Analysis
-
max time kernel
145s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05-10-2024 07:28
Behavioral task
behavioral1
Sample
16bad27cbb0d87dba97a7876f44c1ed3_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
16bad27cbb0d87dba97a7876f44c1ed3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
16bad27cbb0d87dba97a7876f44c1ed3_JaffaCakes118.exe
-
Size
184KB
-
MD5
16bad27cbb0d87dba97a7876f44c1ed3
-
SHA1
40dc577978f8939df6a22f988ac33d7fb5bfd7dc
-
SHA256
864015dc2258494fe378e7ed2ff3c013d5242de34ff595aff71e49b37d246704
-
SHA512
cd5339a03304d41f39567dd074a1f63bdd6b215fe692b49cb85145edb12031ce3bf9e7c7043625aff98b350f077b94ec766be828ef5f91cd1c653a5508020904
-
SSDEEP
3072:rimsXXK9HRTOeriRfP6pXfSb0dspqc5oY0htVFAHT11Ual21Cxcs0HKAH057kyJl:riMmXRH6pXfSb0ceR/VFAHh1kgcs0HWP
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" 16bad27cbb0d87dba97a7876f44c1ed3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe -
Renames multiple (91) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral1/files/0x000a0000000120d5-8.dat aspack_v212_v242 behavioral1/files/0x000800000001739f-38.dat aspack_v212_v242 behavioral1/files/0x0001000000000026-55.dat aspack_v212_v242 -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 16bad27cbb0d87dba97a7876f44c1ed3_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 16bad27cbb0d87dba97a7876f44c1ed3_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2692 HelpMe.exe -
Loads dropped DLL 31 IoCs
pid Process 2076 16bad27cbb0d87dba97a7876f44c1ed3_JaffaCakes118.exe 2076 16bad27cbb0d87dba97a7876f44c1ed3_JaffaCakes118.exe 2692 HelpMe.exe 2692 HelpMe.exe 2692 HelpMe.exe 2692 HelpMe.exe 2692 HelpMe.exe 2692 HelpMe.exe 2692 HelpMe.exe 2692 HelpMe.exe 2692 HelpMe.exe 2692 HelpMe.exe 2692 HelpMe.exe 2692 HelpMe.exe 2692 HelpMe.exe 2692 HelpMe.exe 2692 HelpMe.exe 2692 HelpMe.exe 2692 HelpMe.exe 2692 HelpMe.exe 2692 HelpMe.exe 2692 HelpMe.exe 2692 HelpMe.exe 2692 HelpMe.exe 2692 HelpMe.exe 2692 HelpMe.exe 2692 HelpMe.exe 2692 HelpMe.exe 2692 HelpMe.exe 2692 HelpMe.exe 2692 HelpMe.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: 16bad27cbb0d87dba97a7876f44c1ed3_JaffaCakes118.exe File opened (read-only) \??\T: 16bad27cbb0d87dba97a7876f44c1ed3_JaffaCakes118.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\A: 16bad27cbb0d87dba97a7876f44c1ed3_JaffaCakes118.exe File opened (read-only) \??\R: 16bad27cbb0d87dba97a7876f44c1ed3_JaffaCakes118.exe File opened (read-only) \??\S: 16bad27cbb0d87dba97a7876f44c1ed3_JaffaCakes118.exe File opened (read-only) \??\U: 16bad27cbb0d87dba97a7876f44c1ed3_JaffaCakes118.exe File opened (read-only) \??\Z: 16bad27cbb0d87dba97a7876f44c1ed3_JaffaCakes118.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\B: 16bad27cbb0d87dba97a7876f44c1ed3_JaffaCakes118.exe File opened (read-only) \??\L: 16bad27cbb0d87dba97a7876f44c1ed3_JaffaCakes118.exe File opened (read-only) \??\O: 16bad27cbb0d87dba97a7876f44c1ed3_JaffaCakes118.exe File opened (read-only) \??\V: 16bad27cbb0d87dba97a7876f44c1ed3_JaffaCakes118.exe File opened (read-only) \??\Y: 16bad27cbb0d87dba97a7876f44c1ed3_JaffaCakes118.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\H: 16bad27cbb0d87dba97a7876f44c1ed3_JaffaCakes118.exe File opened (read-only) \??\I: 16bad27cbb0d87dba97a7876f44c1ed3_JaffaCakes118.exe File opened (read-only) \??\W: 16bad27cbb0d87dba97a7876f44c1ed3_JaffaCakes118.