Analysis
-
max time kernel
145s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 02:08
Static task
static1
Behavioral task
behavioral1
Sample
696647054432c3ddafefffa7e192c0d8_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
696647054432c3ddafefffa7e192c0d8_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
696647054432c3ddafefffa7e192c0d8_JaffaCakes118.exe
-
Size
624KB
-
MD5
696647054432c3ddafefffa7e192c0d8
-
SHA1
e042f232e5aba808b162e936289f937e5d7afa9f
-
SHA256
58a0d0fd2be14203b98dc53efa802bc199f6b83f1bce6847d4019261589306d7
-
SHA512
2d492eecbc4d797719f3ffad2cbb78bb7edac1b04a66da3af746ccce53e6420d5c0358663096c34785095fb9a33502cfc9b643e2f8bb2a5b5699e6af753af138
-
SSDEEP
12288:wp4pNfz3ymJnJ8QCFkxCaQTOl2+x5GpX/U:KEtl9mRda1T5GJ/U
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
HelpMe.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe -
Renames multiple (93) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file 2 IoCs
Processes:
HelpMe.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe -
Executes dropped EXE 1 IoCs
Processes:
HelpMe.exepid process 1628 HelpMe.exe -
Loads dropped DLL 31 IoCs
Processes:
696647054432c3ddafefffa7e192c0d8_JaffaCakes118.exeHelpMe.exepid process 1180 696647054432c3ddafefffa7e192c0d8_JaffaCakes118.exe 1180 696647054432c3ddafefffa7e192c0d8_JaffaCakes118.exe 1628 HelpMe.exe 1628 HelpMe.exe 1628 HelpMe.exe 1628 HelpMe.exe 1628 HelpMe.exe 1628 HelpMe.exe 1628 HelpMe.exe 1628 HelpMe.exe 1628 HelpMe.exe 1628 HelpMe.exe 1628 HelpMe.exe 1628 HelpMe.exe 1628 HelpMe.exe 1628 HelpMe.exe 1628 HelpMe.exe 1628 HelpMe.exe 1628 HelpMe.exe 1628 HelpMe.exe 1628 HelpMe.exe 1628 HelpMe.exe 1628 HelpMe.exe 1628 HelpMe.exe 1628 HelpMe.exe 1628 HelpMe.exe 1628 HelpMe.exe 1628 HelpMe.exe 1628 HelpMe.exe 1628 HelpMe.exe 1628 HelpMe.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
HelpMe.exedescription ioc process File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\X: HelpMe.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
HelpMe.exedescription ioc process File opened for modification F:\AUTORUN.INF HelpMe.exe File opened for modification C:\AUTORUN.INF HelpMe.exe -
Drops file in System32 directory 6 IoCs
Processes:
696647054432c3ddafefffa7e192c0d8_JaffaCakes118.exeHelpMe.exedescription ioc process File created C:\Windows\SysWOW64\HelpMe.exe 696647054432c3ddafefffa7e192c0d8_JaffaCakes118.exe File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe File opened for modification C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe File created C:\Windows\SysWOW64\notepad.exe.exe HelpMe.exe File opened for modification C:\Windows\SysWOW64\HelpMe.exe 696647054432c3ddafefffa7e192c0d8_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\notepad.exe.exe 696647054432c3ddafefffa7e192c0d8_JaffaCakes118.exe -
Drops file in Program Files directory 2 IoCs
Processes:
696647054432c3ddafefffa7e192c0d8_JaffaCakes118.exeHelpMe.exedescription ioc process File opened for modification C:\Program Files (x86)\Internet Explorer\iexplore.exe.exe 696647054432c3ddafefffa7e192c0d8_JaffaCakes118.exe File created C:\Program Files (x86)\Internet Explorer\iexplore.exe.exe HelpMe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
HelpMe.exe696647054432c3ddafefffa7e192c0d8_JaffaCakes118.exepid process 1628 HelpMe.exe 1180 696647054432c3ddafefffa7e192c0d8_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
696647054432c3ddafefffa7e192c0d8_JaffaCakes118.exedescription pid process target process PID 1180 wrote to memory of 1628 1180 696647054432c3ddafefffa7e192c0d8_JaffaCakes118.exe HelpMe.exe PID 1180 wrote to memory of 1628 1180 696647054432c3ddafefffa7e192c0d8_JaffaCakes118.exe HelpMe.exe PID 1180 wrote to memory of 1628 1180 696647054432c3ddafefffa7e192c0d8_JaffaCakes118.exe HelpMe.exe PID 1180 wrote to memory of 1628 1180 696647054432c3ddafefffa7e192c0d8_JaffaCakes118.exe HelpMe.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\696647054432c3ddafefffa7e192c0d8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\696647054432c3ddafefffa7e192c0d8_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:1628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
448KB
MD51d602c38f5ff4006f112ef249e919b04
SHA1efb98e204a4a84d157c13922340b05a3faeac29f
SHA2563fa492d18fc035fe6f7b7dff8cf1e410c84779839bf81f1714f8e1a5993b7216
SHA512bc1e2748ae365b35da63280fc79cce2af94270591559dddf95c2b53bb5ab64fe5f1b6a34e2c1ecd470e892dfd02142bc7d8b4d98cd992bfbedf6b72e63d816cd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
950B
MD5ae90292f6383216dfb9fc442c6cd8cc5
SHA1c0803700a2f3eb056c4046ff2c87b0e0ea36e229
SHA2561af317ba1e95333c020d065e490b0e5e964e4fbc1c89fb6c04e52dd790d4f544
SHA512f5a9ebd4da92f798d33e85c81daf1b82cc387fda9ffe37d0293ad02a287e64b89229196440bdd6496293b9a253da1cd1ac1ec681233bf7353a959954e71d8ec7
-
Filesize
800KB
MD56e9936f7c03fb174a2c3932aa4ded0e0
SHA1ecf530456e87c8097caa4d3e691f12a2cbff44ea
SHA25658d1c5629e56dc07f924c4288c1b2e1f42d08583f8f7fa3b67d21198ffc7ae8e
SHA512fceef09840765d84c94f650f62c9d9032e72846581916a209074b730d0e8f893383d34e9886f555c980fe1a06052f5fce4df04491ff6b50a05b800d504034e00
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
Filesize
448KB
MD5f37584ccd558a8098f9f3d203c55e366
SHA151201251845b44270718be6f042faf618e79cbbe
SHA25658e2e26f1cbc51a7a47811ded83e6d5a724f9e8adf9b40ef1ac6f610d7a86a78
SHA512d468113c39a25fc04995cd688c5336f14140d9705b31207bd0318bb1afecfb91ae4240fac1ddf02bf74da9db102e2b57eb75ed8e517c4f20df523625d000f3ba