Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-10-2024 09:27
Static task
static1
Behavioral task
behavioral1
Sample
7ea2c970326af64b1b196c4dd12e61dc_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7ea2c970326af64b1b196c4dd12e61dc_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
7ea2c970326af64b1b196c4dd12e61dc_JaffaCakes118.exe
-
Size
363KB
-
MD5
7ea2c970326af64b1b196c4dd12e61dc
-
SHA1
a3dbdf84d229d3ff549855cf7adc34e75d01efd3
-
SHA256
651f451aaf9a9694884322d91a225294af145006219c346d1a9b50a2d92db6d9
-
SHA512
1128583ed88f9a44b98c8ab6bbb55a75645e89242dae941dae69c659ba66e40bced6364cb4e05eae5a99be10d2742ed34ec714c314332150ede2fc8c62f6dcd1
-
SSDEEP
6144:s7I4W+7S5WSSYmPnjpv1WgTO3x5N22vWvLRKKAX5l++SyVI:cBS5VSHFdT85I2vCMX5l+Zn
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Cryptolocker family
-
Deletes itself 1 IoCs
pid Process 1148 Wawbmdknpbal.exe -
Executes dropped EXE 2 IoCs
pid Process 1148 Wawbmdknpbal.exe 1700 Wawbmdknpbal.exe -
Loads dropped DLL 2 IoCs
pid Process 2132 7ea2c970326af64b1b196c4dd12e61dc_JaffaCakes118.exe 1148 Wawbmdknpbal.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Roaming\\Wawbmdknpbal.exe" Wawbmdknpbal.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\*CryptoLocker = "C:\\Users\\Admin\\AppData\\Roaming\\Wawbmdknpbal.exe" Wawbmdknpbal.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ea2c970326af64b1b196c4dd12e61dc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wawbmdknpbal.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wawbmdknpbal.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2132 wrote to memory of 1148 2132 7ea2c970326af64b1b196c4dd12e61dc_JaffaCakes118.exe 30 PID 2132 wrote to memory of 1148 2132 7ea2c970326af64b1b196c4dd12e61dc_JaffaCakes118.exe 30 PID 2132 wrote to memory of 1148 2132 7ea2c970326af64b1b196c4dd12e61dc_JaffaCakes118.exe 30 PID 2132 wrote to memory of 1148 2132 7ea2c970326af64b1b196c4dd12e61dc_JaffaCakes118.exe 30 PID 1148 wrote to memory of 1700 1148 Wawbmdknpbal.exe 31 PID 1148 wrote to memory of 1700 1148 Wawbmdknpbal.exe 31 PID 1148 wrote to memory of 1700 1148 Wawbmdknpbal.exe 31 PID 1148 wrote to memory of 1700 1148 Wawbmdknpbal.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ea2c970326af64b1b196c4dd12e61dc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7ea2c970326af64b1b196c4dd12e61dc_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe"C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe" "/rC:\Users\Admin\AppData\Local\Temp\7ea2c970326af64b1b196c4dd12e61dc_JaffaCakes118.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe"C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe" /w0000011C3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1700
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
363KB
MD57ea2c970326af64b1b196c4dd12e61dc
SHA1a3dbdf84d229d3ff549855cf7adc34e75d01efd3
SHA256651f451aaf9a9694884322d91a225294af145006219c346d1a9b50a2d92db6d9
SHA5121128583ed88f9a44b98c8ab6bbb55a75645e89242dae941dae69c659ba66e40bced6364cb4e05eae5a99be10d2742ed34ec714c314332150ede2fc8c62f6dcd1