Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
11-01-2025 04:47
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_f75e92b4cf12745c63966bb50c82e4be.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_f75e92b4cf12745c63966bb50c82e4be.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_f75e92b4cf12745c63966bb50c82e4be.exe
-
Size
921KB
-
MD5
f75e92b4cf12745c63966bb50c82e4be
-
SHA1
e58678781548262b653b34bbf3f55339d53f28cb
-
SHA256
a1b504b8e34200d8029f6d75491d517e460162cb9df438257ee4ed85f61c18bc
-
SHA512
2d66d1868e44956c00593d7d19d70b14475571dcd9b5eee9d15ac4fa3d473ce3a05c598c57ea31707b4deaa3469ed046b85f4e9c3f04430e652eda4d6a4f6038
-
SSDEEP
24576:SnkXEg1ZlhKG+WWZtCpDCE5Ie534SCeTpOl13lHlI:SkXEg1ZlIzZtCpGE5j5oSHOlxRlI
Malware Config
Extracted
F:\$RECYCLE.BIN\GET_YOUR_FILES_BACK.txt
http://avosjon4pfh3y7ew3jdwz6ofw7lljcxlbk7hcxxmnxlh5kvf2akcqjad.onion
http://avosqxh72b5ia23dl5fgwcpndkctuzqvh2iefk5imp3pi5gfhel5klad.onion
Signatures
-
Avoslocker Ransomware
Avoslocker is a relatively new ransomware, that was observed in late June and early July, 2021.
-
Avoslocker family
-
Renames multiple (168) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\581324137.png" reg.exe -
pid Process 1536 powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_f75e92b4cf12745c63966bb50c82e4be.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1536 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1536 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1556 wrote to memory of 1536 1556 JaffaCakes118_f75e92b4cf12745c63966bb50c82e4be.exe 31 PID 1556 wrote to memory of 1536 1556 JaffaCakes118_f75e92b4cf12745c63966bb50c82e4be.exe 31 PID 1556 wrote to memory of 1536 1556 JaffaCakes118_f75e92b4cf12745c63966bb50c82e4be.exe 31 PID 1556 wrote to memory of 1536 1556 JaffaCakes118_f75e92b4cf12745c63966bb50c82e4be.exe 31 PID 1536 wrote to memory of 544 1536 powershell.exe 34 PID 1536 wrote to memory of 544 1536 powershell.exe 34 PID 1536 wrote to memory of 544 1536 powershell.exe 34 PID 1536 wrote to memory of 544 1536 powershell.exe 34 PID 1536 wrote to memory of 1684 1536 powershell.exe 35 PID 1536 wrote to memory of 1684 1536 powershell.exe 35 PID 1536 wrote to memory of 1684 1536 powershell.exe 35 PID 1536 wrote to memory of 1684 1536 powershell.exe 35 PID 1536 wrote to memory of 1684 1536 powershell.exe 35 PID 1536 wrote to memory of 1684 1536 powershell.exe 35 PID 1536 wrote to memory of 1684 1536 powershell.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f75e92b4cf12745c63966bb50c82e4be.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f75e92b4cf12745c63966bb50c82e4be.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$a = [System.IO.File]::ReadAllText(\"F:\GET_YOUR_FILES_BACK.txt\");Add-Type -AssemblyName System.Drawing;$filename = \"$env:temp\$(Get-Random).png\";$bmp = new-object System.Drawing.Bitmap 1920,1080;$font = new-object System.Drawing.Font Consolas,10;$brushBg = [System.Drawing.Brushes]::Black;$brushFg = [System.Drawing.Brushes]::White;$format = [System.Drawing.StringFormat]::GenericDefault;$format.Alignment = [System.Drawing.StringAlignment]::Center;$format.LineAlignment = [System.Drawing.StringAlignment]::Center;$graphics = [System.Drawing.Graphics]::FromImage($bmp);$graphics.FillRectangle($brushBg,0,0,$bmp.Width,$bmp.Height);$graphics.DrawString($a,$font,$brushFg,[System.Drawing.RectangleF]::FromLTRB(0, 0, 1920, 1080),$format);$graphics.Dispose();$bmp.Save($filename);reg add \"HKEY_CURRENT_USER\Control Panel\Desktop\" /v Wallpaper /t REG_SZ /d $filename /f;Start-Sleep 1;rundll32.exe user32.dll, UpdatePerUserSystemParameters, 0, $false;"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add "HKEY_CURRENT_USER\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\581324137.png /f3⤵
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
PID:544
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" user32.dll UpdatePerUserSystemParameters 0 False3⤵
- System Location Discovery: System Language Discovery
PID:1684
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59cd17876488bd2c2b81b965620b9aa14
SHA1f5305680ebd56c1eebc1797c6a7ce93117c3423c
SHA25608152eb79c4f4b16badb06fe231da164570b62999357c8da8659e6d024f11127
SHA5127eea1d69e706ef86c0d2343630bc3553b2d5418523d2e4aabcc66d1c0ea3754351ed4c0ab6c185eabbd313f5333d56182c0a9e873aa05b1c5e514e9a3dfceb8d