Analysis
-
max time kernel
142s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 12:32
Static task
static1
Behavioral task
behavioral1
Sample
3062ada06a54b9effb9d0c1f2ec883bf_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3062ada06a54b9effb9d0c1f2ec883bf_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
3062ada06a54b9effb9d0c1f2ec883bf_JaffaCakes118.exe
-
Size
88KB
-
MD5
3062ada06a54b9effb9d0c1f2ec883bf
-
SHA1
aa400e3cfa9dd4188baf3f72a0b06a681adc5e6f
-
SHA256
926cdbe2efa39904ac90af0a581bf06c45dfa1497ce68111924bc0459f85026f
-
SHA512
3c81ccc13c5302e99bdda1d61c6d4f2152bfb752278ac6192efe66cabfc41d57f5dc238b8817a69624fce3cfd6c98b15f509651271d0fd4289bdcde91d926e4c
-
SSDEEP
1536:E5TL15WACXMX5DDIuKigrtHkuZSC1vkRH75S32U25Pn7pnTHZEQz:E5f15WMpDUuKrrtHku/vkR0Z2fTHXz
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2884 netprotocol.exe 2524 netprotocol.exe -
Loads dropped DLL 3 IoCs
pid Process 2728 3062ada06a54b9effb9d0c1f2ec883bf_JaffaCakes118.exe 2728 3062ada06a54b9effb9d0c1f2ec883bf_JaffaCakes118.exe 2884 netprotocol.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\Netprotocol = "C:\\Users\\Admin\\AppData\\Roaming\\netprotocol.exe" 3062ada06a54b9effb9d0c1f2ec883bf_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2632 set thread context of 2728 2632 3062ada06a54b9effb9d0c1f2ec883bf_JaffaCakes118.exe 30 PID 2884 set thread context of 2524 2884 netprotocol.exe 32 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2632 3062ada06a54b9effb9d0c1f2ec883bf_JaffaCakes118.exe 2884 netprotocol.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2632 wrote to memory of 2728 2632 3062ada06a54b9effb9d0c1f2ec883bf_JaffaCakes118.exe 30 PID 2632 wrote to memory of 2728 2632 3062ada06a54b9effb9d0c1f2ec883bf_JaffaCakes118.exe 30 PID 2632 wrote to memory of 2728 2632 3062ada06a54b9effb9d0c1f2ec883bf_JaffaCakes118.exe 30 PID 2632 wrote to memory of 2728 2632 3062ada06a54b9effb9d0c1f2ec883bf_JaffaCakes118.exe 30 PID 2632 wrote to memory of 2728 2632 3062ada06a54b9effb9d0c1f2ec883bf_JaffaCakes118.exe 30 PID 2632 wrote to memory of 2728 2632 3062ada06a54b9effb9d0c1f2ec883bf_JaffaCakes118.exe 30 PID 2632 wrote to memory of 2728 2632 3062ada06a54b9effb9d0c1f2ec883bf_JaffaCakes118.exe 30 PID 2632 wrote to memory of 2728 2632 3062ada06a54b9effb9d0c1f2ec883bf_JaffaCakes118.exe 30 PID 2632 wrote to memory of 2728 2632 3062ada06a54b9effb9d0c1f2ec883bf_JaffaCakes118.exe 30 PID 2632 wrote to memory of 2728 2632 3062ada06a54b9effb9d0c1f2ec883bf_JaffaCakes118.exe 30 PID 2728 wrote to memory of 2884 2728 3062ada06a54b9effb9d0c1f2ec883bf_JaffaCakes118.exe 31 PID 2728 wrote to memory of 2884 2728 3062ada06a54b9effb9d0c1f2ec883bf_JaffaCakes118.exe 31 PID 2728 wrote to memory of 2884 2728 3062ada06a54b9effb9d0c1f2ec883bf_JaffaCakes118.exe 31 PID 2728 wrote to memory of 2884 2728 3062ada06a54b9effb9d0c1f2ec883bf_JaffaCakes118.exe 31 PID 2884 wrote to memory of 2524 2884 netprotocol.exe 32 PID 2884 wrote to memory of 2524 2884 netprotocol.exe 32 PID 2884 wrote to memory of 2524 2884 netprotocol.exe 32 PID 2884 wrote to memory of 2524 2884 netprotocol.exe 32 PID 2884 wrote to memory of 2524 2884 netprotocol.exe 32 PID 2884 wrote to memory of 2524 2884 netprotocol.exe 32 PID 2884 wrote to memory of 2524 2884 netprotocol.exe 32 PID 2884 wrote to memory of 2524 2884 netprotocol.exe 32 PID 2884 wrote to memory of 2524 2884 netprotocol.exe 32 PID 2884 wrote to memory of 2524 2884 netprotocol.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\3062ada06a54b9effb9d0c1f2ec883bf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3062ada06a54b9effb9d0c1f2ec883bf_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\3062ada06a54b9effb9d0c1f2ec883bf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3062ada06a54b9effb9d0c1f2ec883bf_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Roaming\netprotocol.exeC:\Users\Admin\AppData\Roaming\netprotocol.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Roaming\netprotocol.exe"C:\Users\Admin\AppData\Roaming\netprotocol.exe"4⤵
- Executes dropped EXE
PID:2524
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD560b84c9cbf02ad5ed2e94e01e4dc5fca
SHA134776185b6f4dd3b9ea7f0492309e77cf69075f4
SHA2569c78314ccc6bf99860cd6052b7f04f45f954ecf7b7008ba3cb45d34d3ad1948c
SHA512cb1bbffbaf2c014963dffe1b8bc4ec9060ee7ea1d6ac1905cc07f30a9a6ee64e7bedfb94c2e048ba32f9a2e5a17009e1d82ae90d07553d962b83f76326ccfe5f