Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 01:59
Behavioral task
behavioral1
Sample
98892a91cbd81bcc99710849b5dbc7d3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
98892a91cbd81bcc99710849b5dbc7d3_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
98892a91cbd81bcc99710849b5dbc7d3_JaffaCakes118.exe
-
Size
172KB
-
MD5
98892a91cbd81bcc99710849b5dbc7d3
-
SHA1
296d8cf6138e7e61f6d13e4d8a594f9cf4b0418c
-
SHA256
bb13c0965441119f3d0bad9f65f26a01582042f52dc5d4f50eeea2e606698e98
-
SHA512
761917a63c7fbabfbd77e96e3339ef930272981274a935d701b8492bcd4d2d25b2386c470f96d801c7bfbadccdef9164f7f1e033ee23d5ef4c5983ec3c6e0076
-
SSDEEP
3072:i7jYpyprmdK5WhAHwspDc/NPi9hY8uoWvA7c3b4MAiO7p0ZbQ3IjzDToF:i/YpyprDFTJ42fvWNElik0ZkYjzDT
Malware Config
Signatures
-
Detect MafiaWare666 ransomware 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1836-1-0x0000000000160000-0x0000000000190000-memory.dmp family_mafiaware666 -
MafiaWare666 Ransomware
MafiaWare666 is ransomware written in C# with multiple variants.
-
Mafiaware666 family
-
Renames multiple (149) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops desktop.ini file(s) 15 IoCs
Processes:
98892a91cbd81bcc99710849b5dbc7d3_JaffaCakes118.exedescription ioc Process File opened for modification C:\Users\Admin\Desktop\desktop.ini 98892a91cbd81bcc99710849b5dbc7d3_JaffaCakes118.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 98892a91cbd81bcc99710849b5dbc7d3_JaffaCakes118.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 98892a91cbd81bcc99710849b5dbc7d3_JaffaCakes118.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 98892a91cbd81bcc99710849b5dbc7d3_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini 98892a91cbd81bcc99710849b5dbc7d3_JaffaCakes118.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 98892a91cbd81bcc99710849b5dbc7d3_JaffaCakes118.exe File opened for modification C:\Users\Public\Music\desktop.ini 98892a91cbd81bcc99710849b5dbc7d3_JaffaCakes118.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 98892a91cbd81bcc99710849b5dbc7d3_JaffaCakes118.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini 98892a91cbd81bcc99710849b5dbc7d3_JaffaCakes118.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini 98892a91cbd81bcc99710849b5dbc7d3_JaffaCakes118.exe File opened for modification C:\Users\Admin\Music\desktop.ini 98892a91cbd81bcc99710849b5dbc7d3_JaffaCakes118.exe File opened for modification C:\Users\Public\Documents\desktop.ini 98892a91cbd81bcc99710849b5dbc7d3_JaffaCakes118.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 98892a91cbd81bcc99710849b5dbc7d3_JaffaCakes118.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 98892a91cbd81bcc99710849b5dbc7d3_JaffaCakes118.exe File opened for modification C:\Users\Public\Videos\desktop.ini 98892a91cbd81bcc99710849b5dbc7d3_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
98892a91cbd81bcc99710849b5dbc7d3_JaffaCakes118.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98892a91cbd81bcc99710849b5dbc7d3_JaffaCakes118.exe