D77000-memory.dmp
    Filesize

    156KB

  • memory/2112-12-0x0000000001D50000-0x0000000001D77000-memory.dmp
    Filesize

    156KB

  • memory/2112-11-0x0000000001D50000-0x0000000001D77000-memory.dmp
    Filesize

    156KB

  • memory/2112-348-0x0000000007960000-0x0000000007962000-memory.dmp
    Filesize

    8KB

  • memory/2112-9-0x0000000000310000-0x0000000000311000-memory.dmp
    Filesize

    4KB

  • memory/2112-7-0x0000000000400000-0x000000000045F000-memory.dmp
    Filesize

    380KB

  • memory/2112-0-0x0000000001C90000-0x0000000001D08000-memory.dmp
    Filesize

    480KB

  • memory/2112-5-0x0000000001C90000-0x0000000001D08000-memory.dmp
    Filesize

    480KB

  • memory/2112-4-0x0000000000310000-0x0000000000311000-memory.dmp
    Filesize

    4KB

  • memory/2112-3-0x0000000000310000-0x0000000000311000-memory.dmp
    Filesize

    4KB

  • memory/2112-2-0x0000000000310000-0x0000000000311000-memory.dmp
    Filesize

    4KB

  • memory/2796-349-0x00000000001A0000-0x00000000001A2000-memory.dmp
    Filesize

    8KB