Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 02:08
Static task
static1
Behavioral task
behavioral1
Sample
696647054432c3ddafefffa7e192c0d8_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
696647054432c3ddafefffa7e192c0d8_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
696647054432c3ddafefffa7e192c0d8_JaffaCakes118.exe
-
Size
624KB
-
MD5
696647054432c3ddafefffa7e192c0d8
-
SHA1
e042f232e5aba808b162e936289f937e5d7afa9f
-
SHA256
58a0d0fd2be14203b98dc53efa802bc199f6b83f1bce6847d4019261589306d7
-
SHA512
2d492eecbc4d797719f3ffad2cbb78bb7edac1b04a66da3af746ccce53e6420d5c0358663096c34785095fb9a33502cfc9b643e2f8bb2a5b5699e6af753af138
-
SSDEEP
12288:wp4pNfz3ymJnJ8QCFkxCaQTOl2+x5GpX/U:KEtl9mRda1T5GJ/U
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
HelpMe.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe -
Drops startup file 2 IoCs
Processes:
HelpMe.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe -
Executes dropped EXE 1 IoCs
Processes:
HelpMe.exepid process 2440 HelpMe.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
HelpMe.exedescription ioc process File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\Z: HelpMe.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
HelpMe.exedescription ioc process File opened for modification F:\AUTORUN.INF HelpMe.exe File opened for modification C:\AUTORUN.INF HelpMe.exe -
Drops file in System32 directory 6 IoCs
Processes:
HelpMe.exe696647054432c3ddafefffa7e192c0d8_JaffaCakes118.exedescription ioc process File opened for modification C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe File created C:\Windows\SysWOW64\notepad.exe.exe HelpMe.exe File opened for modification C:\Windows\SysWOW64\HelpMe.exe 696647054432c3ddafefffa7e192c0d8_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\notepad.exe.exe 696647054432c3ddafefffa7e192c0d8_JaffaCakes118.exe File created C:\Windows\SysWOW64\HelpMe.exe 696647054432c3ddafefffa7e192c0d8_JaffaCakes118.exe File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe -
Drops file in Program Files directory 2 IoCs
Processes:
HelpMe.exe696647054432c3ddafefffa7e192c0d8_JaffaCakes118.exedescription ioc process File created C:\Program Files (x86)\Internet Explorer\iexplore.exe.exe HelpMe.exe File opened for modification C:\Program Files (x86)\Internet Explorer\iexplore.exe.exe 696647054432c3ddafefffa7e192c0d8_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
HelpMe.exe696647054432c3ddafefffa7e192c0d8_JaffaCakes118.exepid process 2440 HelpMe.exe 2440 HelpMe.exe 5012 696647054432c3ddafefffa7e192c0d8_JaffaCakes118.exe 5012 696647054432c3ddafefffa7e192c0d8_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
696647054432c3ddafefffa7e192c0d8_JaffaCakes118.exedescription pid process target process PID 5012 wrote to memory of 2440 5012 696647054432c3ddafefffa7e192c0d8_JaffaCakes118.exe HelpMe.exe PID 5012 wrote to memory of 2440 5012 696647054432c3ddafefffa7e192c0d8_JaffaCakes118.exe HelpMe.exe PID 5012 wrote to memory of 2440 5012 696647054432c3ddafefffa7e192c0d8_JaffaCakes118.exe HelpMe.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\696647054432c3ddafefffa7e192c0d8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\696647054432c3ddafefffa7e192c0d8_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:2440
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4364,i,5047420736443372512,9747851268033796534,262144 --variations-seed-version --mojo-platform-channel-handle=4316 /prefetch:81⤵PID:4824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
448KB
MD5a34f3532de4f2579a75769ff43d85b45
SHA11f2d7728ed5e4d7c09240552f72bd8e4c46bb4d8
SHA256fadd8a7bd20af267874ed77a6a872ef1b61a5b1a8f84a5f3895145a621220f22
SHA512a820448c2cf7835b3fc17decc3959088bb7fb093d813ed91a1ef8b71a910668ff916856b55610d97a4da0e91b9e1c26cd3345aac8c54bbec6bbcf427b8e3fd2e
-
Filesize
1.4MB
MD5a90b356bf68360f87ad76949bedfc7f5
SHA12c3694f748c1c6b1f2acc371d76bb14f0168e27b
SHA256e79f33bb6c54d31d22cbbb8e620a4271bdb5f0ed15c428ef1b8ef9fdcfa243bf
SHA5126104f18324de260a74be34ed41d60d2199c9eb18a337bb6b6de10e62b9f0780ddc253a667cf453aa8e7d7f4739861cfc302b52b4fe8a504d2835da36ce9badfb
-
Filesize
1.4MB
MD5955362b6d26bef37d77a4d64e344bab9
SHA135d0f13d3293d26d127eb8d26d584c8fc03f4b66
SHA256f94784acf542adf824ce79c3edf4007690f1267d812325a7f1ab1dfcd78239e5
SHA512257bceba07e03d876fce40756fa5079f0efe0d3e9e24e3234070f045b0909b3e942e6fac1def970dd0ff7485bc0cce45503bfbeb323c444651b8f4c47f303284
-
Filesize
448KB
MD5f37584ccd558a8098f9f3d203c55e366
SHA151201251845b44270718be6f042faf618e79cbbe
SHA25658e2e26f1cbc51a7a47811ded83e6d5a724f9e8adf9b40ef1ac6f610d7a86a78
SHA512d468113c39a25fc04995cd688c5336f14140d9705b31207bd0318bb1afecfb91ae4240fac1ddf02bf74da9db102e2b57eb75ed8e517c4f20df523625d000f3ba
-
Filesize
786KB
MD551d7d39fe108488781d11a06cf3f24f0
SHA1f111ae20f51fc6f42ab17d37d7e5a90a1b0b6492
SHA256848c163fcde78475cc70b7710d08e28ebe0b81b56e559c14daa943cbb8f23a6c
SHA5128fd66886a334295d0d0c06ab846565ecd1858e0d50ec29ad71a2f33fd2107a6d372eb65dff72e130a119d3052d3645e0aa6bb19810c70d6152ff7c9b12953b97
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47