Analysis
-
max time kernel
146s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 03:11
Behavioral task
behavioral1
Sample
74b4197790c05e4a461b34890ac612adJaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
74b4197790c05e4a461b34890ac612adJaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
74b4197790c05e4a461b34890ac612adJaffaCakes118.exe
-
Size
846KB
-
MD5
74b4197790c05e4a461b34890ac612ad
-
SHA1
542c277e942fc652736c46a737322e67c3a9f625
-
SHA256
f0bf9b8f524ad885d87917008e1a24a7ac49a2dd51a277fd49981b428ad4fc0b
-
SHA512
92248926b48850b6ad9193fb9dfe714a06247f999b229506cdea04a181058a8884e22efe15235a92cb6d5ed8192277e1fbabaccbca0b334f5c02ff66211d61e8
-
SSDEEP
24576:ZMMpXS0hN0V0HoSySGB2uJ2s4otqFCJrW9FqvSbqsHasgXhFHDAGtlRXZ+CP63ny:Kwi0L0qlnNg
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" 74b4197790c05e4a461b34890ac612adJaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe -
Renames multiple (91) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral1/files/0x000e000000015a98-2.dat aspack_v212_v242 behavioral1/files/0x0008000000015c87-38.dat aspack_v212_v242 behavioral1/files/0x0001000000000026-62.dat aspack_v212_v242 -
Drops startup file 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 74b4197790c05e4a461b34890ac612adJaffaCakes118.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 74b4197790c05e4a461b34890ac612adJaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3004 HelpMe.exe -
Loads dropped DLL 2 IoCs
pid Process 2872 74b4197790c05e4a461b34890ac612adJaffaCakes118.exe 2872 74b4197790c05e4a461b34890ac612adJaffaCakes118.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: 74b4197790c05e4a461b34890ac612adJaffaCakes118.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\H: 74b4197790c05e4a461b34890ac612adJaffaCakes118.exe File opened (read-only) \??\L: 74b4197790c05e4a461b34890ac612adJaffaCakes118.exe File opened (read-only) \??\T: 74b4197790c05e4a461b34890ac612adJaffaCakes118.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\K: 74b4197790c05e4a461b34890ac612adJaffaCakes118.exe File opened (read-only) \??\Y: 74b4197790c05e4a461b34890ac612adJaffaCakes118.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\O: 74b4197790c05e4a461b34890ac612adJaffaCakes118.exe File opened (read-only) \??\S: 74b4197790c05e4a461b34890ac612adJaffaCakes118.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\N: 74b4197790c05e4a461b34890ac612adJaffaCakes118.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\M: 74b4197790c05e4a461b34890ac612adJaffaCakes118.exe File opened (read-only) \??\P: 74b4197790c05e4a461b34890ac612adJaffaCakes118.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\A: 74b4197790c05e4a461b34890ac612adJaffaCakes118.exe File opened (read-only) \??\B: 74b4197790c05e4a461b34890ac612adJaffaCakes118.exe File opened (read-only) \??\G: 74b4197790c05e4a461b34890ac612adJaffaCakes118.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\W: 74b4197790c05e4a461b34890ac612adJaffaCakes118.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\I: 74b4197790c05e4a461b34890ac612adJaffaCakes118.exe File opened (read-only) \??\Q: 74b4197790c05e4a461b34890ac612adJaffaCakes118.exe File opened (read-only) \??\V: 74b4197790c05e4a461b34890ac612adJaffaCakes118.exe File opened (read-only) \??\X: 74b4197790c05e4a461b34890ac612adJaffaCakes118.exe File opened (read-only) \??\Z: 74b4197790c05e4a461b34890ac612adJaffaCakes118.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\E: 74b4197790c05e4a461b34890ac612adJaffaCakes118.exe File opened (read-only) \??\J: 74b4197790c05e4a461b34890ac612adJaffaCakes118.exe File opened (read-only) \??\R: 74b4197790c05e4a461b34890ac612adJaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AUTORUN.INF 74b4197790c05e4a461b34890ac612adJaffaCakes118.exe File opened for modification C:\AUTORUN.INF 74b4197790c05e4a461b34890ac612adJaffaCakes118.exe File opened for modification F:\AUTORUN.INF HelpMe.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe 74b4197790c05e4a461b34890ac612adJaffaCakes118.exe File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 3004 2872 74b4197790c05e4a461b34890ac612adJaffaCakes118.exe 28 PID 2872 wrote to memory of 3004 2872 74b4197790c05e4a461b34890ac612adJaffaCakes118.exe 28 PID 2872 wrote to memory of 3004 2872 74b4197790c05e4a461b34890ac612adJaffaCakes118.exe 28 PID 2872 wrote to memory of 3004 2872 74b4197790c05e4a461b34890ac612adJaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\74b4197790c05e4a461b34890ac612adJaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\74b4197790c05e4a461b34890ac612adJaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
PID:3004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
846KB
MD51013dd56f4f97c59397e957e06d02c44
SHA125e564a117b28d99186d384740f5ecd64ffbab3d
SHA25616a3746099cb844378c53d7420704e15a8489e23c3f0b3f0f174e01aa78d9c81
SHA512d0605817a0b29825197b3b3dfafe179c969435c99d71016ac9af0ccd5bf0aed21319f4bef0a6d8d5b94097e751c6c94f60efd073b8118738c7ba57d5045aa15f
-
Filesize
950B
MD5f7ba8b8ab6ce09e6f0017e808fc14309
SHA1f3aa1f3a9c5936a3312a9026d5b01a212380f7be
SHA25693f7061225ffcff1c82f63511f9f688163fb00b16e84048ae21739a2fe6be465
SHA5123bce8d72ffaae7d86a940f217dfcb2ca519f457a69a59bf13e873b925b1bce2bd40a535ed0f58527a7d6ca9109ea2889fb02ad8face8149a56397deb27484406
-
Filesize
1KB
MD50e8e7289964c01526e354cca7e603e01
SHA1952fd45d3455bd9633935ff2a238186612bb5372
SHA256850699dc9806eb2ff6a254a2fe262f184c0ea30f51ae49639394dca5025327e5
SHA512d50fa543510bf3d93f84d689149023921610c1b1f9f5f764b1dd10f16169a0b483ca827e23560a6a38a104ec09b35baf259bddb52600728243124e45ef7820f1
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
Filesize
846KB
MD574b4197790c05e4a461b34890ac612ad
SHA1542c277e942fc652736c46a737322e67c3a9f625
SHA256f0bf9b8f524ad885d87917008e1a24a7ac49a2dd51a277fd49981b428ad4fc0b
SHA51292248926b48850b6ad9193fb9dfe714a06247f999b229506cdea04a181058a8884e22efe15235a92cb6d5ed8192277e1fbabaccbca0b334f5c02ff66211d61e8
-
Filesize
685KB
MD50b372b84e45971e8a6b7c6acdc4ab9fa
SHA1b61c1b1c6148fb4e6f29285abc79677f51b4964a
SHA25629ad3d1f6dccb321c2eecb7b06e7317b15df76872694c5510e35221d8791b26c
SHA5120bae2bbb55505e725d686a00ef17099397463a79d5031009b715f287d3ca8022edbd18d4ba79cf400bbc87ab1dcb3da27362c1f044fbcc1834becc9c6477c022