Analysis
-
max time kernel
145s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
26-04-2024 16:19
Static task
static1
Behavioral task
behavioral1
Sample
012c0953d1803e4e3f6a0c2183d22dd2_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
012c0953d1803e4e3f6a0c2183d22dd2_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
012c0953d1803e4e3f6a0c2183d22dd2_JaffaCakes118.exe
-
Size
3.8MB
-
MD5
012c0953d1803e4e3f6a0c2183d22dd2
-
SHA1
f37b8d2be55a81475cb90288d8f3b0b7e7f322c3
-
SHA256
81aa4fa2f5b0c027e5939a1615929cf4d58db3ccf38744ad06d6e7f85a2a85f9
-
SHA512
121d6d049e5c0d25e7d49c83d2b04c7ee6809371c40e9f26d0bec9167b95af6268c597d76e421f98e08ee3217422b5f6df911ac885a16dacd08f096b129f4b4d
-
SSDEEP
49152:hEs1UfPOgo7kMcbnKc/7PW9kwUidyZNSLx4qtamNzM1nEAadHi04:hE2UfzMc0MNSL14
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
012c0953d1803e4e3f6a0c2183d22dd2_JaffaCakes118.exeHelpMe.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" 012c0953d1803e4e3f6a0c2183d22dd2_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe -
Renames multiple (91) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file 3 IoCs
Processes:
012c0953d1803e4e3f6a0c2183d22dd2_JaffaCakes118.exeHelpMe.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 012c0953d1803e4e3f6a0c2183d22dd2_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 012c0953d1803e4e3f6a0c2183d22dd2_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
Processes:
HelpMe.exepid process 2188 HelpMe.exe -
Loads dropped DLL 2 IoCs
Processes:
012c0953d1803e4e3f6a0c2183d22dd2_JaffaCakes118.exepid process 2184 012c0953d1803e4e3f6a0c2183d22dd2_JaffaCakes118.exe 2184 012c0953d1803e4e3f6a0c2183d22dd2_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
012c0953d1803e4e3f6a0c2183d22dd2_JaffaCakes118.exeHelpMe.exedescription ioc process File opened (read-only) \??\B: 012c0953d1803e4e3f6a0c2183d22dd2_JaffaCakes118.exe File opened (read-only) \??\E: 012c0953d1803e4e3f6a0c2183d22dd2_JaffaCakes118.exe File opened (read-only) \??\H: 012c0953d1803e4e3f6a0c2183d22dd2_JaffaCakes118.exe File opened (read-only) \??\O: 012c0953d1803e4e3f6a0c2183d22dd2_JaffaCakes118.exe File opened (read-only) \??\K: 012c0953d1803e4e3f6a0c2183d22dd2_JaffaCakes118.exe File opened (read-only) \??\L: 012c0953d1803e4e3f6a0c2183d22dd2_JaffaCakes118.exe File opened (read-only) \??\M: 012c0953d1803e4e3f6a0c2183d22dd2_JaffaCakes118.exe File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\A: 012c0953d1803e4e3f6a0c2183d22dd2_JaffaCakes118.exe File opened (read-only) \??\J: 012c0953d1803e4e3f6a0c2183d22dd2_JaffaCakes118.exe File opened (read-only) \??\X: 012c0953d1803e4e3f6a0c2183d22dd2_JaffaCakes118.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\Z: 012c0953d1803e4e3f6a0c2183d22dd2_JaffaCakes118.exe File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\Y: 012c0953d1803e4e3f6a0c2183d22dd2_JaffaCakes118.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\N: 012c0953d1803e4e3f6a0c2183d22dd2_JaffaCakes118.exe File opened (read-only) \??\Q: 012c0953d1803e4e3f6a0c2183d22dd2_JaffaCakes118.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\G: 012c0953d1803e4e3f6a0c2183d22dd2_JaffaCakes118.exe File opened (read-only) \??\R: 012c0953d1803e4e3f6a0c2183d22dd2_JaffaCakes118.exe File opened (read-only) \??\S: 012c0953d1803e4e3f6a0c2183d22dd2_JaffaCakes118.exe File opened (read-only) \??\T: 012c0953d1803e4e3f6a0c2183d22dd2_JaffaCakes118.exe File opened (read-only) \??\V: 012c0953d1803e4e3f6a0c2183d22dd2_JaffaCakes118.exe File opened (read-only) \??\W: 012c0953d1803e4e3f6a0c2183d22dd2_JaffaCakes118.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\I: 012c0953d1803e4e3f6a0c2183d22dd2_JaffaCakes118.exe File opened (read-only) \??\P: 012c0953d1803e4e3f6a0c2183d22dd2_JaffaCakes118.exe File opened (read-only) \??\U: 012c0953d1803e4e3f6a0c2183d22dd2_JaffaCakes118.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\X: HelpMe.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
012c0953d1803e4e3f6a0c2183d22dd2_JaffaCakes118.exeHelpMe.exedescription ioc process File opened for modification F:\AUTORUN.INF 012c0953d1803e4e3f6a0c2183d22dd2_JaffaCakes118.exe File opened for modification C:\AUTORUN.INF 012c0953d1803e4e3f6a0c2183d22dd2_JaffaCakes118.exe File opened for modification F:\AUTORUN.INF HelpMe.exe -
Drops file in System32 directory 2 IoCs
Processes:
012c0953d1803e4e3f6a0c2183d22dd2_JaffaCakes118.exeHelpMe.exedescription ioc process File created C:\Windows\SysWOW64\HelpMe.exe 012c0953d1803e4e3f6a0c2183d22dd2_JaffaCakes118.exe File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
012c0953d1803e4e3f6a0c2183d22dd2_JaffaCakes118.exedescription pid process target process PID 2184 wrote to memory of 2188 2184 012c0953d1803e4e3f6a0c2183d22dd2_JaffaCakes118.exe HelpMe.exe PID 2184 wrote to memory of 2188 2184 012c0953d1803e4e3f6a0c2183d22dd2_JaffaCakes118.exe HelpMe.exe PID 2184 wrote to memory of 2188 2184 012c0953d1803e4e3f6a0c2183d22dd2_JaffaCakes118.exe HelpMe.exe PID 2184 wrote to memory of 2188 2184 012c0953d1803e4e3f6a0c2183d22dd2_JaffaCakes118.exe HelpMe.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\012c0953d1803e4e3f6a0c2183d22dd2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\012c0953d1803e4e3f6a0c2183d22dd2_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\$Recycle.Bin\S-1-5-21-2721934792-624042501-2768869379-1000\desktop.ini.exeFilesize
3.8MB
MD57f7096c0968814c1aef45e89387c06e3
SHA1f109d803920667fefb8e1ae93101e18f8fe9c9f0
SHA256847609b3e8bbb2d75f01cc4cfff44487ede21b0d926f772f72b8935232180b7f
SHA5128dca6a2866c55db021a5428ee93cdca204f33150f025c738886aa310d83af299cc1ff9c9314a5d114a3d098ac81d50ae621f094056695f973b655ccd6ecf2072
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnkFilesize
1KB
MD522b624a6792289c96ec5e7d64b33a5e9
SHA1d053fed93d04285816c4ff02a8e5023a92426a10
SHA256f1fbde16f580696eb19e868fb870b861bb010be4fc3d22ae01ccd79b23efb8b5
SHA512bf9373cc1b6cf939f2f7631a1910c279b83c854247bbb94872c5c1627c14ae8a2ecadd64dc387f5a3a4217f5d4c1bdbf313bb6cdf8ba957358898660e18df313
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnkMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnkFilesize
950B
MD5533fe43da1a1567cdcbeacddd33f3a31
SHA153c295918b4cee0ed7672bbea348c29299112e4a
SHA2564ba13b5005b3354da5741bd547fbc8481f9a9971c77da1fea3a8e82e23d2ba1f
SHA512bd4ac1edb6438c6d4f9f76561d1224375a8da4b01028d542851c8a899a786d04550cbb84f7f53e5427171d533d087ebe0611e14bb90bfbdfd01612091a4fc288
-
F:\AUTORUN.INFFilesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
F:\AutoRun.exeFilesize
3.8MB
MD5012c0953d1803e4e3f6a0c2183d22dd2
SHA1f37b8d2be55a81475cb90288d8f3b0b7e7f322c3
SHA25681aa4fa2f5b0c027e5939a1615929cf4d58db3ccf38744ad06d6e7f85a2a85f9
SHA512121d6d049e5c0d25e7d49c83d2b04c7ee6809371c40e9f26d0bec9167b95af6268c597d76e421f98e08ee3217422b5f6df911ac885a16dacd08f096b129f4b4d
-
\Windows\SysWOW64\HelpMe.exeFilesize
824KB
MD5a062adf2c5653be6edd524c00fa609a1
SHA10ecdaf9e4af5694bcbe80e8dfb00ff1572b5b6a5
SHA25663cc92096330f357c82dd835a123f76cecdccc1182b7fa1e7cc6f5678f0802bf
SHA5123c1d68d1518e587a96fe1bc9088d83aaaa8e0c63c1e2b2b55c742ca75f5629dbb5d58449e4c13329f04bbb0ab0a581d5f189131e8b91bf5e2333de0987ac92f3
-
memory/2184-0-0x0000000000400000-0x0000000000479000-memory.dmpFilesize
484KB
-
memory/2184-4-0x00000000002C0000-0x0000000000339000-memory.dmpFilesize
484KB
-
memory/2184-231-0x0000000000400000-0x0000000000479000-memory.dmpFilesize
484KB
-
memory/2184-1-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/2184-236-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/2184-241-0x00000000002C0000-0x0000000000339000-memory.dmpFilesize
484KB
-
memory/2188-13-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/2188-11-0x0000000000400000-0x0000000000479000-memory.dmpFilesize
484KB
-
memory/2188-242-0x0000000000400000-0x0000000000479000-memory.dmpFilesize
484KB