Analysis

  • max time kernel
    93s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-10-2024 09:55

General

  • Target

    1ccef1fb6b247ffd5d2aae2106d4ed7b_JaffaCakes118.exe

  • Size

    225KB

  • MD5

    1ccef1fb6b247ffd5d2aae2106d4ed7b

  • SHA1

    3d8a1ed377a331561a69dad902104a6e016332d9

  • SHA256

    c432a01904467c55ef316fec2973f10e09f1a1053faf574683c5097174caaa38

  • SHA512

    ddb4cfb41a45c9782be248bcbaafb4943a6b7a7d2845acec910d809db9a4e440939944212d43247d81edc88d7e79faef47a041f840d9496343fedf30dfc4146d

  • SSDEEP

    3072:ldj7JB2Tc30V/zjC/XrwRlJGqA3eSI0ROkzmMLJnywoxzeR9JuF3Q7e/or2YXOax:lJ/V3q/XyURlYPev0RHy+JD+ym02EU/

Malware Config

Signatures

  • Detect MafiaWare666 ransomware 1 IoCs
  • MafiaWare666 Ransomware

    MafiaWare666 is ransomware written in C# with multiple variants.

  • Renames multiple (162) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops desktop.ini file(s) 15 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1ccef1fb6b247ffd5d2aae2106d4ed7b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1ccef1fb6b247ffd5d2aae2106d4ed7b_JaffaCakes118.exe"
    1⤵
    • Drops desktop.ini file(s)
    • System Location Discovery: System Language Discovery
    PID:4664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4664-0-0x0000000074D8E000-0x0000000074D8F000-memory.dmp

    Filesize

    4KB

  • memory/4664-1-0x0000000000240000-0x000000000027E000-memory.dmp

    Filesize

    248KB

  • memory/4664-2-0x00000000051B0000-0x0000000005754000-memory.dmp

    Filesize

    5.6MB

  • memory/4664-3-0x0000000004CA0000-0x0000000004D32000-memory.dmp

    Filesize

    584KB

  • memory/4664-4-0x0000000074D80000-0x0000000075530000-memory.dmp

    Filesize

    7.7MB

  • memory/4664-5-0x0000000004C40000-0x0000000004C4A000-memory.dmp

    Filesize

    40KB

  • memory/4664-6-0x0000000074D80000-0x0000000075530000-memory.dmp

    Filesize

    7.7MB

  • memory/4664-27-0x0000000074D8E000-0x0000000074D8F000-memory.dmp

    Filesize

    4KB

  • memory/4664-30-0x0000000074D80000-0x0000000075530000-memory.dmp

    Filesize

    7.7MB

  • memory/4664-33-0x0000000074D80000-0x0000000075530000-memory.dmp

    Filesize

    7.7MB