Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 19:26
Static task
static1
Behavioral task
behavioral1
Sample
b8d941ab280e932a755ee3f0f19c1077_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b8d941ab280e932a755ee3f0f19c1077_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b8d941ab280e932a755ee3f0f19c1077_JaffaCakes118.exe
-
Size
79KB
-
MD5
b8d941ab280e932a755ee3f0f19c1077
-
SHA1
f558cb91077d22d3ca38e57f78cf1582e6875e4a
-
SHA256
5ecbeaf43f5f8c9eefe59c3c765313d54ffd6e3aaf2e566d9fcca28f5daf574b
-
SHA512
6e8ca9061e0f5b800d0b081684b2c2e70d3b713c810bc98833007357ae28c66b5d61efd873ff13f00151e820a0382be5d5d546f8534e290ad23e4feeb835fe2d
-
SSDEEP
1536:oMi2NpyUCoci2y7qAXvWw20o6UcSH+H8+kew8yd248qfvq3w+mRDyn:oMhyGdB7qAXvBccSH+HRkX8ydP8IvbD
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 224 netprotocol.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Netprotocol = "C:\\Users\\Admin\\AppData\\Roaming\\netprotocol.exe" b8d941ab280e932a755ee3f0f19c1077_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b8d941ab280e932a755ee3f0f19c1077_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netprotocol.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2428 b8d941ab280e932a755ee3f0f19c1077_JaffaCakes118.exe 224 netprotocol.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2428 wrote to memory of 224 2428 b8d941ab280e932a755ee3f0f19c1077_JaffaCakes118.exe 87 PID 2428 wrote to memory of 224 2428 b8d941ab280e932a755ee3f0f19c1077_JaffaCakes118.exe 87 PID 2428 wrote to memory of 224 2428 b8d941ab280e932a755ee3f0f19c1077_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8d941ab280e932a755ee3f0f19c1077_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8d941ab280e932a755ee3f0f19c1077_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Roaming\netprotocol.exeC:\Users\Admin\AppData\Roaming\netprotocol.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:224
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD5ff728b589995e6b3e9b602014907beda
SHA1f6af4dd7412f8774c5de7e188b63044607757375
SHA256af15d57cc6bc614eaa0c509129197aa7db18ffa5e87596b8a8c7b95d33d5f2ea
SHA512f930cb460aba9197a1f0527e58cc99adadd9a144fd1484deb94e9593a538f4058f96fe2a42027b2e95691f5490daa67c8132647eb96917cda3fe9b69e1884b08