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\E: 16bad27cbb0d87dba97a7876f44c1ed3_JaffaCakes118.exe File opened (read-only) \??\N: 16bad27cbb0d87dba97a7876f44c1ed3_JaffaCakes118.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\K: 16bad27cbb0d87dba97a7876f44c1ed3_JaffaCakes118.exe File opened (read-only) \??\P: 16bad27cbb0d87dba97a7876f44c1ed3_JaffaCakes118.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\G: 16bad27cbb0d87dba97a7876f44c1ed3_JaffaCakes118.exe File opened (read-only) \??\J: 16bad27cbb0d87dba97a7876f44c1ed3_JaffaCakes118.exe File opened (read-only) \??\M: 16bad27cbb0d87dba97a7876f44c1ed3_JaffaCakes118.exe File opened (read-only) \??\X: 16bad27cbb0d87dba97a7876f44c1ed3_JaffaCakes118.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\N: HelpMe.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\AUTORUN.INF 16bad27cbb0d87dba97a7876f44c1ed3_JaffaCakes118.exe File opened for modification F:\AUTORUN.INF HelpMe.exe File opened for modification F:\AUTORUN.INF 16bad27cbb0d87dba97a7876f44c1ed3_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe 16bad27cbb0d87dba97a7876f44c1ed3_JaffaCakes118.exe File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 16bad27cbb0d87dba97a7876f44c1ed3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HelpMe.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2692 2076 16bad27cbb0d87dba97a7876f44c1ed3_JaffaCakes118.exe 30 PID 2076 wrote to memory of 2692 2076 16bad27cbb0d87dba97a7876f44c1ed3_JaffaCakes118.exe 30 PID 2076 wrote to memory of 2692 2076 16bad27cbb0d87dba97a7876f44c1ed3_JaffaCakes118.exe 30 PID 2076 wrote to memory of 2692 2076 16bad27cbb0d87dba97a7876f44c1ed3_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\16bad27cbb0d87dba97a7876f44c1ed3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\16bad27cbb0d87dba97a7876f44c1ed3_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD51875100eed533056133649dc8f6d0796
SHA1044f3dc8fe72b3fde35872417712584ef8bf4be5
SHA2564ceb23578a7b22fbae295d93fab3db0443e12945360e93a503fb29cbbd58e380
SHA51241d6a37b0672a19d053a53456afae2aed1b852ca6ea7941145faf305fd8795db4f12fd7e8126fb15e3a0a21ea0e96d76c398c8945b4f4414d42bf32024f88d83
-
Filesize
1KB
MD5e6bb783c560e2b639f2b50d6c53bb9e0
SHA14dce93744a267fa0e05393fead5eec5c32a5c44c
SHA256c68101b522343d4c22ee726fc5f1af52f9782486b44e16a1e2d34e6b251133f9
SHA512b9a95ec0cd0813a6887d3c41d0b5c751d4b94f95a0ab0d4913ff5cbe15789725e1b49c61810d0030ec12b0b2ddc551ba636ad862d49422a8bc3be9c0fdc0c863
-
Filesize
954B
MD561d893dacf83c45aaf2bf72a83608d45
SHA1fb2da6fdba83100f54e67f1e598e0a19c40b88ce
SHA25643123b493c6ab5f2317e378d7f6dc09c2e72adcd28ee2cafb186d6ad0d4bd614
SHA51241670fe76c878eff6a45b374c0333d02b38d2b7e736dd0eed262e2e8619dbecebf2c33aa4458449ce8da55bb476fb51d76bb677b5691f2228a7b2760e7d8171c
-
Filesize
183KB
MD557f260903a34bf33a2c503df61f9403a
SHA11d1d528c3f43dec5c9c7a20c8c166fcdc742e7bb
SHA25649b3cd308e4da9f54b3b283225a13d962b27b5d033f8839fc7d36dc799371f10
SHA512d9d226e0fb4a2e9b985be04a1ce20b3763305a8867648041157dec6216defd21ca1aee0f801e0e6955d891facb14a5d2047da5f47b4dd1e4b6a8c7131ad533fd
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
Filesize
184KB
MD516bad27cbb0d87dba97a7876f44c1ed3
SHA140dc577978f8939df6a22f988ac33d7fb5bfd7dc
SHA256864015dc2258494fe378e7ed2ff3c013d5242de34ff595aff71e49b37d246704
SHA512cd5339a03304d41f39567dd074a1f63bdd6b215fe692b49cb85145edb12031ce3bf9e7c7043625aff98b350f077b94ec766be828ef5f91cd1c653a5508020904