Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 11:25
Static task
static1
Behavioral task
behavioral1
Sample
39c0e005cd2892a7b315081f9db6dc37_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
39c0e005cd2892a7b315081f9db6dc37_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
39c0e005cd2892a7b315081f9db6dc37_JaffaCakes118.exe
-
Size
742KB
-
MD5
39c0e005cd2892a7b315081f9db6dc37
-
SHA1
e9c2dda548ca0f53939d8bbf9228a92977964341
-
SHA256
9005436ea8f7c0dede260d1b249540c94a02431afe4d26956b4199705577ea62
-
SHA512
e5b258b62685152ba0387a280a27957c6cd78848d31a7cd65089c0c8dbd0d59d65089f702fe0dd8e759a27c2974219f9c170ba67c6457a4725a8b09dc69ce77e
-
SSDEEP
12288:T2359uMww1bLO6ejFn8KL8XdChu/FiMZgi7hLEsOYt4ZmwjHCmac95RDOqruN2mE:S5p126wFn8KL8tz4MZHVLJtimSimHROY
Malware Config
Extracted
C:\ProgramData\xzhmwel.html
http://fizxfsi3cad3kn7v.onion.cab
http://fizxfsi3cad3kn7v.tor2web.org
http://fizxfsi3cad3kn7v.onion
Signatures
-
CTB-Locker
Ransomware family which uses Tor to hide its C2 communications.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\International\Geo\Nation qrzxbjl.exe -
Executes dropped EXE 2 IoCs
pid Process 2520 qrzxbjl.exe 2644 qrzxbjl.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini svchost.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-18\desktop.ini svchost.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: svchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat qrzxbjl.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Documents\\!Decrypt-All-Files-tbgsyea.bmp" Explorer.EXE -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\!Decrypt-All-Files-tbgsyea.txt svchost.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\!Decrypt-All-Files-tbgsyea.bmp svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 39c0e005cd2892a7b315081f9db6dc37_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qrzxbjl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qrzxbjl.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2336 vssadmin.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main qrzxbjl.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch qrzxbjl.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" qrzxbjl.exe -
Modifies data under HKEY_USERS 23 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CLSID svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\TileWallpaper = "0" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{c34f52c4-69ed-11ef-8041-806e6f6e6963}\NukeOnDelete = "0" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{0ffd567e-69b6-11ef-9713-ea7747d117e6}\MaxCapacity = "2047" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\LastEnum = 30002c007b00630033003400660035003200630034002d0036003900650064002d0031003100650066002d0038003000340031002d003800300036006500360066003600650036003900360033007d00000030002c007b00300066006600640035003600370065002d0036003900620036002d0031003100650066002d0039003700310033002d006500610037003700340037006400310031003700650036007d0000000000 svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\WallpaperStyle = "0" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon\Full = "%SystemRoot%\\System32\\imageres.dll,-54" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{c34f52c4-69ed-11ef-8041-806e6f6e6963} svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{c34f52c4-69ed-11ef-8041-806e6f6e6963}\MaxCapacity = "14116" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{0ffd567e-69b6-11ef-9713-ea7747d117e6} svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{0ffd567e-69b6-11ef-9713-ea7747d117e6}\NukeOnDelete = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon\ = "%SystemRoot%\\System32\\imageres.dll,-55" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon\Empty = "%SystemRoot%\\System32\\imageres.dll,-55" svchost.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2980 39c0e005cd2892a7b315081f9db6dc37_JaffaCakes118.exe 2520 qrzxbjl.exe 2520 qrzxbjl.exe 2520 qrzxbjl.exe 2520 qrzxbjl.exe 2644 qrzxbjl.exe 2644 qrzxbjl.