Analysis
-
max time kernel
145s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 21:23
Behavioral task
behavioral1
Sample
369cf1eef95bfc2c400be90a1288b2f4_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
369cf1eef95bfc2c400be90a1288b2f4_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
369cf1eef95bfc2c400be90a1288b2f4_JaffaCakes118.exe
-
Size
878KB
-
MD5
369cf1eef95bfc2c400be90a1288b2f4
-
SHA1
c51c5cf9205c7a0203dd212d8fe409d3cc622c64
-
SHA256
04457ffd43e4c864a0320e24b216d5ac2c1d6d854af4ef86f5094437b09a084b
-
SHA512
ed994a202d3b0c2765b9c4c7744949e4ad3d890c875baed019a4e71f2aaa89d59b51e7e405c30feaf0a337c790f8978ab3196f6edfdc06064afdc8b98dd53808
-
SSDEEP
24576:ZMMpXS0hN0V0HoSMMMpXS0hN0V0H0SGB2uJ2s4otqFCJrW9FqvSbqsHasgXhFHD9:Kwi0L0qlFwi0L0qp8
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" 369cf1eef95bfc2c400be90a1288b2f4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe -
Renames multiple (91) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral1/files/0x000b000000012257-2.dat aspack_v212_v242 behavioral1/files/0x0008000000015d87-38.dat aspack_v212_v242 behavioral1/files/0x0001000000000026-61.dat aspack_v212_v242 -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 369cf1eef95bfc2c400be90a1288b2f4_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 369cf1eef95bfc2c400be90a1288b2f4_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2136 HelpMe.exe -
Loads dropped DLL 2 IoCs
pid Process 2188 369cf1eef95bfc2c400be90a1288b2f4_JaffaCakes118.exe 2188 369cf1eef95bfc2c400be90a1288b2f4_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\H: 369cf1eef95bfc2c400be90a1288b2f4_JaffaCakes118.exe File opened (read-only) \??\I: 369cf1eef95bfc2c400be90a1288b2f4_JaffaCakes118.exe File opened (read-only) \??\R: 369cf1eef95bfc2c400be90a1288b2f4_JaffaCakes118.exe File opened (read-only) \??\T: 369cf1eef95bfc2c400be90a1288b2f4_JaffaCakes118.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\A: 369cf1eef95bfc2c400be90a1288b2f4_JaffaCakes118.exe File opened (read-only) \??\E: 369cf1eef95bfc2c400be90a1288b2f4_JaffaCakes118.exe File opened (read-only) \??\O: 369cf1eef95bfc2c400be90a1288b2f4_JaffaCakes118.exe File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\K: 369cf1eef95bfc2c400be90a1288b2f4_JaffaCakes118.exe File opened (read-only) \??\N: 369cf1eef95bfc2c400be90a1288b2f4_JaffaCakes118.exe File opened (read-only) \??\S: 369cf1eef95bfc2c400be90a1288b2f4_JaffaCakes118.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\L: 369cf1eef95bfc2c400be90a1288b2f4_JaffaCakes118.exe File opened (read-only) \??\Q: 369cf1eef95bfc2c400be90a1288b2f4_JaffaCakes118.exe File opened (read-only) \??\Y: 369cf1eef95bfc2c400be90a1288b2f4_JaffaCakes118.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\G: 369cf1eef95bfc2c400be90a1288b2f4_JaffaCakes118.exe File opened (read-only) \??\U: 369cf1eef95bfc2c400be90a1288b2f4_JaffaCakes118.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\Z: 369cf1eef95bfc2c400be90a1288b2f4_JaffaCakes118.exe File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\V: 369cf1eef95bfc2c400be90a1288b2f4_JaffaCakes118.exe File opened (read-only) \??