Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/04/2024, 12:34
Behavioral task
behavioral1
Sample
ed6f30f1d9c292c6dcdcba8adda8a33d_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ed6f30f1d9c292c6dcdcba8adda8a33d_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
ed6f30f1d9c292c6dcdcba8adda8a33d_JaffaCakes118.exe
-
Size
56KB
-
MD5
ed6f30f1d9c292c6dcdcba8adda8a33d
-
SHA1
4646ca6c52b4cafb642b78998f2bc652125c9f5a
-
SHA256
4343e29ac753a1dcf909fd460dbbe9151aafd6e02ef9431245dd311b505dd398
-
SHA512
c6753328631f61748646c9b5a718dd7cd30b5ed7cb1ca73cfd24b23f08b7281982cff8a37bac3556ec220caa32a349e25588b186a1ff992e8e39f3a79d4d0bb1
-
SSDEEP
1536:b61N6DbeUACInSeBJRVkj6crlr9+Q3izSHryZZuQIJtVInouy8C:e1UDiUAC4dBjVkjJhr9vmZYJrgoutC
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4944 netprotocol.exe 3800 netprotocol.exe -
resource yara_rule behavioral2/memory/3504-0-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/2500-3-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral2/memory/2500-6-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral2/memory/3504-5-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/2500-7-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral2/files/0x0007000000023218-10.dat upx behavioral2/memory/4944-12-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/4944-17-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/2500-21-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral2/memory/3800-22-0x0000000000400000-0x0000000000425000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Netprotocol = "C:\\Users\\Admin\\AppData\\Roaming\\netprotocol.exe" ed6f30f1d9c292c6dcdcba8adda8a33d_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3504 set thread context of 2500 3504 ed6f30f1d9c292c6dcdcba8adda8a33d_JaffaCakes118.exe 84 PID 4944 set thread context of 3800 4944 netprotocol.exe 86 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3504 ed6f30f1d9c292c6dcdcba8adda8a33d_JaffaCakes118.exe 4944 netprotocol.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 3504 wrote to memory of 2500 3504 ed6f30f1d9c292c6dcdcba8adda8a33d_JaffaCakes118.exe 84 PID 3504 wrote to memory of 2500 3504 ed6f30f1d9c292c6dcdcba8adda8a33d_JaffaCakes118.exe 84 PID 3504 wrote to memory of 2500 3504 ed6f30f1d9c292c6dcdcba8adda8a33d_JaffaCakes118.exe 84 PID 3504 wrote to memory of 2500 3504 ed6f30f1d9c292c6dcdcba8adda8a33d_JaffaCakes118.exe 84 PID 3504 wrote to memory of 2500 3504 ed6f30f1d9c292c6dcdcba8adda8a33d_JaffaCakes118.exe 84 PID 3504 wrote to memory of 2500 3504 ed6f30f1d9c292c6dcdcba8adda8a33d_JaffaCakes118.exe 84 PID 3504 wrote to memory of 2500 3504 ed6f30f1d9c292c6dcdcba8adda8a33d_JaffaCakes118.exe 84 PID 3504 wrote to memory of 2500 3504 ed6f30f1d9c292c6dcdcba8adda8a33d_JaffaCakes118.exe 84 PID 2500 wrote to memory of 4944 2500 ed6f30f1d9c292c6dcdcba8adda8a33d_JaffaCakes118.exe 85 PID 2500 wrote to memory of 4944 2500 ed6f30f1d9c292c6dcdcba8adda8a33d_JaffaCakes118.exe 85 PID 2500 wrote to memory of 4944 2500 ed6f30f1d9c292c6dcdcba8adda8a33d_JaffaCakes118.exe 85 PID 4944 wrote to memory of 3800 4944 netprotocol.exe 86 PID 4944 wrote to memory of 3800 4944 netprotocol.exe 86 PID 4944 wrote to memory of 3800 4944 netprotocol.exe 86 PID 4944 wrote to memory of 3800 4944 netprotocol.exe 86 PID 4944 wrote to memory of 3800 4944 netprotocol.exe 86 PID 4944 wrote to memory of 3800 4944 netprotocol.exe 86 PID 4944 wrote to memory of 3800 4944 netprotocol.exe 86 PID 4944 wrote to memory of 3800 4944 netprotocol.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed6f30f1d9c292c6dcdcba8adda8a33d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ed6f30f1d9c292c6dcdcba8adda8a33d_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\ed6f30f1d9c292c6dcdcba8adda8a33d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\ed6f30f1d9c292c6dcdcba8adda8a33d_JaffaCakes118.exe2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Users\Admin\AppData\Roaming\netprotocol.exeC:\Users\Admin\AppData\Roaming\netprotocol.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Roaming\netprotocol.exeC:\Users\Admin\AppData\Roaming\netprotocol.exe4⤵
- Executes dropped EXE
PID:3800
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD5c2f70f5bb29d5a2fc2c5305135745fbc
SHA1bb78a60f7f9e8b06fe43fbf7fdc70c55ca627bc6
SHA2568a70e1afdaf2fd258e953680c5a233746103f10901603a5bb96274fe571b4d7c
SHA51210ecc10db33ecf3c37effacf718aff0ef7758b22d32086015f61ab3a7c3d3ad7a21094e75da1dfa4dca27e18cbfaf9c6d9763a73dc5542e3bd4f2e0204c9ec02