Analysis
-
max time kernel
145s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
30/03/2025, 19:22
Behavioral task
behavioral1
Sample
JaffaCakes118_990a000e6241f7caa74ec76a47cc473a.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_990a000e6241f7caa74ec76a47cc473a.exe
Resource
win10v2004-20250313-en
General
-
Target
JaffaCakes118_990a000e6241f7caa74ec76a47cc473a.exe
-
Size
184KB
-
MD5
990a000e6241f7caa74ec76a47cc473a
-
SHA1
c3fc1b5437c8b5098862ed660170c2c3b1644a01
-
SHA256
2fa6afdfdcc7ed90cc0a575480adba9401fb4b25c0f42de7bb96513373b2597d
-
SHA512
16b062ee2f22b990922ab9d2388366c139d60156155a482480845e632e732884860d59d3b55f5ad4adf53557cd44b2fd4806c6d659495818f0f657ddcd21f5b8
-
SSDEEP
3072:rimsXXK9HRTOeriRfP6pXfSb0dspqc5oY0htVFAHT11Ual21Cxcs0HKAH057kyJa:riMmXRH6pXfSb0ceR/VFAHh1kgcs0HWE
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" JaffaCakes118_990a000e6241f7caa74ec76a47cc473a.exe -
Renames multiple (91) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral1/files/0x00080000000120fe-2.dat aspack_v212_v242 behavioral1/files/0x0007000000016d4e-38.dat aspack_v212_v242 behavioral1/files/0x0001000000000026-55.dat aspack_v212_v242 -
Drops startup file 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk JaffaCakes118_990a000e6241f7caa74ec76a47cc473a.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk JaffaCakes118_990a000e6241f7caa74ec76a47cc473a.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe -
Executes dropped EXE 1 IoCs
pid Process 2564 HelpMe.exe -
Loads dropped DLL 31 IoCs
pid Process 2016 JaffaCakes118_990a000e6241f7caa74ec76a47cc473a.exe 2016 JaffaCakes118_990a000e6241f7caa74ec76a47cc473a.exe 2564 HelpMe.exe 2564 HelpMe.exe 2564 HelpMe.exe 2564 HelpMe.exe 2564 HelpMe.exe 2564 HelpMe.exe 2564 HelpMe.exe 2564 HelpMe.exe 2564 HelpMe.exe 2564 HelpMe.exe 2564 HelpMe.exe 2564 HelpMe.exe 2564 HelpMe.exe 2564 HelpMe.exe 2564 HelpMe.exe 2564 HelpMe.exe 2564 HelpMe.exe 2564 HelpMe.exe 2564 HelpMe.exe 2564 HelpMe.exe 2564 HelpMe.exe 2564 HelpMe.exe 2564 HelpMe.exe 2564 HelpMe.exe 2564 HelpMe.exe 2564 HelpMe.exe 2564 HelpMe.exe 2564 HelpMe.exe 2564 HelpMe.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: JaffaCakes118_990a000e6241f7caa74ec76a47cc473a.exe File opened (read-only) \??\J: JaffaCakes118_990a000e6241f7caa74ec76a47cc473a.exe File opened (read-only) \??\N: JaffaCakes118_990a000e6241f7caa74ec76a47cc473a.exe File opened (read-only) \??\X: JaffaCakes118_990a000e6241f7caa74ec76a47cc473a.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\L: JaffaCakes118_990a000e6241f7caa74ec76a47cc473a.exe File opened (read-only) \??\Z: JaffaCakes118_990a000e6241f7caa74ec76a47cc473a.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\B: JaffaCakes118_990a000e6241f7caa74ec76a47cc473a.exe File opened (read-only) \??\P: JaffaCakes118_990a000e6241f7caa74ec76a47cc473a.exe File opened (read-only) \??\S: JaffaCakes118_990a000e6241f7caa74ec76a47cc473a.exe File opened (read-only) \??\U: JaffaCakes118_990a000e6241f7caa74ec76a47cc473a.exe File opened (read-only) \??\W: JaffaCakes118_990a000e6241f7caa74ec76a47cc473a.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\E: JaffaCakes118_990a000e6241f7caa74ec76a47cc473a.exe File opened (read-only) \??\O: JaffaCakes118_990a000e6241f7caa74ec76a47cc473a.exe File opened (read-only) \??\Q: JaffaCakes118_990a000e6241f7caa74ec76a47cc473a.exe File opened (read-only) \??\V: JaffaCakes118_990a000e6241f7caa74ec76a47cc473a.exe File opened (read-only) \??