Analysis
-
max time kernel
146s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 04:50
Behavioral task
behavioral1
Sample
69f6b8b5c9fd357f8b525d5b9a42c1a1JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
69f6b8b5c9fd357f8b525d5b9a42c1a1JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
69f6b8b5c9fd357f8b525d5b9a42c1a1JaffaCakes118.exe
-
Size
793KB
-
MD5
69f6b8b5c9fd357f8b525d5b9a42c1a1
-
SHA1
166521f50eaa4e383cf88355f2c502703315217e
-
SHA256
69a72508098a148e77157803d53e32f2c5b1ff1e0a50a4a35c2a841e6c57ea70
-
SHA512
58116dd3dc193c015cbf0b6b6d580b0a2190e4000f852c7b9d8cd57297ab02b2e98346af0e5a60860fe19fca73542b968e8baa5a5691e4c26ae9045d38ade40c
-
SSDEEP
24576:ZMMpXS0hN0V0HoSMMMpXS0hN0V0HoSeSGB2uJ2s4otqFCJrW9FqvSbqsHasgXhFW:Kwi0L0qlFwi0L0qlLn
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
69f6b8b5c9fd357f8b525d5b9a42c1a1JaffaCakes118.exeHelpMe.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" 69f6b8b5c9fd357f8b525d5b9a42c1a1JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe -
Renames multiple (91) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Processes:
resource yara_rule \Windows\SysWOW64\HelpMe.exe aspack_v212_v242 C:\$Recycle.Bin\S-1-5-21-330940541-141609230-1670313778-1000\desktop.ini.exe aspack_v212_v242 F:\AutoRun.exe aspack_v212_v242 -
Drops startup file 3 IoCs
Processes:
HelpMe.exe69f6b8b5c9fd357f8b525d5b9a42c1a1JaffaCakes118.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 69f6b8b5c9fd357f8b525d5b9a42c1a1JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
Processes:
HelpMe.exepid process 2076 HelpMe.exe -
Loads dropped DLL 2 IoCs
Processes:
69f6b8b5c9fd357f8b525d5b9a42c1a1JaffaCakes118.exepid process 2292 69f6b8b5c9fd357f8b525d5b9a42c1a1JaffaCakes118.exe 2292 69f6b8b5c9fd357f8b525d5b9a42c1a1JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
69f6b8b5c9fd357f8b525d5b9a42c1a1JaffaCakes118.exeHelpMe.exedescription ioc process File opened (read-only) \??\Y: 69f6b8b5c9fd357f8b525d5b9a42c1a1JaffaCakes118.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\K: 69f6b8b5c9fd357f8b525d5b9a42c1a1JaffaCakes118.exe File opened (read-only) \??\M: 69f6b8b5c9fd357f8b525d5b9a42c1a1JaffaCakes118.exe File opened (read-only) \??\N: 69f6b8b5c9fd357f8b525d5b9a42c1a1JaffaCakes118.exe File opened (read-only) \??\W: 69f6b8b5c9fd357f8b525d5b9a42c1a1JaffaCakes118.exe File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\H: 69f6b8b5c9fd357f8b525d5b9a42c1a1JaffaCakes118.exe File opened (read-only) \??\O: 69f6b8b5c9fd357f8b525d5b9a42c1a1JaffaCakes118.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\R: 69f6b8b5c9fd357f8b525d5b9a42c1a1JaffaCakes118.exe File opened (read-only) \??\U: 69f6b8b5c9fd357f8b525d5b9a42c1a1JaffaCakes118.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\B: 69f6b8b5c9fd357f8b525d5b9a42c1a1JaffaCakes118.exe File opened (read-only) \??\J: 69f6b8b5c9fd357f8b525d5b9a42c1a1JaffaCakes118.exe File opened (read-only) \??\L: 69f6b8b5c9fd357f8b525d5b9a42c1a1JaffaCakes118.exe File opened (read-only) \??\P: 69f6b8b5c9fd357f8b525d5b9a42c1a1JaffaCakes118.exe File opened (read-only) \??\Z: 69f6b8b5c9fd357f8b525d5b9a42c1a1JaffaCakes118.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\A: 69f6b8b5c9fd357f8b525d5b9a42c1a1JaffaCakes118.exe File opened (read-only) \??\E: 69f6b8b5c9fd357f8b525d5b9a42c1a1JaffaCakes118.exe File opened (read-only) \??\I: 69f6b8b5c9fd357f8b525d5b9a42c1a1JaffaCakes118.exe File opened (read-only) \??\T: 69f6b8b5c9fd357f8b525d5b9a42c1a1JaffaCakes118.