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2520 qrzxbjl.exe Token: SeDebugPrivilege 2520 qrzxbjl.exe Token: SeShutdownPrivilege 1204 Explorer.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2644 qrzxbjl.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2644 qrzxbjl.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2644 qrzxbjl.exe 2644 qrzxbjl.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1204 Explorer.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2472 wrote to memory of 2520 2472 taskeng.exe 31 PID 2472 wrote to memory of 2520 2472 taskeng.exe 31 PID 2472 wrote to memory of 2520 2472 taskeng.exe 31 PID 2472 wrote to memory of 2520 2472 taskeng.exe 31 PID 2520 wrote to memory of 616 2520 qrzxbjl.exe 9 PID 616 wrote to memory of 2020 616 svchost.exe 33 PID 616 wrote to memory of 2020 616 svchost.exe 33 PID 616 wrote to memory of 2020 616 svchost.exe 33 PID 2520 wrote to memory of 1204 2520 qrzxbjl.exe 21 PID 2520 wrote to memory of 2336 2520 qrzxbjl.exe 34 PID 2520 wrote to memory of 2336 2520 qrzxbjl.exe 34 PID 2520 wrote to memory of 2336 2520 qrzxbjl.exe 34 PID 2520 wrote to memory of 2336 2520 qrzxbjl.exe 34 PID 2520 wrote to memory of 2644 2520 qrzxbjl.exe 36 PID 2520 wrote to memory of 2644 2520 qrzxbjl.exe 36 PID 2520 wrote to memory of 2644 2520 qrzxbjl.exe 36 PID 2520 wrote to memory of 2644 2520 qrzxbjl.exe 36
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}2⤵PID:2020
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Sets desktop wallpaper using registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\39c0e005cd2892a7b315081f9db6dc37_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\39c0e005cd2892a7b315081f9db6dc37_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2980
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {AD2E7BB7-8969-48AE-BAD1-82D3A9E13FB4} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\qrzxbjl.exeC:\Users\Admin\AppData\Local\Temp\qrzxbjl.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows all3⤵
- System Location Discovery: System Language Discovery
- Interacts with shadow copies
PID:2336
-
-
C:\Users\Admin\AppData\Local\Temp\qrzxbjl.exe"C:\Users\Admin\AppData\Local\Temp\qrzxbjl.exe" -u3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2644
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD51205126e91eabfc41d301a25c5b2892c
SHA194173996ac7fa998088d48faa7a1d149963c95eb
SHA256dd404097310d56b0c614e4643d6ad90531bc842062e7106f623de1f4129d0b2f
SHA51274cd71573628256ac55920d7327e8f5931e1a72794add0ffe3b91f9d1d3f862e1da16fc865647d874238b0d13bda97790ea0a5cea6ce76f836b58aefad8755d1
-
Filesize
654B
MD5f0492c61b213c0506c0b58db47526f39
SHA1c04e74a6e0a26c659152c8400a049ddd89a473b6
SHA2564ca08aaa1661103f70b1e5ae274f778a9d6d3f34a37d9f145ed4104e8df84b36
SHA5122213cb2afe15739247e63b2eea9e8600f55a7006c75320de92029f0de780fec77251b150f8743d4e795e6f66da3e737b47035114a36ca80e54e65dcec437d97c
-
Filesize
654B
MD57f79d7d3cdef0b85b8f4853efc624bf8
SHA1c61c89d7ee5f4673154010edc3888097ea8135dc
SHA2562bdc19eaa9cfe4be5fddc684155f61111ef6dfc8cb4735a2eb6217fe6b078c24
SHA5128a6172b09306e9e28aa0757cb6e22725e21476f4c93e7e16adf9e9baf63aaabc3472d3eb2dccf06a76112d1e05bc3e1d99320080977f3cd8fc083785ac99e6c3
-
Filesize
63KB
MD5c82f54419c62e1897e086193d4437662
SHA1af1177e52d0d96860ce11a50602f81a03ce43346
SHA2560a2b37a21a925ba0db30b5f748968a1fa5574b650bff5f097d64ed39ceee742a
SHA51299794c0391b6f46a926358972a653c91a79cd2805e16a7693506e8c78871828ee05b48692c8d14a86c7a8326432da3300c778940b745710158a23a293be74156
-
Filesize
742KB
MD539c0e005cd2892a7b315081f9db6dc37
SHA1e9c2dda548ca0f53939d8bbf9228a92977964341
SHA2569005436ea8f7c0dede260d1b249540c94a02431afe4d26956b4199705577ea62
SHA512e5b258b62685152ba0387a280a27957c6cd78848d31a7cd65089c0c8dbd0d59d65089f702fe0dd8e759a27c2974219f9c170ba67c6457a4725a8b09dc69ce77e