Analysis
-
max time kernel
141s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04-07-2024 08:26
Static task
static1
Behavioral task
behavioral1
Sample
2545c3041f9a3896f657eabb8a169d4f_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2545c3041f9a3896f657eabb8a169d4f_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
2545c3041f9a3896f657eabb8a169d4f_JaffaCakes118.exe
-
Size
116KB
-
MD5
2545c3041f9a3896f657eabb8a169d4f
-
SHA1
27827bfb4faaea07194988f57d2907aa520cd60f
-
SHA256
f3070509254ff629966d53a1d8a277311b17b7ded7219d25eb5932f5938cbd8a
-
SHA512
aef83cfdbeefec91a926b37c3d21e84e471b70bb9046d9b426d235d88cc607a4b25c55763873f6df6a5b3b91aa15a227ff29102aee3d4ac4f63afede53072e4a
-
SSDEEP
1536:ss+jhi0Ckg2QtJoIvM4EXf5uEp54yhFeK0JJmlhU8KKbDHZyRFOJMeiO0mUQA+jG:xim2QtJoaUFP4Jj8DX0RFOXdTm+Ot
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4496 netprotocol.exe 2072 netprotocol.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Netprotocol = "C:\\Users\\Admin\\AppData\\Roaming\\netprotocol.exe" 2545c3041f9a3896f657eabb8a169d4f_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1424 set thread context of 3000 1424 2545c3041f9a3896f657eabb8a169d4f_JaffaCakes118.exe 80 PID 4496 set thread context of 2072 4496 netprotocol.exe 85 -
Program crash 2 IoCs
pid pid_target Process procid_target 3540 1424 WerFault.exe 79 4780 4496 WerFault.exe 82 -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1424 wrote to memory of 3000 1424 2545c3041f9a3896f657eabb8a169d4f_JaffaCakes118.exe 80 PID 1424 wrote to memory of 3000 1424 2545c3041f9a3896f657eabb8a169d4f_JaffaCakes118.exe 80 PID 1424 wrote to memory of 3000 1424 2545c3041f9a3896f657eabb8a169d4f_JaffaCakes118.exe 80 PID 1424 wrote to memory of 3000 1424 2545c3041f9a3896f657eabb8a169d4f_JaffaCakes118.exe 80 PID 1424 wrote to memory of 3000 1424 2545c3041f9a3896f657eabb8a169d4f_JaffaCakes118.exe 80 PID 3000 wrote to memory of 4496 3000 2545c3041f9a3896f657eabb8a169d4f_JaffaCakes118.exe 82 PID 3000 wrote to memory of 4496 3000 2545c3041f9a3896f657eabb8a169d4f_JaffaCakes118.exe 82 PID 3000 wrote to memory of 4496 3000 2545c3041f9a3896f657eabb8a169d4f_JaffaCakes118.exe 82 PID 4496 wrote to memory of 2072 4496 netprotocol.exe 85 PID 4496 wrote to memory of 2072 4496 netprotocol.exe 85 PID 4496 wrote to memory of 2072 4496 netprotocol.exe 85 PID 4496 wrote to memory of 2072 4496 netprotocol.exe 85 PID 4496 wrote to memory of 2072 4496 netprotocol.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2545c3041f9a3896f657eabb8a169d4f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2545c3041f9a3896f657eabb8a169d4f_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\2545c3041f9a3896f657eabb8a169d4f_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\2545c3041f9a3896f657eabb8a169d4f_JaffaCakes118.exe2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\AppData\Roaming\netprotocol.exeC:\Users\Admin\AppData\Roaming\netprotocol.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Roaming\netprotocol.exeC:\Users\Admin\AppData\Roaming\netprotocol.exe4⤵
- Executes dropped EXE
PID:2072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4496 -s 4484⤵
- Program crash
PID:4780
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1424 -s 4602⤵
- Program crash
PID:3540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1424 -ip 14241⤵PID:2536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4496 -ip 44961⤵PID:3304
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116KB
MD5000bb2fe73feae1a5919a88bd3c9d029
SHA17cb1d43003bf706bf7fbcfcdfaab7f4a384a68aa
SHA25682776f45c4e1db930c8a4a10f5a46a040a69fbe476f2cd29987d0b05be1f4537
SHA51228e61d50af793b172dd17626d76488e330848cde91942ad8689299411086238e26fab2c3c3e8ffe2b65fab247a4f82b8d9446e0bc9faca1061832b034f119334