Analysis

  • max time kernel
    145s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    15/04/2024, 16:22

General

  • Target

    f17ad5147ccfba015adfe870a18021f7_JaffaCakes118.exe

  • Size

    8.8MB

  • MD5

    f17ad5147ccfba015adfe870a18021f7

  • SHA1

    dec394f932c74a938be46971ec4a1de76370e8c3

  • SHA256

    f522023467d3b9cf1377192c6a2764bef8b8304613d79ffdf3c6be614f78e740

  • SHA512

    7256e963a2a4032a6c4f74d1b1c49c75463c83269187dc34691f2f545c09da6d6826d9bb447a55a125befa67b8f4747df17f97ce7eb66074bc4d142ab2154c67

  • SSDEEP

    98304:mE2ji0iIMzKpXOMGQjduNKhcqjOTpC11sw423fu5TSXdBfz9vKjA:mn+0iI2ly0cOTM1St2GJSXvgjA

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Renames multiple (91) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f17ad5147ccfba015adfe870a18021f7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f17ad5147ccfba015adfe870a18021f7_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops startup file
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Windows\SysWOW64\HelpMe.exe
      C:\Windows\system32\HelpMe.exe
      2⤵
      • Modifies WinLogon for persistence
      • Drops startup file
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops autorun.inf file
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      PID:2528

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2248906074-2862704502-246302768-1000\desktop.ini.exe

    Filesize

    8.8MB

    MD5

    c1320fbe29507432204a3201e0ada744

    SHA1

    8ccacc5cb841a75490bc9dbda1fcbf8708efc13e

    SHA256

    1ec60db377fe3a7606b7dbad5621630d9107d5b79f975d7a51282f7880537505

    SHA512

    e5f83c6a265ce0739b9fe55ef4521ea33347b6383c940df8fc08169ae4a314edc488cb0d8c9628229bda7b085deafe64d6e7836ab6f214d4c7fe358ca62f5a59

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    1KB

    MD5

    39a9e93f707316026fc0df22c9bc8aa4

    SHA1

    fe0bfb562eb4902d88563f2468e91245049644d7

    SHA256

    a6cea0b98b78cee6086a307deb0eb8dce9367b0469ac0a006a751ade9a00e470

    SHA512

    d9e338e726d8d5debe6ba211d50eb0df0e64f8a5768161ddf3b764597d3deacf0c44960414c61c8f32d9b1e7d51088856e0ca0ff2bacac882a27f0f98d1fde9c

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    950B

    MD5

    4939fb1b771bf3e26bb4c24466470a60

    SHA1

    0f8b33cc142059bfd0387edb46b428b7e0296e7d

    SHA256

    a3866d49cdc79e6955d5b2c35dbeafea0eb254d4b27e583cdb6caeb110a6816e

    SHA512

    6485ec50c7341b10586195716ba11f9ebcd1134dc91de52d21ee7cfd9efa82b8729030620bf102a199a1f36e6cf239f3f86738ad475bc58ab2ecfd9f5c1feeeb

  • F:\AUTORUN.INF

    Filesize

    145B

    MD5

    ca13857b2fd3895a39f09d9dde3cca97

    SHA1

    8b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0

    SHA256

    cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae

    SHA512

    55e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47

  • F:\AutoRun.exe

    Filesize

    8.8MB

    MD5

    f17ad5147ccfba015adfe870a18021f7

    SHA1

    dec394f932c74a938be46971ec4a1de76370e8c3

    SHA256

    f522023467d3b9cf1377192c6a2764bef8b8304613d79ffdf3c6be614f78e740

    SHA512

    7256e963a2a4032a6c4f74d1b1c49c75463c83269187dc34691f2f545c09da6d6826d9bb447a55a125befa67b8f4747df17f97ce7eb66074bc4d142ab2154c67

  • \Windows\SysWOW64\HelpMe.exe

    Filesize

    8.8MB

    MD5

    fc80a113308271d5fce89151560da5fe

    SHA1

    ac86d68c6538b20014fcdd6124fd7e829f58ddb7

    SHA256

    768d1aa5e4176e5b3bd0906d64430039368b3209ebcd2808166b6f03d436b9ff

    SHA512

    c0c95209005070b99304812fd1389e84c70fd0b1cca9ede6a2cc8dd3b41aa339c2f1de46f1b73ffcb0ebfbaa66a200561ff362efc9595aa0f341e7453f586d38

  • memory/1736-0-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/2528-12-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB