Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-11-2024 14:30

General

  • Target

    aca7ca6f090aba613f6a701f0b2bac1c_JaffaCakes118.exe

  • Size

    202KB

  • MD5

    aca7ca6f090aba613f6a701f0b2bac1c

  • SHA1

    7d889d00e5cf9a09800faa450fcbfa17eadc5664

  • SHA256

    749e8c87bc157a7dc7a9c7427c41dbcd1f087250914caedd3aaa93982af1c433

  • SHA512

    567f6c90c1d9da328afbe3d8c1fb452135e592e13daf59b78f6855c7caa00cc98d5a76ac5707583907f6391dd8d940bfe1b1c187c9448b635414307ae87abf4e

  • SSDEEP

    6144:ZAU479KlI4imKWcPg62UgzMha1UBR+B3F:Wl96WmlcPg62tj10

Malware Config

Signatures

  • Locky

    Ransomware strain released in 2016, with advanced features like anti-analysis.

  • Locky family
  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Control Panel 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aca7ca6f090aba613f6a701f0b2bac1c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\aca7ca6f090aba613f6a701f0b2bac1c_JaffaCakes118.exe"
    1⤵
    • Sets desktop wallpaper using registry
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Suspicious use of WriteProcessMemory
    PID:2000
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      "C:\Users\Admin\AppData\Roaming\svchost.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4080
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\_HOWDO_text.html
      2⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4972
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcfabf46f8,0x7ffcfabf4708,0x7ffcfabf4718
        3⤵
          PID:2936
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,15630298586252867534,12880772759093155079,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:2
          3⤵
            PID:4088
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,15630298586252867534,12880772759093155079,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:3
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:1096
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,15630298586252867534,12880772759093155079,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:8
            3⤵
              PID:4244
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15630298586252867534,12880772759093155079,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:1
              3⤵
                PID:2560
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15630298586252867534,12880772759093155079,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:1
                3⤵
                  PID:888
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,15630298586252867534,12880772759093155079,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 /prefetch:8
                  3⤵
                    PID:5028
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,15630298586252867534,12880772759093155079,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 /prefetch:8
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:5092
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15630298586252867534,12880772759093155079,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:1
                    3⤵
                      PID:4396
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15630298586252867534,12880772759093155079,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:1
                      3⤵
                        PID:3988
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15630298586252867534,12880772759093155079,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:1
                        3⤵
                          PID:3636
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15630298586252867534,12880772759093155079,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3472 /prefetch:1
                          3⤵
                            PID:2000
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\aca7ca6f090aba613f6a701f0b2bac1c_JaffaCakes118.exe"
                          2⤵
                          • System Location Discovery: System Language Discovery
                          PID:1576
                      • C:\Windows\System32\CompPkgSrv.exe
                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                        1⤵
                          PID:4408
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:384

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                            Filesize

                            152B

                            MD5

                            7de1bbdc1f9cf1a58ae1de4951ce8cb9

                            SHA1

                            010da169e15457c25bd80ef02d76a940c1210301

                            SHA256

                            6e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e

                            SHA512

                            e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                            Filesize

                            152B

                            MD5

                            85ba073d7015b6ce7da19235a275f6da

                            SHA1

                            a23c8c2125e45a0788bac14423ae1f3eab92cf00

                            SHA256

                            5ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617

                            SHA512

                            eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                            Filesize

                            5KB

                            MD5

                            80443670c8286d68d63557a8663c3fe0

                            SHA1

                            9360b9852666697924ef82f25494e233189dbb5b

                            SHA256

                            7cc3824848308fca357651c7db6902701908019729f703008db04f58a4ac81de

                            SHA512

                            ba6aed910a39469f87c143ead90765664e541a004812cf9fb65c4ea65d3b2274850051b5574fe5c9c237a22534cb1ce72f70c9d564e4164c0dceff78fcab21cc

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                            Filesize

                            16B

                            MD5

                            46295cac801e5d4857d09837238a6394

                            SHA1

                            44e0fa1b517dbf802b18faf0785eeea6ac51594b

                            SHA256

                            0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                            SHA512

                            8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                            Filesize

                            16B

                            MD5

                            206702161f94c5cd39fadd03f4014d98

                            SHA1

                            bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                            SHA256

                            1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                            SHA512

                            0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                          • C:\Users\Admin\AppData\Roaming\svchost.exe

                            Filesize

                            16KB

                            MD5

                            29a855150f5623ddbd1f35ebb8b55162

                            SHA1

                            9e299d251e4f9745886ca53afdd087b289dc913c

                            SHA256

                            1cc1d4d12f79bcea3551b6e162b2bd6c7e36effbe770548618a098411b914b11

                            SHA512

                            43e7ce22f0e0d6bab9aad0f6fd9f6a79acc1871025ddd56dfd94dfba253937bea65b56031f2a4fe923d1386c15bdfcb92788dccc6dab05b711f79ee9c123730e

                          • C:\Users\Admin\Music\_4_HOWDO_text.html

                            Filesize

                            8KB

                            MD5

                            f63990f6c47be4cf4b7abf609be915c7

                            SHA1

                            c0967378cd42cb691ec47c487a410bf9dfc2f3c4

                            SHA256

                            656ad8213bcb8865c33b86ff4478c57b531dbc9c92047d59126bb5711553865f

                            SHA512

                            be40ba585cac10e866619bf3baa0454d2999c6480fc90e273e99cea23bf26447fe0a50c5d75e048c4dfbe09600f7e662c9495bed1c14c0f6c2c3b43ca2f22e8a

                          • memory/2000-391-0x0000000000A30000-0x0000000000A57000-memory.dmp

                            Filesize

                            156KB

                          • memory/2000-10-0x0000000000400000-0x0000000000437000-memory.dmp

                            Filesize

                            220KB

                          • memory/2000-12-0x0000000000400000-0x0000000000437000-memory.dmp

                            Filesize

                            220KB

                          • memory/2000-5-0x0000000000710000-0x0000000000711000-memory.dmp

                            Filesize

                            4KB

                          • memory/2000-4-0x0000000000434000-0x0000000000436000-memory.dmp

                            Filesize

                            8KB

                          • memory/2000-7-0x0000000000400000-0x0000000000427000-memory.dmp

                            Filesize

                            156KB

                          • memory/2000-46-0x0000000000A30000-0x0000000000A57000-memory.dmp

                            Filesize

                            156KB

                          • memory/2000-45-0x0000000000A30000-0x0000000000A57000-memory.dmp

                            Filesize

                            156KB

                          • memory/2000-47-0x0000000000A30000-0x0000000000A57000-memory.dmp

                            Filesize

                            156KB

                          • memory/2000-14-0x0000000000400000-0x0000000000437000-memory.dmp

                            Filesize

                            220KB

                          • memory/2000-11-0x0000000000434000-0x0000000000436000-memory.dmp

                            Filesize

                            8KB

                          • memory/2000-8-0x0000000000400000-0x0000000000437000-memory.dmp

                            Filesize

                            220KB

                          • memory/2000-9-0x0000000000400000-0x0000000000437000-memory.dmp

                            Filesize

                            220KB

                          • memory/2000-13-0x0000000000400000-0x0000000000437000-memory.dmp

                            Filesize

                            220KB

                          • memory/4080-24-0x0000000000400000-0x0000000000407000-memory.dmp

                            Filesize

                            28KB

                          • memory/4080-23-0x0000000000400000-0x0000000000407000-memory.dmp

                            Filesize

                            28KB

                          • memory/4080-19-0x0000000000400000-0x0000000000407000-memory.dmp

                            Filesize

                            28KB