Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 16:50
Static task
static1
Behavioral task
behavioral1
Sample
9cbb128e8211a7cd00729c159815cb1c_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9cbb128e8211a7cd00729c159815cb1c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
9cbb128e8211a7cd00729c159815cb1c_JaffaCakes118.exe
-
Size
726KB
-
MD5
9cbb128e8211a7cd00729c159815cb1c
-
SHA1
870a3d5d18501795e242c4579419f65e17ac8dbf
-
SHA256
bb12757c6a14207d8a9cd4d42ff93747795f8a09186752b1c94b5b373abbaf11
-
SHA512
b72eb446430e499954bfe2dd14b9504e3a9af18e983215718d40a8f9b388acd53f9911cf3d10de78a55b753c562fe2e41636f67d6139bec0c52333c4d66a6ae4
-
SSDEEP
12288:ovF1OoLe51k4HXM0DkkaG60OiM4jS0VsjS7me+DPvpmPafhIMvW6xAjCBBN:ovXOoLePpHXUke0OiRz77mdPvpmSJzv7
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Cryptolocker family
-
Deletes itself 1 IoCs
pid Process 2224 Wawbmdknpbal.exe -
Executes dropped EXE 2 IoCs
pid Process 2224 Wawbmdknpbal.exe 2780 Wawbmdknpbal.exe -
Loads dropped DLL 3 IoCs
pid Process 2000 9cbb128e8211a7cd00729c159815cb1c_JaffaCakes118.exe 2000 9cbb128e8211a7cd00729c159815cb1c_JaffaCakes118.exe 2224 Wawbmdknpbal.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Roaming\\Wawbmdknpbal.exe" Wawbmdknpbal.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9cbb128e8211a7cd00729c159815cb1c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wawbmdknpbal.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wawbmdknpbal.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2000 wrote to memory of 2224 2000 9cbb128e8211a7cd00729c159815cb1c_JaffaCakes118.exe 30 PID 2000 wrote to memory of 2224 2000 9cbb128e8211a7cd00729c159815cb1c_JaffaCakes118.exe 30 PID 2000 wrote to memory of 2224 2000 9cbb128e8211a7cd00729c159815cb1c_JaffaCakes118.exe 30 PID 2000 wrote to memory of 2224 2000 9cbb128e8211a7cd00729c159815cb1c_JaffaCakes118.exe 30 PID 2224 wrote to memory of 2780 2224 Wawbmdknpbal.exe 31 PID 2224 wrote to memory of 2780 2224 Wawbmdknpbal.exe 31 PID 2224 wrote to memory of 2780 2224 Wawbmdknpbal.exe 31 PID 2224 wrote to memory of 2780 2224 Wawbmdknpbal.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\9cbb128e8211a7cd00729c159815cb1c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9cbb128e8211a7cd00729c159815cb1c_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe"C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe" "/rC:\Users\Admin\AppData\Local\Temp\9cbb128e8211a7cd00729c159815cb1c_JaffaCakes118.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe"C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe" /w000000D03⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2780
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
726KB
MD59cbb128e8211a7cd00729c159815cb1c
SHA1870a3d5d18501795e242c4579419f65e17ac8dbf
SHA256bb12757c6a14207d8a9cd4d42ff93747795f8a09186752b1c94b5b373abbaf11
SHA512b72eb446430e499954bfe2dd14b9504e3a9af18e983215718d40a8f9b388acd53f9911cf3d10de78a55b753c562fe2e41636f67d6139bec0c52333c4d66a6ae4