Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-12-2024 06:16
Static task
static1
Behavioral task
behavioral1
Sample
fec5a0d4dea87955c124f2eaa1f759f5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fec5a0d4dea87955c124f2eaa1f759f5_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
fec5a0d4dea87955c124f2eaa1f759f5_JaffaCakes118.exe
-
Size
837KB
-
MD5
fec5a0d4dea87955c124f2eaa1f759f5
-
SHA1
ea2e50e16448ac8131391e5322663660ef0a5632
-
SHA256
4f3220da017e7be3e0b168a958134aae6dc96458cb12118e849465e2af752629
-
SHA512
2d52122e66c2239dff9186c3d91c036ba5a3ab3645bcdaba58157c5e2712b0b15131eee44b6760bfb45506f2f7155202c3cca141585c20e1f1333ddba07038b9
-
SSDEEP
24576:ghZnfY/dbcSq8cluurLKjgHKOKWOGNpBpK:wfYFwt1fKjgHKYdpBp
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Cryptolocker family
-
Deletes itself 1 IoCs
pid Process 2424 Wawbmdknpbal.exe -
Executes dropped EXE 2 IoCs
pid Process 2424 Wawbmdknpbal.exe 2708 Wawbmdknpbal.exe -
Loads dropped DLL 3 IoCs
pid Process 2356 fec5a0d4dea87955c124f2eaa1f759f5_JaffaCakes118.exe 2356 fec5a0d4dea87955c124f2eaa1f759f5_JaffaCakes118.exe 2424 Wawbmdknpbal.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Roaming\\Wawbmdknpbal.exe" Wawbmdknpbal.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fec5a0d4dea87955c124f2eaa1f759f5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wawbmdknpbal.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wawbmdknpbal.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2424 2356 fec5a0d4dea87955c124f2eaa1f759f5_JaffaCakes118.exe 30 PID 2356 wrote to memory of 2424 2356 fec5a0d4dea87955c124f2eaa1f759f5_JaffaCakes118.exe 30 PID 2356 wrote to memory of 2424 2356 fec5a0d4dea87955c124f2eaa1f759f5_JaffaCakes118.exe 30 PID 2356 wrote to memory of 2424 2356 fec5a0d4dea87955c124f2eaa1f759f5_JaffaCakes118.exe 30 PID 2424 wrote to memory of 2708 2424 Wawbmdknpbal.exe 31 PID 2424 wrote to memory of 2708 2424 Wawbmdknpbal.exe 31 PID 2424 wrote to memory of 2708 2424 Wawbmdknpbal.exe 31 PID 2424 wrote to memory of 2708 2424 Wawbmdknpbal.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\fec5a0d4dea87955c124f2eaa1f759f5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fec5a0d4dea87955c124f2eaa1f759f5_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe"C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe" "/rC:\Users\Admin\AppData\Local\Temp\fec5a0d4dea87955c124f2eaa1f759f5_JaffaCakes118.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe"C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe" /w000000CC3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2708
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
837KB
MD5fec5a0d4dea87955c124f2eaa1f759f5
SHA1ea2e50e16448ac8131391e5322663660ef0a5632
SHA2564f3220da017e7be3e0b168a958134aae6dc96458cb12118e849465e2af752629
SHA5122d52122e66c2239dff9186c3d91c036ba5a3ab3645bcdaba58157c5e2712b0b15131eee44b6760bfb45506f2f7155202c3cca141585c20e1f1333ddba07038b9