Analysis

  • max time kernel
    145s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    01-08-2024 23:21

General

  • Target

    82218c42c0b0c726bc52fe1d36901cc9_JaffaCakes118.exe

  • Size

    2.8MB

  • MD5

    82218c42c0b0c726bc52fe1d36901cc9

  • SHA1

    dad33cc4e84c48ded034cc1bc58240c4ea46a115

  • SHA256

    7fe0c29468bc2390d320ae6d7af0e3727a5323e6b2e8d0b4f434a752388b23e2

  • SHA512

    94479bf2f9460188109c4803abe47d89a369fabad40def9ad102dfb5fa36c9cdac1a6bdc3a98477e54076604783526b0330c1e8f0e92a5ba4d2f898ee6d0d240

  • SSDEEP

    49152:DEs1ywi0L0qUB8NIMI8SfpwotkzaxcJ4kfxuO:DE2di0PIMzKpXOMg

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Renames multiple (91) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\82218c42c0b0c726bc52fe1d36901cc9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\82218c42c0b0c726bc52fe1d36901cc9_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops startup file
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:784
    • C:\Windows\SysWOW64\HelpMe.exe
      C:\Windows\system32\HelpMe.exe
      2⤵
      • Modifies WinLogon for persistence
      • Drops startup file
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops autorun.inf file
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      PID:1788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.exe

    Filesize

    2.8MB

    MD5

    cacd77de4c249fa3717144d7c769c350

    SHA1

    1ba8ee971befaa97b4a31e750068af3226dee0c3

    SHA256

    1e6c27774fb20c9ddc546de63ba6e86cdf0e3e06287682207e4a6825b0910e82

    SHA512

    a994b92f5eed1bafbe7ee507d6f85a29e5b8672e8596cc52218f955967faf0ba51affbb4731fde028eb9acdf486c45e873cb2572e23fbe21ce384a13e190e52c

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    1KB

    MD5

    d86deb22ca1b33a7648bfbf652eb0df1

    SHA1

    66a66b20a80266e03bf97478abf458ce2cc16319

    SHA256

    79d7202f9a94d7dec7599a62fec8f3e2493be9e602887d15172f474c5b527aa8

    SHA512

    49ff5145eb7c53c1b698e5799423b992167391c48425c31d444343f4fe7ff86fac8a7398cefa63f28e7604618e3f442c57aaed669ad8ae468b33e8ab3570dad9

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    954B

    MD5

    f5a7afe1bb11770d9bd30df944887db8

    SHA1

    bf151fb346627433cdcdc120f1c8c8b882ebdafd

    SHA256

    f05a4d18b11e18432b8e0023d923faa433d83a07c3da55d54c02d650e63c0ab9

    SHA512

    8de716384c49c0b91e8c5ccf5978f573394a49609d15627466d7767edea5d3e21b5a6ea57104cb471618aa746e8dfec414df8f61f990da5c062ed078bae7b845

  • F:\AUTORUN.INF

    Filesize

    145B

    MD5

    ca13857b2fd3895a39f09d9dde3cca97

    SHA1

    8b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0

    SHA256

    cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae

    SHA512

    55e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47

  • F:\AutoRun.exe

    Filesize

    2.8MB

    MD5

    82218c42c0b0c726bc52fe1d36901cc9

    SHA1

    dad33cc4e84c48ded034cc1bc58240c4ea46a115

    SHA256

    7fe0c29468bc2390d320ae6d7af0e3727a5323e6b2e8d0b4f434a752388b23e2

    SHA512

    94479bf2f9460188109c4803abe47d89a369fabad40def9ad102dfb5fa36c9cdac1a6bdc3a98477e54076604783526b0330c1e8f0e92a5ba4d2f898ee6d0d240

  • \Windows\SysWOW64\HelpMe.exe

    Filesize

    2.8MB

    MD5

    366a895382dfa1e19b9ae372e4f6866d

    SHA1

    c167f7de958f7ef00cfd7ff1ddbd71d73fee6c88

    SHA256

    8a533f8638ff5323555ad459b207049001797ca84e71db5c23512ccebde09e14

    SHA512

    38415c6ae96586ea6f675d2db579f38ec1aa55dc1419a7f1cef0951ae62943e3eedd796fd31ed986e2324ebafbee59f53412977f3e4bd5c825e9dafaf78238fd

  • memory/784-1-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/1788-10-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB