Analysis
-
max time kernel
145s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 04:52
Behavioral task
behavioral1
Sample
c83ff2cf7429c5d2db5ffc3b6c726513_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c83ff2cf7429c5d2db5ffc3b6c726513_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c83ff2cf7429c5d2db5ffc3b6c726513_JaffaCakes118.exe
-
Size
818KB
-
MD5
c83ff2cf7429c5d2db5ffc3b6c726513
-
SHA1
32ff2329f2008b19c412d3ff1713d6e21d214089
-
SHA256
34f3b58d67b44aade2d2cf60f95bfd99bf63e4ef182422d146caaf5bc0d7df54
-
SHA512
9084757a71f3fb4860c3f54d705bbb041f1264758707aee155543f333d968f1069845287137b4b413b7195edae9496f43bce4fb5db1e8afe1425687b5f78d951
-
SSDEEP
24576:ZMMpXS0hN0V0HZSGB2uJ2s4otqFCJrW9FqvSbqsHasgXhFHDAGtlRXZ+CP63n0NW:Kwi0L0qkP
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" c83ff2cf7429c5d2db5ffc3b6c726513_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe -
Renames multiple (91) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral1/files/0x00070000000120fd-2.dat aspack_v212_v242 behavioral1/files/0x0008000000016d3f-38.dat aspack_v212_v242 behavioral1/files/0x0001000000000026-55.dat aspack_v212_v242 -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk c83ff2cf7429c5d2db5ffc3b6c726513_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk c83ff2cf7429c5d2db5ffc3b6c726513_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2176 HelpMe.exe -
Loads dropped DLL 2 IoCs
pid Process 3068 c83ff2cf7429c5d2db5ffc3b6c726513_JaffaCakes118.exe 3068 c83ff2cf7429c5d2db5ffc3b6c726513_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: c83ff2cf7429c5d2db5ffc3b6c726513_JaffaCakes118.exe File opened (read-only) \??\X: c83ff2cf7429c5d2db5ffc3b6c726513_JaffaCakes118.exe File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\A: c83ff2cf7429c5d2db5ffc3b6c726513_JaffaCakes118.exe File opened (read-only) \??\B: c83ff2cf7429c5d2db5ffc3b6c726513_JaffaCakes118.exe File opened (read-only) \??\H: c83ff2cf7429c5d2db5ffc3b6c726513_JaffaCakes118.exe File opened (read-only) \??\J: c83ff2cf7429c5d2db5ffc3b6c726513_JaffaCakes118.exe File opened (read-only) \??\P: c83ff2cf7429c5d2db5ffc3b6c726513_JaffaCakes118.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\G: c83ff2cf7429c5d2db5ffc3b6c726513_JaffaCakes118.exe File opened (read-only) \??\O: c83ff2cf7429c5d2db5ffc3b6c726513_JaffaCakes118.exe File opened (read-only) \??\W: c83ff2cf7429c5d2db5ffc3b6c726513_JaffaCakes118.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\E: c83ff2cf7429c5d2db5ffc3b6c726513_JaffaCakes118.exe File opened (read-only) \??\Q: c83ff2cf7429c5d2db5ffc3b6c726513_JaffaCakes118.exe File opened (read-only) \??\T: c83ff2cf7429c5d2db5ffc3b6c726513_JaffaCakes118.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\N: c83ff2cf7429c5d2db5ffc3b6c726513_JaffaCakes118.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\I: c83ff2cf7429c5d2db5ffc3b6c726513_JaffaCakes118.exe File opened (read-only) \??\M: c83ff2cf7429c5d2db5ffc3b6c726513_JaffaCakes118.exe File opened (read-only) \??\R: c83ff2cf7429c5d2db5ffc3b6c726513_JaffaCakes118.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\K: c83ff2cf7429c5d2db5ffc3b6c726513_JaffaCakes118.exe File opened (read-only) \??