Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2024 14:30
Static task
static1
Behavioral task
behavioral1
Sample
aca7ca6f090aba613f6a701f0b2bac1c_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
aca7ca6f090aba613f6a701f0b2bac1c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
aca7ca6f090aba613f6a701f0b2bac1c_JaffaCakes118.exe
-
Size
202KB
-
MD5
aca7ca6f090aba613f6a701f0b2bac1c
-
SHA1
7d889d00e5cf9a09800faa450fcbfa17eadc5664
-
SHA256
749e8c87bc157a7dc7a9c7427c41dbcd1f087250914caedd3aaa93982af1c433
-
SHA512
567f6c90c1d9da328afbe3d8c1fb452135e592e13daf59b78f6855c7caa00cc98d5a76ac5707583907f6391dd8d940bfe1b1c187c9448b635414307ae87abf4e
-
SSDEEP
6144:ZAU479KlI4imKWcPg62UgzMha1UBR+B3F:Wl96WmlcPg62tj10
Malware Config
Signatures
-
Locky
Ransomware strain released in 2016, with advanced features like anti-analysis.
-
Locky family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explorer.lnk svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 4080 svchost.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\_HOWDO_text.bmp" aca7ca6f090aba613f6a701f0b2bac1c_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aca7ca6f090aba613f6a701f0b2bac1c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\Desktop\WallpaperStyle = "0" aca7ca6f090aba613f6a701f0b2bac1c_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\Desktop\TileWallpaper = "0" aca7ca6f090aba613f6a701f0b2bac1c_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1096 msedge.exe 1096 msedge.exe 4972 msedge.exe 4972 msedge.exe 5092 identity_helper.exe 5092 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2000 wrote to memory of 4080 2000 aca7ca6f090aba613f6a701f0b2bac1c_JaffaCakes118.exe 84 PID 2000 wrote to memory of 4080 2000 aca7ca6f090aba613f6a701f0b2bac1c_JaffaCakes118.exe 84 PID 2000 wrote to memory of 4080 2000 aca7ca6f090aba613f6a701f0b2bac1c_JaffaCakes118.exe 84 PID 2000 wrote to memory of 4972 2000 aca7ca6f090aba613f6a701f0b2bac1c_JaffaCakes118.exe 102 PID 2000 wrote to memory of 4972 2000 aca7ca6f090aba613f6a701f0b2bac1c_JaffaCakes118.exe 102 PID 4972 wrote to memory of 2936 4972 msedge.exe 103 PID 4972 wrote to memory of 2936 4972 msedge.exe 103 PID 2000 wrote to memory of 1576 2000 aca7ca6f090aba613f6a701f0b2bac1c_JaffaCakes118.exe 104 PID 2000 wrote to memory of 1576 2000 aca7ca6f090aba613f6a701f0b2bac1c_JaffaCakes118.exe 104 PID 2000 wrote to memory of 1576 2000 aca7ca6f090aba613f6a701f0b2bac1c_JaffaCakes118.exe 104 PID 4972 wrote to memory of 4088 4972 msedge.exe 106 PID 4972 wrote to memory of 4088 4972 msedge.exe 106 PID 4972 wrote to memory of 4088 4972 msedge.exe 106 PID 4972 wrote to memory of 4088 4972 msedge.exe 106 PID 4972 wrote to memory of 4088 4972 msedge.exe 106 PID 4972 wrote to memory of 4088 4972 msedge.exe 106 PID 4972 wrote to memory of 4088 4972 msedge.exe 106 PID 4972 wrote to memory of 4088 4972 msedge.exe 106 PID 4972 wrote to memory of 4088 4972 msedge.exe 106 PID 4972 wrote to memory of 4088 4972 msedge.exe 106 PID 4972 wrote to memory of 4088 4972 msedge.exe 106 PID 4972 wrote to memory of 4088 4972 msedge.exe 106 PID 4972 wrote to memory of 4088 4972 msedge.exe 106 PID 4972 wrote to memory of 4088 4972 msedge.exe 106 PID 4972 wrote to memory of 4088 4972 msedge.exe 106 PID 4972 wrote to memory of 4088 4972 msedge.exe 106 PID 4972 wrote to memory of 4088 4972 msedge.exe 106 PID 4972 wrote to memory of 4088 4972 msedge.exe 106 PID 4972 wrote to memory of 4088 4972 msedge.exe 106 PID 4972 wrote to memory of 4088 4972 msedge.exe 106 PID 4972 wrote to memory of 4088 4972 msedge.exe 106 PID 4972 wrote to memory of 4088 4972 msedge.exe 106 PID 4972 wrote to memory of 4088 4972 msedge.exe 106 PID 4972 wrote to memory of 4088 4972 msedge.exe 106 PID 4972 wrote to memory of 4088 4972 msedge.exe 106 PID 4972 wrote to memory of 4088 4972 msedge.exe 106 PID 4972 wrote to memory of 4088 4972 msedge.exe 106 PID 4972 wrote to memory of 4088 4972 msedge.exe 106 PID 4972 wrote to memory of 4088 4972 msedge.exe 106 PID 4972 wrote to memory of 4088 4972 msedge.exe 106 PID 4972 wrote to memory of 4088 4972 msedge.exe 106 PID 4972 wrote to memory of 4088 4972 msedge.exe 106 PID 4972 wrote to memory of 4088 4972 msedge.exe 106 PID 4972 wrote to memory of 4088 