\Y: JaffaCakes118_990a000e6241f7caa74ec76a47cc473a.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\M: JaffaCakes118_990a000e6241f7caa74ec76a47cc473a.exe File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\K: JaffaCakes118_990a000e6241f7caa74ec76a47cc473a.exe File opened (read-only) \??\T: JaffaCakes118_990a000e6241f7caa74ec76a47cc473a.exe File opened (read-only) \??\G: JaffaCakes118_990a000e6241f7caa74ec76a47cc473a.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\A: JaffaCakes118_990a000e6241f7caa74ec76a47cc473a.exe File opened (read-only) \??\I: JaffaCakes118_990a000e6241f7caa74ec76a47cc473a.exe File opened (read-only) \??\R: JaffaCakes118_990a000e6241f7caa74ec76a47cc473a.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\U: HelpMe.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AUTORUN.INF JaffaCakes118_990a000e6241f7caa74ec76a47cc473a.exe File opened for modification C:\AUTORUN.INF JaffaCakes118_990a000e6241f7caa74ec76a47cc473a.exe File opened for modification F:\AUTORUN.INF HelpMe.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe JaffaCakes118_990a000e6241f7caa74ec76a47cc473a.exe File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_990a000e6241f7caa74ec76a47cc473a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HelpMe.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2016 wrote to memory of 2564 2016 JaffaCakes118_990a000e6241f7caa74ec76a47cc473a.exe 30 PID 2016 wrote to memory of 2564 2016 JaffaCakes118_990a000e6241f7caa74ec76a47cc473a.exe 30 PID 2016 wrote to memory of 2564 2016 JaffaCakes118_990a000e6241f7caa74ec76a47cc473a.exe 30 PID 2016 wrote to memory of 2564 2016 JaffaCakes118_990a000e6241f7caa74ec76a47cc473a.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_990a000e6241f7caa74ec76a47cc473a.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_990a000e6241f7caa74ec76a47cc473a.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
185KB
MD57802862a0dc6fdfa9ecd724d582d884f
SHA1a424071a6a00ee9bb785330f30e18330cb7bcfbc
SHA256d02ca2d626d8a6d99caeeb58ed8fe8db0064af74f4fc84bd56495c54881493c5
SHA512d56a1b65ceacfcc6df74668f441ad8ac6ff4ad9630adfd7cff221f097bef15bcac53a01862c30a6cc48f8dd4a6c816be19ab29c93e8171896c61b47207c107bb
-
Filesize
1KB
MD5bcebdd4ebf376e0341822f733f33d7dd
SHA1255c1c7d24c60fe9af853d4a2748b08111ad562e
SHA25699cbc1a0aae3b07dbdf684327c8322f8ddd54a26d3ec09a2198b9f64d632e143
SHA51256f89f6cd874c42d6bec7c85fec45a39b86cbbb33a892edd1f9df1aa8ee2556893a1387ce0b210c600937a1118952967f660b13a9c990008f9b6ef25b6462b69
-
Filesize
950B
MD51f36fc98760ce67dac61ac8212217cae
SHA1a19151b27fdc26136fdc2ef255045c8d915cd01e
SHA256e9fb95262d7775b650d9f82d3c33009ee8648a02a670b8742a29a820870666c4
SHA5121c67b37159678f6ae8e538bd841547c8c243ab74cc1059d213b69ee1eecb81ad2e2d912a2273f2c5ccc4901c8ffd68ccb40e2709d94e6f47c8941bc6cf00dc92
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
Filesize
184KB
MD5990a000e6241f7caa74ec76a47cc473a
SHA1c3fc1b5437c8b5098862ed660170c2c3b1644a01
SHA2562fa6afdfdcc7ed90cc0a575480adba9401fb4b25c0f42de7bb96513373b2597d
SHA51216b062ee2f22b990922ab9d2388366c139d60156155a482480845e632e732884860d59d3b55f5ad4adf53557cd44b2fd4806c6d659495818f0f657ddcd21f5b8
-
Filesize
182KB
MD5234ff59fb9f909539f9f19ff6a9a96ae
SHA12c8c6ec92fc32ccc77b1dec91317d79f04fedec4
SHA256b8463e2d7fbb8d876fab4e0a7e11e469483e1c7bb62565a123a34c1e4271b03d
SHA51249899836e2b903b20dba48be05083e8a6972743917563e762a7a2e3765120317336b72723e24d837786392f23b22e573f16001ede6f7543177f88bff87c84226