Resubmissions
21-09-2024 10:19
240921-mcrnkaxbpa 321-09-2024 10:18
240921-mb4azaxble 321-09-2024 09:56
240921-lytjlsweka 10Analysis
-
max time kernel
37s -
max time network
41s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 10:19
Static task
static1
Behavioral task
behavioral1
Sample
ef8bef7d1a8ae3ba7e8eb587d183c880_JaffaCakes118.eml
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
MV Medi Aero IMO NO 9708966 00877 -xlxs.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
MV Medi Aero IMO NO 9708966 00877 -xlxs.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
email-html-1.txt
Resource
win10v2004-20240910-en
General
-
Target
ef8bef7d1a8ae3ba7e8eb587d183c880_JaffaCakes118.eml
-
Size
407KB
-
MD5
ef8bef7d1a8ae3ba7e8eb587d183c880
-
SHA1
2dc7f3f967fd5616b866f7659cc5f748668a62cd
-
SHA256
4f6a14fdfe1ed27721d7e8d09e9524240f912b85a29bc6ba76f6c60508b1e09c
-
SHA512
5d8c5ed789c58699e7bcde0b8234193b733a415bc2a9bea7419239f120446303f969f4f08efcf8f814bbab000a9d9a542bf3d0ce8c10924d450344de5dbc4670
-
SSDEEP
6144:x8I0ys1egkLahZpu7LpOSQvHPFrC+2F7h+D6/OuA5qR5E6KSpb6odrF9skA8r+R:x8I0ysYdLahIlavHN+57QC53+kA68
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\Local Settings OpenWith.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\ef8bef7d1a8ae3ba7e8eb587d183c880_JaffaCakes118.eml:OECustomProperty cmd.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 3160 NOTEPAD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1116 OpenWith.exe -
Suspicious use of SetWindowsHookEx 21 IoCs
pid Process 1116 OpenWith.exe 1116 OpenWith.exe 1116 OpenWith.exe 1116 OpenWith.exe 1116 OpenWith.exe 1116 OpenWith.exe 1116 OpenWith.exe 1116 OpenWith.exe 1116 OpenWith.exe 1116 OpenWith.exe 1116 OpenWith.exe 1116 OpenWith.exe 1116 OpenWith.exe 1116 OpenWith.exe 1116 OpenWith.exe 1116 OpenWith.exe 1116 OpenWith.exe 1116 OpenWith.exe 1116 OpenWith.exe 1116 OpenWith.exe 1116 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1116 wrote to memory of 3160 1116 OpenWith.exe 89 PID 1116 wrote to memory of 3160 1116 OpenWith.exe 89
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ef8bef7d1a8ae3ba7e8eb587d183c880_JaffaCakes118.eml1⤵
- Modifies registry class
- NTFS ADS
PID:2736
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\ef8bef7d1a8ae3ba7e8eb587d183c880_JaffaCakes118.eml2⤵
- Opens file in notepad (likely ransom note)
PID:3160
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
407KB
MD5ef8bef7d1a8ae3ba7e8eb587d183c880
SHA12dc7f3f967fd5616b866f7659cc5f748668a62cd
SHA2564f6a14fdfe1ed27721d7e8d09e9524240f912b85a29bc6ba76f6c60508b1e09c
SHA5125d8c5ed789c58699e7bcde0b8234193b733a415bc2a9bea7419239f120446303f969f4f08efcf8f814bbab000a9d9a542bf3d0ce8c10924d450344de5dbc4670