Analysis
-
max time kernel
145s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 22:59
Static task
static1
Behavioral task
behavioral1
Sample
ee98af6625db71981750d105c4950849_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ee98af6625db71981750d105c4950849_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ee98af6625db71981750d105c4950849_JaffaCakes118.exe
-
Size
991KB
-
MD5
ee98af6625db71981750d105c4950849
-
SHA1
a5a8d37ca219a08020c42c13b3fd0c615904e2e1
-
SHA256
ec4cd1b7ee4220b41cc739fdeafe4abef736b63942de482c2dac35bd5de7864d
-
SHA512
371e94baed164e451140c9c4f5c8774f85e387a1975c1fbfab509e126c74daa7b286e82a9da5d04ada78e8a148dac24c1d3b8b2f7db58caeed18f941fecb0de2
-
SSDEEP
24576:TEtl9mRda1cSGB2uJ2s4otqFCJrW9FqvSbqsHasgXhFHDAGtlRXZ+CP63n0NuJv7:oEs1h5
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" ee98af6625db71981750d105c4950849_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe -
Renames multiple (91) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk ee98af6625db71981750d105c4950849_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe -
Executes dropped EXE 1 IoCs
pid Process 2588 HelpMe.exe -
Loads dropped DLL 2 IoCs
pid Process 488 ee98af6625db71981750d105c4950849_JaffaCakes118.exe 488 ee98af6625db71981750d105c4950849_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\A: ee98af6625db71981750d105c4950849_JaffaCakes118.exe File opened (read-only) \??\E: ee98af6625db71981750d105c4950849_JaffaCakes118.exe File opened (read-only) \??\M: ee98af6625db71981750d105c4950849_JaffaCakes118.exe File opened (read-only) \??\Q: ee98af6625db71981750d105c4950849_JaffaCakes118.exe File opened (read-only) \??\S: ee98af6625db71981750d105c4950849_JaffaCakes118.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\L: ee98af6625db71981750d105c4950849_JaffaCakes118.exe File opened (read-only) \??\Z: ee98af6625db71981750d105c4950849_JaffaCakes118.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\B: ee98af6625db71981750d105c4950849_JaffaCakes118.exe File opened (read-only) \??\H: ee98af6625db71981750d105c4950849_JaffaCakes118.exe File opened (read-only) \??\O: ee98af6625db71981750d105c4950849_JaffaCakes118.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\I: ee98af6625db71981750d105c4950849_JaffaCakes118.exe File opened (read-only) \??\V: ee98af6625db71981750d105c4950849_JaffaCakes118.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\K: ee98af6625db71981750d105c4950849_JaffaCakes118.exe File opened (read-only) \??\N: ee98af6625db71981750d105c4950849_JaffaCakes118.exe File opened (read-only) \??\P: ee98af6625db71981750d105c4950849_JaffaCakes118.exe File opened (read-only) \??\W: ee98af6625db71981750d105c4950849_JaffaCakes118.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\G: ee98af6625db71981750d105c4950849_JaffaCakes118.exe File opened (read-only) \??\T: ee98af6625db71981750d105c4950849_JaffaCakes118.exe File opened (read-only) \??\U: ee98af6625db71981750d105c4950849_JaffaCakes118.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\J: ee98af6625db71981750d105c4950849_JaffaCakes118.exe File opened (read-only) \??\R: ee98af6625db71981750d105c4950849_JaffaCakes118.exe File opened (read-only) \??\X: ee98af6625db71981750d105c4950849_JaffaCakes118.exe File opened (read-only) \??\Y: ee98af6625db71981750d105c4950849_JaffaCakes118.exe File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\L: HelpMe.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AUTORUN.INF ee98af6625db71981750d105c4950849_JaffaCakes118.exe File opened for modification C:\AUTORUN.INF ee98af6625db71981750d105c4950849_JaffaCakes118.exe File opened for modification F:\AUTORUN.INF HelpMe.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe ee98af6625db71981750d105c4950849_JaffaCakes118.exe File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee98af6625db71981750d105c4950849_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HelpMe.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 488 wrote to memory of 2588 488 ee98af6625db71981750d105c4950849_JaffaCakes118.exe 29 PID 488 wrote to memory of 2588 488 ee98af6625db71981750d105c4950849_JaffaCakes118.exe 29 PID 488 wrote to memory of 2588 488 ee98af6625db71981750d105c4950849_JaffaCakes118.exe 29 PID 488 wrote to memory of 2588 488 ee98af6625db71981750d105c4950849_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee98af6625db71981750d105c4950849_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ee98af6625db71981750d105c4950849_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:488 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
992KB
MD592ca76dead9e0aae53b0cec169a244c1
SHA1aedfcc823b1d71cf363b0140f542526cb9ec809b
SHA25682f20cb641b5e742037053ffce2448be9e2e53f05a658b094cecdbf83b6a79f9
SHA512016a4c44d0d3c2e287b8dadb0ffaf34311a9ef6f01caeca5d7bd2952b8cacdb32d8fe1c1e5f711222e3fd519aa509244130361e4dee5213f080556b70439e252
-
Filesize
1KB
MD5344bf28bdbfc39c6aa0cff28932e024a
SHA17c95267a750014a71a55cf0deb957cde7e0c5cf0
SHA256d3d0b64dda42b015fa1886919f6c5c643a6e87c7d9841a9fcd93efcfb33c798c
SHA5123032ebcd272a9176c3eba1f38ba7c6593a9176ccc758915d7fbb3020921c822a670dc7d2cc1ee6a04aaecc85332743f6cc70c6bc256ff444b4e4627a260f0d41
-
Filesize
950B
MD5c911f4258414af1be59fdcde0badefe2
SHA19e66792ce1fef42df881968df5baf94acce9b341
SHA2564f4ddef4752d6b45c419e8860a2c0b38bb599e19a7b51c55cd1ecff6eec32d2d
SHA5124d387d20166adf8e3308c98664736a3455893c59e38d06e2268ba0f41aefed7941e3e4e1e433a916f0f6f19ce9eae408663d337298d350d61e03d6ea69ca1888
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
Filesize
991KB
MD5ee98af6625db71981750d105c4950849
SHA1a5a8d37ca219a08020c42c13b3fd0c615904e2e1
SHA256ec4cd1b7ee4220b41cc739fdeafe4abef736b63942de482c2dac35bd5de7864d
SHA512371e94baed164e451140c9c4f5c8774f85e387a1975c1fbfab509e126c74daa7b286e82a9da5d04ada78e8a148dac24c1d3b8b2f7db58caeed18f941fecb0de2
-
Filesize
799KB
MD5e2de31549040b35262c3b68df86844fa
SHA11ea286ea4667f8e73d8283018bf472becb72f670
SHA256d0b41076dafa32efc3ee6cd8030ab08370560530ca42626ac1fe6041455e8600
SHA512ae4ac099aac995ca38f910aa89789060e516f18187bbf8bd586c7e18df9c0c06c0f9bb92a24728adc3bce5b61ffb592dda7ba26ecacdf013d7cc43708459e1d9