\S: c83ff2cf7429c5d2db5ffc3b6c726513_JaffaCakes118.exe File opened (read-only) \??\Z: c83ff2cf7429c5d2db5ffc3b6c726513_JaffaCakes118.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\L: c83ff2cf7429c5d2db5ffc3b6c726513_JaffaCakes118.exe File opened (read-only) \??\V: c83ff2cf7429c5d2db5ffc3b6c726513_JaffaCakes118.exe File opened (read-only) \??\Y: c83ff2cf7429c5d2db5ffc3b6c726513_JaffaCakes118.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\L: HelpMe.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\AUTORUN.INF c83ff2cf7429c5d2db5ffc3b6c726513_JaffaCakes118.exe File opened for modification F:\AUTORUN.INF HelpMe.exe File opened for modification F:\AUTORUN.INF c83ff2cf7429c5d2db5ffc3b6c726513_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe File created C:\Windows\SysWOW64\HelpMe.exe c83ff2cf7429c5d2db5ffc3b6c726513_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c83ff2cf7429c5d2db5ffc3b6c726513_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HelpMe.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2176 3068 c83ff2cf7429c5d2db5ffc3b6c726513_JaffaCakes118.exe 30 PID 3068 wrote to memory of 2176 3068 c83ff2cf7429c5d2db5ffc3b6c726513_JaffaCakes118.exe 30 PID 3068 wrote to memory of 2176 3068 c83ff2cf7429c5d2db5ffc3b6c726513_JaffaCakes118.exe 30 PID 3068 wrote to memory of 2176 3068 c83ff2cf7429c5d2db5ffc3b6c726513_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c83ff2cf7429c5d2db5ffc3b6c726513_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c83ff2cf7429c5d2db5ffc3b6c726513_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
819KB
MD5fd639b283104fa9ff8bab75335d16b37
SHA1c5889a1d26bb16346f5a9ca87ce6d1b4dfa72b92
SHA25674561975cc4e703d6e092a6c4547c9378fc82f1861dd9652f57765a147539021
SHA51253d08d377959d47fbe236b51bc991635360d3bf843d8ae214f06ea7f71074e4be6414736ad9659a0022ae76e56622fb8dafb05a74211f3f9729e5fd022e84a4d
-
Filesize
1KB
MD54ffae8099a48b39cf951d5e278c3be99
SHA1565f8ee631a411151a38a8c0ebb5eca0a93a4912
SHA256f35a33878d434cf675f452120809f160a7c3741bf0863c237c937e59f0d9d02d
SHA5129f74ab9c9623978a798bb38666de093800db8a0418cb1c517eba2aa6a423fc8c7a6c2405f60f6a05688667cef9eca90a184f6a193bafb330abf1c7350c70b3a2
-
Filesize
954B
MD564dba21c99a1eb99ec8dbc603cbb8fca
SHA197dff90aeb3e3542720269503597aeb942eec7f6
SHA2562055cdb4b739b1c66c7d8695c3df7048ad7fab2ee92f6c0fee877e2e324307a0
SHA512a341b9e3b1a9a502338b85718acc44d8975f1b67079b88b14be5dc4c34d0bad2a8b9704903fa8d3d6aeedb618db1cfc0d118833c19b19c033ba58d57f2369ed0
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
Filesize
818KB
MD5c83ff2cf7429c5d2db5ffc3b6c726513
SHA132ff2329f2008b19c412d3ff1713d6e21d214089
SHA25634f3b58d67b44aade2d2cf60f95bfd99bf63e4ef182422d146caaf5bc0d7df54
SHA5129084757a71f3fb4860c3f54d705bbb041f1264758707aee155543f333d968f1069845287137b4b413b7195edae9496f43bce4fb5db1e8afe1425687b5f78d951
-
Filesize
758KB
MD5d2febb0390ad878b8dc51203ccb4ab22
SHA1cd9a33afab8ff3301cba08719f07e45367482e5c
SHA25633b54e1d22649cade49744e15bca9f56b1afd088764eb224e10f330560a443fc
SHA512ed83cd0816ce8660709254f61b9f05b4de25816d1d92c6e9d27dbade3b85b7d5801116fa745de8907af31145c8b608e3abdcac876c976fe1c393cb05f7ace55b