Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-12-2024 04:05
Static task
static1
Behavioral task
behavioral1
Sample
e9cd494b249cea7b968fa89f1e7d40de_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e9cd494b249cea7b968fa89f1e7d40de_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e9cd494b249cea7b968fa89f1e7d40de_JaffaCakes118.exe
-
Size
726KB
-
MD5
e9cd494b249cea7b968fa89f1e7d40de
-
SHA1
fd514fe256f815cfecf67fb57e16d106443d90dc
-
SHA256
76487462acfa06bc90bda7d72bee7f88ea2e70d838a50d9012362958ad93f02a
-
SHA512
2689268a8fd96fa0e9b65f245bb3ab4ca860e7aa017e930c14d58bbe0ffc52ecb050de43865ebd8b7ff56270075d4a071caed81dff3c4d01c482d183482ff53a
-
SSDEEP
12288:xBnDWIk+GOifTjyBImx5MKJ5nJDLWrutVPIEwSdbE0HD1s:x5Vk+vibuIm8qZJfWyPwENdf
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Cryptolocker family
-
Deletes itself 1 IoCs
pid Process 2688 Wawbmdknpbal.exe -
Executes dropped EXE 2 IoCs
pid Process 2688 Wawbmdknpbal.exe 2692 Wawbmdknpbal.exe -
Loads dropped DLL 3 IoCs
pid Process 2764 e9cd494b249cea7b968fa89f1e7d40de_JaffaCakes118.exe 2764 e9cd494b249cea7b968fa89f1e7d40de_JaffaCakes118.exe 2688 Wawbmdknpbal.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Roaming\\Wawbmdknpbal.exe" Wawbmdknpbal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\*CryptoLocker = "C:\\Users\\Admin\\AppData\\Roaming\\Wawbmdknpbal.exe" Wawbmdknpbal.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e9cd494b249cea7b968fa89f1e7d40de_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wawbmdknpbal.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wawbmdknpbal.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2688 2764 e9cd494b249cea7b968fa89f1e7d40de_JaffaCakes118.exe 30 PID 2764 wrote to memory of 2688 2764 e9cd494b249cea7b968fa89f1e7d40de_JaffaCakes118.exe 30 PID 2764 wrote to memory of 2688 2764 e9cd494b249cea7b968fa89f1e7d40de_JaffaCakes118.exe 30 PID 2764 wrote to memory of 2688 2764 e9cd494b249cea7b968fa89f1e7d40de_JaffaCakes118.exe 30 PID 2688 wrote to memory of 2692 2688 Wawbmdknpbal.exe 31 PID 2688 wrote to memory of 2692 2688 Wawbmdknpbal.exe 31 PID 2688 wrote to memory of 2692 2688 Wawbmdknpbal.exe 31 PID 2688 wrote to memory of 2692 2688 Wawbmdknpbal.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9cd494b249cea7b968fa89f1e7d40de_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e9cd494b249cea7b968fa89f1e7d40de_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe"C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe" "/rC:\Users\Admin\AppData\Local\Temp\e9cd494b249cea7b968fa89f1e7d40de_JaffaCakes118.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe"C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe" /w0000011C3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2692
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
726KB
MD5e9cd494b249cea7b968fa89f1e7d40de
SHA1fd514fe256f815cfecf67fb57e16d106443d90dc
SHA25676487462acfa06bc90bda7d72bee7f88ea2e70d838a50d9012362958ad93f02a
SHA5122689268a8fd96fa0e9b65f245bb3ab4ca860e7aa017e930c14d58bbe0ffc52ecb050de43865ebd8b7ff56270075d4a071caed81dff3c4d01c482d183482ff53a