Analysis

  • max time kernel
    148s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/10/2024, 09:49

General

  • Target

    2ef7ab99a6f493e6057f8e2cd3038b98_JaffaCakes118.exe

  • Size

    7.8MB

  • MD5

    2ef7ab99a6f493e6057f8e2cd3038b98

  • SHA1

    46a74eac26a3fe8ba7da7c7ba5f5f8482effab03

  • SHA256

    ebc2297d17d62e0ca3d7ff0265e79ab1802b3dd37485485f04a896c7277fd95e

  • SHA512

    23d01d06c43d63aea624bfd1ef1a4db6710bed29bf913b0415e88a6328f9581ff291da9a173c4b146d0652e7479ec0987b4f30d9b7c0f58abf1c48e6f42b9107

  • SSDEEP

    98304:Ji0ti/LR5W6oIMzKpXOai0ti/LR5W6oIMzKpXOk:802boI2lj02boI2lk

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Renames multiple (91) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • ASPack v2.12-2.42 3 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Drops startup file 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ef7ab99a6f493e6057f8e2cd3038b98_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2ef7ab99a6f493e6057f8e2cd3038b98_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops startup file
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2768
    • C:\Windows\SysWOW64\HelpMe.exe
      C:\Windows\system32\HelpMe.exe
      2⤵
      • Modifies WinLogon for persistence
      • Drops startup file
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops autorun.inf file
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      PID:3020

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-457978338-2990298471-2379561640-1000\desktop.ini.exe

          Filesize

          7.8MB

          MD5

          2acb575138b6851d2ceb2cf402e8ffc0

          SHA1

          58ecb9380290bfc8ca4642be50d71bfa82088264

          SHA256

          8c270f66f329006f2c788c02c9a78474f5dc3db698afc7545f6f79ce1bcf5efc

          SHA512

          b8962683bcd529e41c0dea01fa1794356949fcbb611137ec6182b24a969b61abffc9488b5f821352dd1c474f91a5bda40d5956ec0350e91c61fef53c3136862e

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

          Filesize

          950B

          MD5

          aeff18a1a0ad63129b68a2261814aea3

          SHA1

          8a23ca3d17bc2b79629ab8328bd884f57d86d135

          SHA256

          9e65c3210ceb4349966f44c0d5f567bdae4a3d6c76165ab481148ba6e24d468f

          SHA512

          a15283f735abf8bf02cff3ae94663afa6b1fecfa45865b9a4a6d46f29706d90ea46443117a25ebc598b91f583fbba3d6529120b8a49ab993f51cdec89eb8c258

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

          Filesize

          1KB

          MD5

          61ec4db5d51bee2479626da422c5470f

          SHA1

          ece88f9f4dc87713aece3b11e4581579ff6d388e

          SHA256

          de0dd7b7ad8171aa3e3423cc1412e082cd6bb4b2c2dc430af2280872fc116f5f

          SHA512

          69f9b980e98702944a58f7916554b4ca5c4726a85a0a26c7c10be98bf579b5a37e73cb182a175d7e5ecb93ec4aa2d2fce1b95632a9b85fd64901dd77b2971978

        • F:\AUTORUN.INF

          Filesize

          145B

          MD5

          ca13857b2fd3895a39f09d9dde3cca97

          SHA1

          8b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0

          SHA256

          cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae

          SHA512

          55e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47

        • F:\AutoRun.exe

          Filesize

          7.8MB

          MD5

          2ef7ab99a6f493e6057f8e2cd3038b98

          SHA1

          46a74eac26a3fe8ba7da7c7ba5f5f8482effab03

          SHA256

          ebc2297d17d62e0ca3d7ff0265e79ab1802b3dd37485485f04a896c7277fd95e

          SHA512

          23d01d06c43d63aea624bfd1ef1a4db6710bed29bf913b0415e88a6328f9581ff291da9a173c4b146d0652e7479ec0987b4f30d9b7c0f58abf1c48e6f42b9107

        • \Windows\SysWOW64\HelpMe.exe

          Filesize

          5.8MB

          MD5

          4139196f29b96e1205491cf1412aa1cc

          SHA1

          f88e119fbc723ce29135f4a2f598e4257a99dd2d

          SHA256

          5ae297ad945e61bdc53677e81fb433e98f8ea605ddf7400646956332cd537845

          SHA512

          d7adcb91745b435860ac0b3c3b5f4b0e5b4d29b4e5e0a6eae6f0c27bb245a1e1e2948a128ae71c184b347ac109543fc488b69f424d0087a6efa96003854a9caa

        • memory/2768-0-0x0000000000220000-0x0000000000221000-memory.dmp

          Filesize

          4KB

        • memory/3020-10-0x0000000000220000-0x0000000000221000-memory.dmp

          Filesize

          4KB