Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2024 04:25
Static task
static1
Behavioral task
behavioral1
Sample
bbb445901d3ec280951ac12132afd87c_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
bbb445901d3ec280951ac12132afd87c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
bbb445901d3ec280951ac12132afd87c_JaffaCakes118.exe
-
Size
698KB
-
MD5
bbb445901d3ec280951ac12132afd87c
-
SHA1
48146b81b85e41b67489f2c20a4e38cb10d1c778
-
SHA256
ed95b1a888710f3ca4acacb49250fb6c21722e2882e31784bd2049d15f97d4de
-
SHA512
5c7c7b02d57a6275149baa67ee3568a2f9fd0d086b3953da20ea552bf1d43845afc3dc6b082d7a0a2557b7560e344cba73d317e0f59c7aa91a55ea9953c69f65
-
SSDEEP
12288:PPgcwGZdeZ0wIo9e1dYiJQgajJRfswX5B:PYlEu0wIMNiugqEq
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Cryptolocker family
-
Deletes itself 1 IoCs
pid Process 3556 Avywuixyxmexxtr.exe -
Executes dropped EXE 2 IoCs
pid Process 3556 Avywuixyxmexxtr.exe 2068 Avywuixyxmexxtr.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\*CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbb445901d3ec280951ac12132afd87c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Avywuixyxmexxtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Avywuixyxmexxtr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2160 wrote to memory of 3556 2160 bbb445901d3ec280951ac12132afd87c_JaffaCakes118.exe 83 PID 2160 wrote to memory of 3556 2160 bbb445901d3ec280951ac12132afd87c_JaffaCakes118.exe 83 PID 2160 wrote to memory of 3556 2160 bbb445901d3ec280951ac12132afd87c_JaffaCakes118.exe 83 PID 3556 wrote to memory of 2068 3556 Avywuixyxmexxtr.exe 84 PID 3556 wrote to memory of 2068 3556 Avywuixyxmexxtr.exe 84 PID 3556 wrote to memory of 2068 3556 Avywuixyxmexxtr.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbb445901d3ec280951ac12132afd87c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bbb445901d3ec280951ac12132afd87c_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" "-rC:\Users\Admin\AppData\Local\Temp\bbb445901d3ec280951ac12132afd87c_JaffaCakes118.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" -w24c3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2068
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
698KB
MD5bbb445901d3ec280951ac12132afd87c
SHA148146b81b85e41b67489f2c20a4e38cb10d1c778
SHA256ed95b1a888710f3ca4acacb49250fb6c21722e2882e31784bd2049d15f97d4de
SHA5125c7c7b02d57a6275149baa67ee3568a2f9fd0d086b3953da20ea552bf1d43845afc3dc6b082d7a0a2557b7560e344cba73d317e0f59c7aa91a55ea9953c69f65