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\G: 69f6b8b5c9fd357f8b525d5b9a42c1a1JaffaCakes118.exe File opened (read-only) \??\Q: 69f6b8b5c9fd357f8b525d5b9a42c1a1JaffaCakes118.exe File opened (read-only) \??\X: 69f6b8b5c9fd357f8b525d5b9a42c1a1JaffaCakes118.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\S: 69f6b8b5c9fd357f8b525d5b9a42c1a1JaffaCakes118.exe File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\V: 69f6b8b5c9fd357f8b525d5b9a42c1a1JaffaCakes118.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\U: HelpMe.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
69f6b8b5c9fd357f8b525d5b9a42c1a1JaffaCakes118.exeHelpMe.exedescription ioc process File opened for modification F:\AUTORUN.INF 69f6b8b5c9fd357f8b525d5b9a42c1a1JaffaCakes118.exe File opened for modification C:\AUTORUN.INF 69f6b8b5c9fd357f8b525d5b9a42c1a1JaffaCakes118.exe File opened for modification F:\AUTORUN.INF HelpMe.exe -
Drops file in System32 directory 2 IoCs
Processes:
69f6b8b5c9fd357f8b525d5b9a42c1a1JaffaCakes118.exeHelpMe.exedescription ioc process File created C:\Windows\SysWOW64\HelpMe.exe 69f6b8b5c9fd357f8b525d5b9a42c1a1JaffaCakes118.exe File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
69f6b8b5c9fd357f8b525d5b9a42c1a1JaffaCakes118.exedescription pid process target process PID 2292 wrote to memory of 2076 2292 69f6b8b5c9fd357f8b525d5b9a42c1a1JaffaCakes118.exe HelpMe.exe PID 2292 wrote to memory of 2076 2292 69f6b8b5c9fd357f8b525d5b9a42c1a1JaffaCakes118.exe HelpMe.exe PID 2292 wrote to memory of 2076 2292 69f6b8b5c9fd357f8b525d5b9a42c1a1JaffaCakes118.exe HelpMe.exe PID 2292 wrote to memory of 2076 2292 69f6b8b5c9fd357f8b525d5b9a42c1a1JaffaCakes118.exe HelpMe.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\69f6b8b5c9fd357f8b525d5b9a42c1a1JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\69f6b8b5c9fd357f8b525d5b9a42c1a1JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
PID:2076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
794KB
MD5e858864c508b552e9d1c5c2e00c4c032
SHA11757db41eb0607ce118be91c6d9af847c99794c2
SHA256589f6c2f3eae065a843bf059f59afb321ad0accb52a093e221ed725ba50a13c1
SHA51215c01ae0b5be56fae25c386a2ddfa450d5f413bb80bd402c9933578bfb71b5e29f63c975005abc26f13cbd872e27549de53c73e5c4ef9b015acc4839ab1d58e0
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
1KB
MD5610649b93eb5b00187d671642438c557
SHA1faae3de1738b6f639c8d8c7bae6b926abe75417d
SHA2564886f381b93be490f999ada29d192d6ce9a1ffaab72992d84ea6eb940dbcc5de
SHA5122f5b5c852e04a0ec1233b2593868139cf36a8c7d28f16615541a17fb78d4a841170d9be794f5eec62727602ccd32517f37280d610fc5bacaa49b24be8260525f
-
Filesize
950B
MD5861b2a4ffa452248422b29565bd00438
SHA1f72a835c00f0c49086df37964ddaed17a1cf29fa
SHA25602b9da5b0a5b6bfc805d2a2733051fffe61f8ad34556fefff91524772812e21e
SHA5122338fd75e868d85c7bace9c9addceed1a3b9baf28d8b83c7aecac1cd5c762bae7bbc1ecde7832f2eb4ded4cc0a915f9ec352f6c822be5cf331cfa86578bada4e
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
Filesize
793KB
MD569f6b8b5c9fd357f8b525d5b9a42c1a1
SHA1166521f50eaa4e383cf88355f2c502703315217e
SHA25669a72508098a148e77157803d53e32f2c5b1ff1e0a50a4a35c2a841e6c57ea70
SHA51258116dd3dc193c015cbf0b6b6d580b0a2190e4000f852c7b9d8cd57297ab02b2e98346af0e5a60860fe19fca73542b968e8baa5a5691e4c26ae9045d38ade40c
-
Filesize
793KB
MD5f9d945eb5aebb6bf6e63bbb5da01f79b
SHA141c9158406cf5ec061f51f0cc4d347bbc3ec6187
SHA25658f465b3158e4e0789488a6cc83d06833e3972c5d432574689d92a7af7bf7111
SHA512210383b810b6b4980d39dce77f3e39824511b6aff0cac50d3f86cd3d48783cebf9bb959c727403da9360682be2c2de446604d7f64bfe34c84f5cb442db5fdf51