Analysis
-
max time kernel
145s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 21:48
Static task
static1
Behavioral task
behavioral1
Sample
735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe
-
Size
873KB
-
MD5
735ae0b3e03f102ac38f6e5dfb8188a7
-
SHA1
f7d1ac0ed7f9b2507e06f20589b746631b07adf0
-
SHA256
7304580f4667c8beaa430ff265a32166c6451c94d51287949be37312cad1cfb6
-
SHA512
47ef3a839c0f23c6bbea5266238e832b57cced7509f2750936dd1e252cf9acd2d0bee44fbbea7a70562b0af8a4b1669bdacf39c20f532c8968fd6d04c6d26693
-
SSDEEP
24576:KEtl9mRda1ISGB2uJ2s4otqFCJrW9FqvSbqsHasgXhFHDAGtlRXZ+CP63n0NuJvS:BEs1lY
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe -
Renames multiple (93) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file 2 IoCs
Processes:
735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exedescription ioc process File opened (read-only) \??\L: 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File opened (read-only) \??\M: 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File opened (read-only) \??\O: 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File opened (read-only) \??\Q: 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File opened (read-only) \??\S: 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File opened (read-only) \??\B: 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File opened (read-only) \??\I: 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File opened (read-only) \??\J: 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File opened (read-only) \??\N: 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File opened (read-only) \??\Y: 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File opened (read-only) \??\Z: 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File opened (read-only) \??\E: 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File opened (read-only) \??\G: 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File opened (read-only) \??\V: 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File opened (read-only) \??\H: 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File opened (read-only) \??\U: 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File opened (read-only) \??\P: 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File opened (read-only) \??\R: 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File opened (read-only) \??\T: 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File opened (read-only) \??\W: 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File opened (read-only) \??\X: 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File opened (read-only) \??\A: 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File opened (read-only) \??\K: 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exedescription ioc process File opened for modification F:\AUTORUN.INF 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File opened for modification C:\AUTORUN.INF 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
Processes:
735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exedescription ioc process File created C:\Windows\SysWOW64\notepad.exe.exe 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File created C:\Windows\SysWOW64\HelpMe.exe 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\HelpMe.exe 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe -
Drops file in Program Files directory 1 IoCs
Processes:
735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exedescription ioc process File created C:\Program Files (x86)\Internet Explorer\iexplore.exe.exe 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exepid process 1248 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:1248
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
873KB
MD5f15205fc7e01291a383177c44623c903
SHA1e23c6d6abddcad9a7c8a039ff504cf9c362c9278
SHA256cfdaebaa10821301fb81f65c19e9e43f47b7e2bcf2931fb3877964d82273ba6f
SHA5125476fe7987b91b13b94ef80a52d87678e02b06a84c0be4a2cd8740aaff55468f1f17de5cbfb01ae6f85591866d0afe5a5fe83b2717a7bfe269d54296e8694d3a
-
Filesize
1.6MB
MD5250b1243d7c60d79079a1598932fb6e7
SHA1e6ccda63b0ad9721d51ac293297bde1ecedfe8db
SHA256b3807f778aa1e37853b162704ff2ca3bd4a607c019afc11a975d45b997535853
SHA5125e971cca5f697a6eac76af90ed20a1270f9a544b7aef3bb1c0437de67794669ec493bb8c03f9091ed13ec510a5848d142a264914153f15298c1fdaecce811bfe
-
Filesize
1KB
MD56a2cfa345d8a9d048189358a99bf1fc6
SHA1deeca308a7cd0f52e35a865a300136474983be21
SHA2565358b473c48095aa8e2cf4bceaa497f34ff1eebae904dfc91ed186b2ddd52d03
SHA51240860d2f67435fe7d30339ecb889bede891ea3944a030820748a6986947fbc6bbca84c0a8bc63337cef48bd5d6eaf6c31d9f9c22207741d82dab46b620931358
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47