Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13-07-2024 02:38
Static task
static1
Behavioral task
behavioral1
Sample
3fdbd3c0f5ec84cedd3dd6ae28272a6b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3fdbd3c0f5ec84cedd3dd6ae28272a6b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3fdbd3c0f5ec84cedd3dd6ae28272a6b_JaffaCakes118.exe
-
Size
227KB
-
MD5
3fdbd3c0f5ec84cedd3dd6ae28272a6b
-
SHA1
35bd6e15e934d823aa88161305e0fd0b2b8246c7
-
SHA256
ffe8d0f6e580bab31998dab11574c92c7f74c2db53867b716c41ee27da361466
-
SHA512
5e9cea8ed7005b628c860f9459cbf476de5590586266985781dd5cb91e4e1a7aeb5f4873b33ff08946508f22c96e7d5fca6df17156fd6685b7aee264bd0609d2
-
SSDEEP
3072:F/uSnUuEgbB3cTlji/6GYCPo9A3SzijvW//qY5RQmrS3ri0bn:9bB3j/67CQ2+N/Cmp+3W0L
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation HelpMe.exe -
Executes dropped EXE 2 IoCs
pid Process 4564 HelpMe.exe 2452 pathname.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\pathname = "C:\\Windows\\system32\\pathname.exe" HelpMe.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\HelpMe.exe 3fdbd3c0f5ec84cedd3dd6ae28272a6b_JaffaCakes118.exe File created C:\Windows\SysWOW64\pathname.exe HelpMe.exe File opened for modification C:\Windows\SysWOW64\pathname.exe HelpMe.exe File created C:\Windows\SysWOW64\pathname.exe pathname.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2568 3fdbd3c0f5ec84cedd3dd6ae28272a6b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2568 wrote to memory of 4564 2568 3fdbd3c0f5ec84cedd3dd6ae28272a6b_JaffaCakes118.exe 86 PID 2568 wrote to memory of 4564 2568 3fdbd3c0f5ec84cedd3dd6ae28272a6b_JaffaCakes118.exe 86 PID 2568 wrote to memory of 4564 2568 3fdbd3c0f5ec84cedd3dd6ae28272a6b_JaffaCakes118.exe 86 PID 4564 wrote to memory of 2452 4564 HelpMe.exe 89 PID 4564 wrote to memory of 2452 4564 HelpMe.exe 89 PID 4564 wrote to memory of 2452 4564 HelpMe.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\3fdbd3c0f5ec84cedd3dd6ae28272a6b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3fdbd3c0f5ec84cedd3dd6ae28272a6b_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\SysWOW64\pathname.exe"C:\Windows\system32\pathname.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2452
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
103KB
MD50c02e5b05b80bd1ecf038c4a0979a1d2
SHA151ad0c76c7b2b4cf82c256252b4a43bfb582cd7b
SHA2562568031ff9e4a14bd46210d98f6e599e1f918a331ff6a2e6c234b57728665676
SHA512febb63275a54d455548d64b37e98d9bae0e7ba4356561045af65acfded9058904c4ec2ce0bd1f9a5283415a806990087e772a22f4376b7b77ec18fd8f8cc707a