Analysis

  • max time kernel
    147s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/04/2024, 12:34

General

  • Target

    ed6f30f1d9c292c6dcdcba8adda8a33d_JaffaCakes118.exe

  • Size

    56KB

  • MD5

    ed6f30f1d9c292c6dcdcba8adda8a33d

  • SHA1

    4646ca6c52b4cafb642b78998f2bc652125c9f5a

  • SHA256

    4343e29ac753a1dcf909fd460dbbe9151aafd6e02ef9431245dd311b505dd398

  • SHA512

    c6753328631f61748646c9b5a718dd7cd30b5ed7cb1ca73cfd24b23f08b7281982cff8a37bac3556ec220caa32a349e25588b186a1ff992e8e39f3a79d4d0bb1

  • SSDEEP

    1536:b61N6DbeUACInSeBJRVkj6crlr9+Q3izSHryZZuQIJtVInouy8C:e1UDiUAC4dBjVkjJhr9vmZYJrgoutC

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed6f30f1d9c292c6dcdcba8adda8a33d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ed6f30f1d9c292c6dcdcba8adda8a33d_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3504
    • C:\Users\Admin\AppData\Local\Temp\ed6f30f1d9c292c6dcdcba8adda8a33d_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\ed6f30f1d9c292c6dcdcba8adda8a33d_JaffaCakes118.exe
      2⤵
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2500
      • C:\Users\Admin\AppData\Roaming\netprotocol.exe
        C:\Users\Admin\AppData\Roaming\netprotocol.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4944
        • C:\Users\Admin\AppData\Roaming\netprotocol.exe
          C:\Users\Admin\AppData\Roaming\netprotocol.exe
          4⤵
          • Executes dropped EXE
          PID:3800

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\netprotocol.exe

          Filesize

          56KB

          MD5

          c2f70f5bb29d5a2fc2c5305135745fbc

          SHA1

          bb78a60f7f9e8b06fe43fbf7fdc70c55ca627bc6

          SHA256

          8a70e1afdaf2fd258e953680c5a233746103f10901603a5bb96274fe571b4d7c

          SHA512

          10ecc10db33ecf3c37effacf718aff0ef7758b22d32086015f61ab3a7c3d3ad7a21094e75da1dfa4dca27e18cbfaf9c6d9763a73dc5542e3bd4f2e0204c9ec02

        • memory/2500-3-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/2500-6-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/2500-7-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/2500-21-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/2500-33-0x0000000000430000-0x00000000004F9000-memory.dmp

          Filesize

          804KB

        • memory/3504-0-0x0000000000400000-0x0000000000446000-memory.dmp

          Filesize

          280KB

        • memory/3504-5-0x0000000000400000-0x0000000000446000-memory.dmp

          Filesize

          280KB

        • memory/3800-22-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/4944-12-0x0000000000400000-0x0000000000446000-memory.dmp

          Filesize

          280KB

        • memory/4944-17-0x0000000000400000-0x0000000000446000-memory.dmp

          Filesize

          280KB