\W: 369cf1eef95bfc2c400be90a1288b2f4_JaffaCakes118.exe File opened (read-only) \??\X: 369cf1eef95bfc2c400be90a1288b2f4_JaffaCakes118.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\B: 369cf1eef95bfc2c400be90a1288b2f4_JaffaCakes118.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\J: 369cf1eef95bfc2c400be90a1288b2f4_JaffaCakes118.exe File opened (read-only) \??\M: 369cf1eef95bfc2c400be90a1288b2f4_JaffaCakes118.exe File opened (read-only) \??\P: 369cf1eef95bfc2c400be90a1288b2f4_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AUTORUN.INF 369cf1eef95bfc2c400be90a1288b2f4_JaffaCakes118.exe File opened for modification C:\AUTORUN.INF 369cf1eef95bfc2c400be90a1288b2f4_JaffaCakes118.exe File opened for modification F:\AUTORUN.INF HelpMe.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe 369cf1eef95bfc2c400be90a1288b2f4_JaffaCakes118.exe File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2136 2188 369cf1eef95bfc2c400be90a1288b2f4_JaffaCakes118.exe 28 PID 2188 wrote to memory of 2136 2188 369cf1eef95bfc2c400be90a1288b2f4_JaffaCakes118.exe 28 PID 2188 wrote to memory of 2136 2188 369cf1eef95bfc2c400be90a1288b2f4_JaffaCakes118.exe 28 PID 2188 wrote to memory of 2136 2188 369cf1eef95bfc2c400be90a1288b2f4_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\369cf1eef95bfc2c400be90a1288b2f4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\369cf1eef95bfc2c400be90a1288b2f4_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
PID:2136
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
879KB
MD53b06426dd5400d070391aa2bf56eca20
SHA1c2520551bb2e32b86a2cbd03dcf41b626c294312
SHA256a102d3a6926d8e42802f31f7b459cbe0602ece38d5c92a622e69081b60d2a756
SHA512ea51332339982978aaa798df4200ee8e087545409442351ed3abf4d5b0570803b7ddfc75f285752dfb7ceddfa4bc4f32baca0906493e73cacf48a55a46855222
-
Filesize
1KB
MD50eea33d0646f310b4ae0314b5aaf86fc
SHA168acd368d4206768e3169b976a2feddf44221e85
SHA2569f44889d3239472254374fbfb644f70912f9dcc2dfd16c1d190e57892674f9a4
SHA512da957381ab97295844b8de90c9a903ffb44b9de859a1c6fd61ad4cb783085e317addf823fcdca396be4837eed6bc2a23beaa6e5f524cb9a87e9e69d91171c705
-
Filesize
954B
MD55f857da621fd62c43340f7ca9eaa88f9
SHA1d4ea40d8c0479130986b8a42287a39b2b44946f4
SHA256aaa9e719b8b5e7bff132667092ca8b4fec19aa2d832dc1891f8033cb3e2dc1ba
SHA5126dae78b25eb2377430c3bf942b2981b3746febbe4dda1bfc5b2a698cf020aff4e89dab04ce6d79245d83536bbcf8befece61774252084efdc8222ef2c7922779
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
Filesize
878KB
MD5369cf1eef95bfc2c400be90a1288b2f4
SHA1c51c5cf9205c7a0203dd212d8fe409d3cc622c64
SHA25604457ffd43e4c864a0320e24b216d5ac2c1d6d854af4ef86f5094437b09a084b
SHA512ed994a202d3b0c2765b9c4c7744949e4ad3d890c875baed019a4e71f2aaa89d59b51e7e405c30feaf0a337c790f8978ab3196f6edfdc06064afdc8b98dd53808
-
Filesize
705KB
MD5bcffb43a6afc5a21f7997705e8f450bb
SHA159fc4bfb0abfbdaa62e7469f1350e53ec0a03a32
SHA256310eeeb1ecf6c8834da10049b5b48a887960f29345c5dfb37dd72234196a840f
SHA512a892bb10f7b81f671dffa27c1de18be7ddcb7c29ece2b212b375c1639b6674a87e4dbfcbcd6f82d4238e4c51ad7183b47c73cff9951d9be385952d7da4399d20