Analysis

  • max time kernel
    145s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    11/05/2024, 21:23

General

  • Target

    369cf1eef95bfc2c400be90a1288b2f4_JaffaCakes118.exe

  • Size

    878KB

  • MD5

    369cf1eef95bfc2c400be90a1288b2f4

  • SHA1

    c51c5cf9205c7a0203dd212d8fe409d3cc622c64

  • SHA256

    04457ffd43e4c864a0320e24b216d5ac2c1d6d854af4ef86f5094437b09a084b

  • SHA512

    ed994a202d3b0c2765b9c4c7744949e4ad3d890c875baed019a4e71f2aaa89d59b51e7e405c30feaf0a337c790f8978ab3196f6edfdc06064afdc8b98dd53808

  • SSDEEP

    24576:ZMMpXS0hN0V0HoSMMMpXS0hN0V0H0SGB2uJ2s4otqFCJrW9FqvSbqsHasgXhFHD9:Kwi0L0qlFwi0L0qp8

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Renames multiple (91) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • ASPack v2.12-2.42 3 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Drops startup file 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\369cf1eef95bfc2c400be90a1288b2f4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\369cf1eef95bfc2c400be90a1288b2f4_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops startup file
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Windows\SysWOW64\HelpMe.exe
      C:\Windows\system32\HelpMe.exe
      2⤵
      • Modifies WinLogon for persistence
      • Drops startup file
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops autorun.inf file
      • Drops file in System32 directory
      PID:2136

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-1298544033-3225604241-2703760938-1000\desktop.ini.exe

          Filesize

          879KB

          MD5

          3b06426dd5400d070391aa2bf56eca20

          SHA1

          c2520551bb2e32b86a2cbd03dcf41b626c294312

          SHA256

          a102d3a6926d8e42802f31f7b459cbe0602ece38d5c92a622e69081b60d2a756

          SHA512

          ea51332339982978aaa798df4200ee8e087545409442351ed3abf4d5b0570803b7ddfc75f285752dfb7ceddfa4bc4f32baca0906493e73cacf48a55a46855222

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

          Filesize

          1KB

          MD5

          0eea33d0646f310b4ae0314b5aaf86fc

          SHA1

          68acd368d4206768e3169b976a2feddf44221e85

          SHA256

          9f44889d3239472254374fbfb644f70912f9dcc2dfd16c1d190e57892674f9a4

          SHA512

          da957381ab97295844b8de90c9a903ffb44b9de859a1c6fd61ad4cb783085e317addf823fcdca396be4837eed6bc2a23beaa6e5f524cb9a87e9e69d91171c705

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

          Filesize

          954B

          MD5

          5f857da621fd62c43340f7ca9eaa88f9

          SHA1

          d4ea40d8c0479130986b8a42287a39b2b44946f4

          SHA256

          aaa9e719b8b5e7bff132667092ca8b4fec19aa2d832dc1891f8033cb3e2dc1ba

          SHA512

          6dae78b25eb2377430c3bf942b2981b3746febbe4dda1bfc5b2a698cf020aff4e89dab04ce6d79245d83536bbcf8befece61774252084efdc8222ef2c7922779

        • F:\AUTORUN.INF

          Filesize

          145B

          MD5

          ca13857b2fd3895a39f09d9dde3cca97

          SHA1

          8b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0

          SHA256

          cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae

          SHA512

          55e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47

        • F:\AutoRun.exe

          Filesize

          878KB

          MD5

          369cf1eef95bfc2c400be90a1288b2f4

          SHA1

          c51c5cf9205c7a0203dd212d8fe409d3cc622c64

          SHA256

          04457ffd43e4c864a0320e24b216d5ac2c1d6d854af4ef86f5094437b09a084b

          SHA512

          ed994a202d3b0c2765b9c4c7744949e4ad3d890c875baed019a4e71f2aaa89d59b51e7e405c30feaf0a337c790f8978ab3196f6edfdc06064afdc8b98dd53808

        • \Windows\SysWOW64\HelpMe.exe

          Filesize

          705KB

          MD5

          bcffb43a6afc5a21f7997705e8f450bb

          SHA1

          59fc4bfb0abfbdaa62e7469f1350e53ec0a03a32

          SHA256

          310eeeb1ecf6c8834da10049b5b48a887960f29345c5dfb37dd72234196a840f

          SHA512

          a892bb10f7b81f671dffa27c1de18be7ddcb7c29ece2b212b375c1639b6674a87e4dbfcbcd6f82d4238e4c51ad7183b47c73cff9951d9be385952d7da4399d20

        • memory/2136-263-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB

        • memory/2136-323-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB

        • memory/2136-229-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB

        • memory/2136-363-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB

        • memory/2136-239-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB

        • memory/2136-353-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB

        • memory/2136-241-0x0000000000240000-0x0000000000241000-memory.dmp

          Filesize

          4KB

        • memory/2136-9-0x0000000000240000-0x0000000000241000-memory.dmp

          Filesize

          4KB

        • memory/2136-343-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB

        • memory/2136-251-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB

        • memory/2136-331-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB

        • memory/2136-313-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB

        • memory/2136-303-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB

        • memory/2136-273-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB

        • memory/2136-293-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB

        • memory/2136-283-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB

        • memory/2188-330-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB

        • memory/2188-258-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB

        • memory/2188-302-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB

        • memory/2188-272-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB

        • memory/2188-312-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB

        • memory/2188-0-0x0000000000220000-0x0000000000221000-memory.dmp

          Filesize

          4KB

        • memory/2188-282-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB

        • memory/2188-228-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB

        • memory/2188-292-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB

        • memory/2188-322-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB

        • memory/2188-342-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB

        • memory/2188-250-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB

        • memory/2188-352-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB

        • memory/2188-238-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB

        • memory/2188-362-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB

        • memory/2188-240-0x0000000000220000-0x0000000000221000-memory.dmp

          Filesize

          4KB