4972 msedge.exe 106 PID 4972 wrote to memory of 4088 4972 msedge.exe 106 PID 4972 wrote to memory of 4088 4972 msedge.exe 106 PID 4972 wrote to memory of 4088 4972 msedge.exe 106 PID 4972 wrote to memory of 4088 4972 msedge.exe 106 PID 4972 wrote to memory of 4088 4972 msedge.exe 106 PID 4972 wrote to memory of 4088 4972 msedge.exe 106 PID 4972 wrote to memory of 1096 4972 msedge.exe 107 PID 4972 wrote to memory of 1096 4972 msedge.exe 107 PID 4972 wrote to memory of 4244 4972 msedge.exe 108 PID 4972 wrote to memory of 4244 4972 msedge.exe 108 PID 4972 wrote to memory of 4244 4972 msedge.exe 108 PID 4972 wrote to memory of 4244 4972 msedge.exe 108 PID 4972 wrote to memory of 4244 4972 msedge.exe 108 PID 4972 wrote to memory of 4244 4972 msedge.exe 108 PID 4972 wrote to memory of 4244 4972 msedge.exe 108 PID 4972 wrote to memory of 4244 4972 msedge.exe 108 PID 4972 wrote to memory of 4244 4972 msedge.exe 108 PID 4972 wrote to memory of 4244 4972 msedge.exe 108 PID 4972 wrote to memory of 4244 4972 msedge.exe 108 PID 4972 wrote to memory of 4244 4972 msedge.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\aca7ca6f090aba613f6a701f0b2bac1c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\aca7ca6f090aba613f6a701f0b2bac1c_JaffaCakes118.exe"1⤵
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\_HOWDO_text.html2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcfabf46f8,0x7ffcfabf4708,0x7ffcfabf47183⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,15630298586252867534,12880772759093155079,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:23⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,15630298586252867534,12880772759093155079,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,15630298586252867534,12880772759093155079,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:83⤵PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15630298586252867534,12880772759093155079,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:13⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15630298586252867534,12880772759093155079,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:13⤵PID:888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,15630298586252867534,12880772759093155079,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 /prefetch:83⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,15630298586252867534,12880772759093155079,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15630298586252867534,12880772759093155079,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:13⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15630298586252867534,12880772759093155079,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:13⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15630298586252867534,12880772759093155079,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:13⤵PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15630298586252867534,12880772759093155079,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3472 /prefetch:13⤵PID:2000
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\aca7ca6f090aba613f6a701f0b2bac1c_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1576
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4408
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
5KB
MD580443670c8286d68d63557a8663c3fe0
SHA19360b9852666697924ef82f25494e233189dbb5b
SHA2567cc3824848308fca357651c7db6902701908019729f703008db04f58a4ac81de
SHA512ba6aed910a39469f87c143ead90765664e541a004812cf9fb65c4ea65d3b2274850051b5574fe5c9c237a22534cb1ce72f70c9d564e4164c0dceff78fcab21cc
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16KB
MD529a855150f5623ddbd1f35ebb8b55162
SHA19e299d251e4f9745886ca53afdd087b289dc913c
SHA2561cc1d4d12f79bcea3551b6e162b2bd6c7e36effbe770548618a098411b914b11
SHA51243e7ce22f0e0d6bab9aad0f6fd9f6a79acc1871025ddd56dfd94dfba253937bea65b56031f2a4fe923d1386c15bdfcb92788dccc6dab05b711f79ee9c123730e
-
Filesize
8KB
MD5f63990f6c47be4cf4b7abf609be915c7
SHA1c0967378cd42cb691ec47c487a410bf9dfc2f3c4
SHA256656ad8213bcb8865c33b86ff4478c57b531dbc9c92047d59126bb5711553865f
SHA512be40ba585cac10e866619bf3baa0454d2999c6480fc90e273e99cea23bf26447fe0a50c5d75e048c4dfbe09600f7e662c9495bed1c14c0f6c2c3b43ca2f22e8a