Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2024 09:53
Static task
static1
Behavioral task
behavioral1
Sample
b07325f2686e5c26791424d9de7a5c54_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b07325f2686e5c26791424d9de7a5c54_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
b07325f2686e5c26791424d9de7a5c54_JaffaCakes118.exe
-
Size
360KB
-
MD5
b07325f2686e5c26791424d9de7a5c54
-
SHA1
f7d4163877616c819758c07c8c926a9b60c844fa
-
SHA256
4a19518be677153ab92e1208e7507dd6adef0de0fa34295dfa5d7ac9efce176d
-
SHA512
8f4824daef0b9bf70b7de5994baad455e4a1153c0f3976ebcf2f4b061c77a124f8ca0db9455a6bd8d36cb1c1c7e583964b951eb93571f1aa2c277f91775429b4
-
SSDEEP
6144:7Y56KnPgfagNgMhJAp/WgTO3x5N22vWvLRKKAX5l++SyVI4H:qdgfpN/AxT85I2vCMX5l+Zn
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Cryptolocker family
-
Deletes itself 1 IoCs
pid Process 4804 Wawbmdknpbal.exe -
Executes dropped EXE 2 IoCs
pid Process 4804 Wawbmdknpbal.exe 1152 Wawbmdknpbal.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Roaming\\Wawbmdknpbal.exe" Wawbmdknpbal.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wawbmdknpbal.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b07325f2686e5c26791424d9de7a5c54_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wawbmdknpbal.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2872 wrote to memory of 4804 2872 b07325f2686e5c26791424d9de7a5c54_JaffaCakes118.exe 82 PID 2872 wrote to memory of 4804 2872 b07325f2686e5c26791424d9de7a5c54_JaffaCakes118.exe 82 PID 2872 wrote to memory of 4804 2872 b07325f2686e5c26791424d9de7a5c54_JaffaCakes118.exe 82 PID 4804 wrote to memory of 1152 4804 Wawbmdknpbal.exe 83 PID 4804 wrote to memory of 1152 4804 Wawbmdknpbal.exe 83 PID 4804 wrote to memory of 1152 4804 Wawbmdknpbal.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\b07325f2686e5c26791424d9de7a5c54_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b07325f2686e5c26791424d9de7a5c54_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe"C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe" "/rC:\Users\Admin\AppData\Local\Temp\b07325f2686e5c26791424d9de7a5c54_JaffaCakes118.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe"C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe" /w000002183⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1152
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
360KB
MD5b07325f2686e5c26791424d9de7a5c54
SHA1f7d4163877616c819758c07c8c926a9b60c844fa
SHA2564a19518be677153ab92e1208e7507dd6adef0de0fa34295dfa5d7ac9efce176d
SHA5128f4824daef0b9bf70b7de5994baad455e4a1153c0f3976ebcf2f4b061c77a124f8ca0db9455a6bd8d36cb1c1c7e583964b951eb93571f1aa2c277f91775429b4