Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2024 09:27
Static task
static1
Behavioral task
behavioral1
Sample
7ea2c970326af64b1b196c4dd12e61dc_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7ea2c970326af64b1b196c4dd12e61dc_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
7ea2c970326af64b1b196c4dd12e61dc_JaffaCakes118.exe
-
Size
363KB
-
MD5
7ea2c970326af64b1b196c4dd12e61dc
-
SHA1
a3dbdf84d229d3ff549855cf7adc34e75d01efd3
-
SHA256
651f451aaf9a9694884322d91a225294af145006219c346d1a9b50a2d92db6d9
-
SHA512
1128583ed88f9a44b98c8ab6bbb55a75645e89242dae941dae69c659ba66e40bced6364cb4e05eae5a99be10d2742ed34ec714c314332150ede2fc8c62f6dcd1
-
SSDEEP
6144:s7I4W+7S5WSSYmPnjpv1WgTO3x5N22vWvLRKKAX5l++SyVI:cBS5VSHFdT85I2vCMX5l+Zn
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Cryptolocker family
-
Deletes itself 1 IoCs
pid Process 4536 Wawbmdknpbal.exe -
Executes dropped EXE 2 IoCs
pid Process 4536 Wawbmdknpbal.exe 3676 Wawbmdknpbal.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Roaming\\Wawbmdknpbal.exe" Wawbmdknpbal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\*CryptoLocker = "C:\\Users\\Admin\\AppData\\Roaming\\Wawbmdknpbal.exe" Wawbmdknpbal.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ea2c970326af64b1b196c4dd12e61dc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wawbmdknpbal.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wawbmdknpbal.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2832 wrote to memory of 4536 2832 7ea2c970326af64b1b196c4dd12e61dc_JaffaCakes118.exe 84 PID 2832 wrote to memory of 4536 2832 7ea2c970326af64b1b196c4dd12e61dc_JaffaCakes118.exe 84 PID 2832 wrote to memory of 4536 2832 7ea2c970326af64b1b196c4dd12e61dc_JaffaCakes118.exe 84 PID 4536 wrote to memory of 3676 4536 Wawbmdknpbal.exe 85 PID 4536 wrote to memory of 3676 4536 Wawbmdknpbal.exe 85 PID 4536 wrote to memory of 3676 4536 Wawbmdknpbal.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ea2c970326af64b1b196c4dd12e61dc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7ea2c970326af64b1b196c4dd12e61dc_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe"C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe" "/rC:\Users\Admin\AppData\Local\Temp\7ea2c970326af64b1b196c4dd12e61dc_JaffaCakes118.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe"C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe" /w0000025C3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3676
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
363KB
MD57ea2c970326af64b1b196c4dd12e61dc
SHA1a3dbdf84d229d3ff549855cf7adc34e75d01efd3
SHA256651f451aaf9a9694884322d91a225294af145006219c346d1a9b50a2d92db6d9
SHA5121128583ed88f9a44b98c8ab6bbb55a75645e89242dae941dae69c659ba66e40bced6364cb4e05eae5a99be10d2742ed34ec714c314332150ede2fc8c62f6dcd1