Analysis

  • max time kernel
    145s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    30/03/2025, 19:22

General

  • Target

    JaffaCakes118_990a000e6241f7caa74ec76a47cc473a.exe

  • Size

    184KB

  • MD5

    990a000e6241f7caa74ec76a47cc473a

  • SHA1

    c3fc1b5437c8b5098862ed660170c2c3b1644a01

  • SHA256

    2fa6afdfdcc7ed90cc0a575480adba9401fb4b25c0f42de7bb96513373b2597d

  • SHA512

    16b062ee2f22b990922ab9d2388366c139d60156155a482480845e632e732884860d59d3b55f5ad4adf53557cd44b2fd4806c6d659495818f0f657ddcd21f5b8

  • SSDEEP

    3072:rimsXXK9HRTOeriRfP6pXfSb0dspqc5oY0htVFAHT11Ual21Cxcs0HKAH057kyJa:riMmXRH6pXfSb0ceR/VFAHh1kgcs0HWE

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Renames multiple (91) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • ASPack v2.12-2.42 3 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Drops startup file 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 31 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_990a000e6241f7caa74ec76a47cc473a.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_990a000e6241f7caa74ec76a47cc473a.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops startup file
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Windows\SysWOW64\HelpMe.exe
      C:\Windows\system32\HelpMe.exe
      2⤵
      • Modifies WinLogon for persistence
      • Drops startup file
      • Executes dropped EXE
      • Loads dropped DLL
      • Enumerates connected drives
      • Drops autorun.inf file
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      PID:2564

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.exe

    Filesize

    185KB

    MD5

    7802862a0dc6fdfa9ecd724d582d884f

    SHA1

    a424071a6a00ee9bb785330f30e18330cb7bcfbc

    SHA256

    d02ca2d626d8a6d99caeeb58ed8fe8db0064af74f4fc84bd56495c54881493c5

    SHA512

    d56a1b65ceacfcc6df74668f441ad8ac6ff4ad9630adfd7cff221f097bef15bcac53a01862c30a6cc48f8dd4a6c816be19ab29c93e8171896c61b47207c107bb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    1KB

    MD5

    bcebdd4ebf376e0341822f733f33d7dd

    SHA1

    255c1c7d24c60fe9af853d4a2748b08111ad562e

    SHA256

    99cbc1a0aae3b07dbdf684327c8322f8ddd54a26d3ec09a2198b9f64d632e143

    SHA512

    56f89f6cd874c42d6bec7c85fec45a39b86cbbb33a892edd1f9df1aa8ee2556893a1387ce0b210c600937a1118952967f660b13a9c990008f9b6ef25b6462b69

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    950B

    MD5

    1f36fc98760ce67dac61ac8212217cae

    SHA1

    a19151b27fdc26136fdc2ef255045c8d915cd01e

    SHA256

    e9fb95262d7775b650d9f82d3c33009ee8648a02a670b8742a29a820870666c4

    SHA512

    1c67b37159678f6ae8e538bd841547c8c243ab74cc1059d213b69ee1eecb81ad2e2d912a2273f2c5ccc4901c8ffd68ccb40e2709d94e6f47c8941bc6cf00dc92

  • F:\AUTORUN.INF

    Filesize

    145B

    MD5

    ca13857b2fd3895a39f09d9dde3cca97

    SHA1

    8b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0

    SHA256

    cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae

    SHA512

    55e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47

  • F:\AutoRun.exe

    Filesize

    184KB

    MD5

    990a000e6241f7caa74ec76a47cc473a

    SHA1

    c3fc1b5437c8b5098862ed660170c2c3b1644a01

    SHA256

    2fa6afdfdcc7ed90cc0a575480adba9401fb4b25c0f42de7bb96513373b2597d

    SHA512

    16b062ee2f22b990922ab9d2388366c139d60156155a482480845e632e732884860d59d3b55f5ad4adf53557cd44b2fd4806c6d659495818f0f657ddcd21f5b8

  • \Windows\SysWOW64\HelpMe.exe

    Filesize

    182KB

    MD5

    234ff59fb9f909539f9f19ff6a9a96ae

    SHA1

    2c8c6ec92fc32ccc77b1dec91317d79f04fedec4

    SHA256

    b8463e2d7fbb8d876fab4e0a7e11e469483e1c7bb62565a123a34c1e4271b03d

    SHA512

    49899836e2b903b20dba48be05083e8a6972743917563e762a7a2e3765120317336b72723e24d837786392f23b22e573f16001ede6f7543177f88bff87c84226

  • memory/2016-281-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2016-255-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2016-362-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2016-231-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2016-358-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2016-243-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2016-352-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2016-314-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2016-225-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2016-346-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2016-269-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2016-0-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2016-340-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2016-293-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2016-329-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2016-300-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2564-256-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2564-301-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2564-318-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2564-294-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2564-330-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2564-282-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2564-341-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2564-270-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2564-347-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2564-244-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2564-353-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2564-232-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2564-359-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2564-9-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2564-365-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB