Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2024 12:32
Static task
static1
Behavioral task
behavioral1
Sample
3062ada06a54b9effb9d0c1f2ec883bf_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3062ada06a54b9effb9d0c1f2ec883bf_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
3062ada06a54b9effb9d0c1f2ec883bf_JaffaCakes118.exe
-
Size
88KB
-
MD5
3062ada06a54b9effb9d0c1f2ec883bf
-
SHA1
aa400e3cfa9dd4188baf3f72a0b06a681adc5e6f
-
SHA256
926cdbe2efa39904ac90af0a581bf06c45dfa1497ce68111924bc0459f85026f
-
SHA512
3c81ccc13c5302e99bdda1d61c6d4f2152bfb752278ac6192efe66cabfc41d57f5dc238b8817a69624fce3cfd6c98b15f509651271d0fd4289bdcde91d926e4c
-
SSDEEP
1536:E5TL15WACXMX5DDIuKigrtHkuZSC1vkRH75S32U25Pn7pnTHZEQz:E5f15WMpDUuKrrtHku/vkR0Z2fTHXz
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4664 netprotocol.exe 4948 netprotocol.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Netprotocol = "C:\\Users\\Admin\\AppData\\Roaming\\netprotocol.exe" 3062ada06a54b9effb9d0c1f2ec883bf_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2116 set thread context of 4736 2116 3062ada06a54b9effb9d0c1f2ec883bf_JaffaCakes118.exe 83 PID 4664 set thread context of 4948 4664 netprotocol.exe 85 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2116 3062ada06a54b9effb9d0c1f2ec883bf_JaffaCakes118.exe 4664 netprotocol.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2116 wrote to memory of 4736 2116 3062ada06a54b9effb9d0c1f2ec883bf_JaffaCakes118.exe 83 PID 2116 wrote to memory of 4736 2116 3062ada06a54b9effb9d0c1f2ec883bf_JaffaCakes118.exe 83 PID 2116 wrote to memory of 4736 2116 3062ada06a54b9effb9d0c1f2ec883bf_JaffaCakes118.exe 83 PID 2116 wrote to memory of 4736 2116 3062ada06a54b9effb9d0c1f2ec883bf_JaffaCakes118.exe 83 PID 2116 wrote to memory of 4736 2116 3062ada06a54b9effb9d0c1f2ec883bf_JaffaCakes118.exe 83 PID 2116 wrote to memory of 4736 2116 3062ada06a54b9effb9d0c1f2ec883bf_JaffaCakes118.exe 83 PID 2116 wrote to memory of 4736 2116 3062ada06a54b9effb9d0c1f2ec883bf_JaffaCakes118.exe 83 PID 2116 wrote to memory of 4736 2116 3062ada06a54b9effb9d0c1f2ec883bf_JaffaCakes118.exe 83 PID 2116 wrote to memory of 4736 2116 3062ada06a54b9effb9d0c1f2ec883bf_JaffaCakes118.exe 83 PID 4736 wrote to memory of 4664 4736 3062ada06a54b9effb9d0c1f2ec883bf_JaffaCakes118.exe 84 PID 4736 wrote to memory of 4664 4736 3062ada06a54b9effb9d0c1f2ec883bf_JaffaCakes118.exe 84 PID 4736 wrote to memory of 4664 4736 3062ada06a54b9effb9d0c1f2ec883bf_JaffaCakes118.exe 84 PID 4664 wrote to memory of 4948 4664 netprotocol.exe 85 PID 4664 wrote to memory of 4948 4664 netprotocol.exe 85 PID 4664 wrote to memory of 4948 4664 netprotocol.exe 85 PID 4664 wrote to memory of 4948 4664 netprotocol.exe 85 PID 4664 wrote to memory of 4948 4664 netprotocol.exe 85 PID 4664 wrote to memory of 4948 4664 netprotocol.exe 85 PID 4664 wrote to memory of 4948 4664 netprotocol.exe 85 PID 4664 wrote to memory of 4948 4664 netprotocol.exe 85 PID 4664 wrote to memory of 4948 4664 netprotocol.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\3062ada06a54b9effb9d0c1f2ec883bf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3062ada06a54b9effb9d0c1f2ec883bf_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\3062ada06a54b9effb9d0c1f2ec883bf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3062ada06a54b9effb9d0c1f2ec883bf_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Users\Admin\AppData\Roaming\netprotocol.exeC:\Users\Admin\AppData\Roaming\netprotocol.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Users\Admin\AppData\Roaming\netprotocol.exe"C:\Users\Admin\AppData\Roaming\netprotocol.exe"4⤵
- Executes dropped EXE
PID:4948
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD560b84c9cbf02ad5ed2e94e01e4dc5fca
SHA134776185b6f4dd3b9ea7f0492309e77cf69075f4
SHA2569c78314ccc6bf99860cd6052b7f04f45f954ecf7b7008ba3cb45d34d3ad1948c
SHA512cb1bbffbaf2c014963dffe1b8bc4ec9060ee7ea1d6ac1905cc07f30a9a6ee64e7bedfb94c2e048ba32f9a2e5a17009e1d82ae90d07553d962b83f76326ccfe5f