Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 06:16
Static task
static1
Behavioral task
behavioral1
Sample
fec5a0d4dea87955c124f2eaa1f759f5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fec5a0d4dea87955c124f2eaa1f759f5_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
fec5a0d4dea87955c124f2eaa1f759f5_JaffaCakes118.exe
-
Size
837KB
-
MD5
fec5a0d4dea87955c124f2eaa1f759f5
-
SHA1
ea2e50e16448ac8131391e5322663660ef0a5632
-
SHA256
4f3220da017e7be3e0b168a958134aae6dc96458cb12118e849465e2af752629
-
SHA512
2d52122e66c2239dff9186c3d91c036ba5a3ab3645bcdaba58157c5e2712b0b15131eee44b6760bfb45506f2f7155202c3cca141585c20e1f1333ddba07038b9
-
SSDEEP
24576:ghZnfY/dbcSq8cluurLKjgHKOKWOGNpBpK:wfYFwt1fKjgHKYdpBp
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Cryptolocker family
-
Deletes itself 1 IoCs
pid Process 2956 Wawbmdknpbal.exe -
Executes dropped EXE 2 IoCs
pid Process 2956 Wawbmdknpbal.exe 1208 Wawbmdknpbal.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Roaming\\Wawbmdknpbal.exe" Wawbmdknpbal.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fec5a0d4dea87955c124f2eaa1f759f5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wawbmdknpbal.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wawbmdknpbal.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 324 wrote to memory of 2956 324 fec5a0d4dea87955c124f2eaa1f759f5_JaffaCakes118.exe 82 PID 324 wrote to memory of 2956 324 fec5a0d4dea87955c124f2eaa1f759f5_JaffaCakes118.exe 82 PID 324 wrote to memory of 2956 324 fec5a0d4dea87955c124f2eaa1f759f5_JaffaCakes118.exe 82 PID 2956 wrote to memory of 1208 2956 Wawbmdknpbal.exe 83 PID 2956 wrote to memory of 1208 2956 Wawbmdknpbal.exe 83 PID 2956 wrote to memory of 1208 2956 Wawbmdknpbal.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\fec5a0d4dea87955c124f2eaa1f759f5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fec5a0d4dea87955c124f2eaa1f759f5_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe"C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe" "/rC:\Users\Admin\AppData\Local\Temp\fec5a0d4dea87955c124f2eaa1f759f5_JaffaCakes118.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe"C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe" /w000002183⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1208
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
837KB
MD5fec5a0d4dea87955c124f2eaa1f759f5
SHA1ea2e50e16448ac8131391e5322663660ef0a5632
SHA2564f3220da017e7be3e0b168a958134aae6dc96458cb12118e849465e2af752629
SHA5122d52122e66c2239dff9186c3d91c036ba5a3ab3645bcdaba58157c5e2712b0b15131eee44b6760bfb45506f2f7155202c3cca141585c20e1f1333ddba07038b9