Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-03-2024 09:40
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
025867b7ffe0d10ac1e78a0156252c75_JaffaCakes118.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
025867b7ffe0d10ac1e78a0156252c75_JaffaCakes118.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
025867b7ffe0d10ac1e78a0156252c75_JaffaCakes118.exe
-
Size
316KB
-
MD5
025867b7ffe0d10ac1e78a0156252c75
-
SHA1
ad3f8fdc69e46cb0cd3885d687627c8e70e29f73
-
SHA256
d9133384bb8b0d096f5b5fa4ccdcdf97ee42665fb20be927aa6458bbf4377f39
-
SHA512
b671c7c678faf10cfde7a72f6b3d79ea93dad8e7313a125f86a884f2fdcdc5eda21a72d409e487ed73759857878faab91e4d1a0e2341731571f996d82a89e11a
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiEbRtQKsVFCl:FytbV3kSoXaLnToslgbsO
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2980 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3060 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2904 025867b7ffe0d10ac1e78a0156252c75_JaffaCakes118.exe 2904 025867b7ffe0d10ac1e78a0156252c75_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2904 025867b7ffe0d10ac1e78a0156252c75_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2980 2904 025867b7ffe0d10ac1e78a0156252c75_JaffaCakes118.exe 28 PID 2904 wrote to memory of 2980 2904 025867b7ffe0d10ac1e78a0156252c75_JaffaCakes118.exe 28 PID 2904 wrote to memory of 2980 2904 025867b7ffe0d10ac1e78a0156252c75_JaffaCakes118.exe 28 PID 2980 wrote to memory of 3060 2980 cmd.exe 30 PID 2980 wrote to memory of 3060 2980 cmd.exe 30 PID 2980 wrote to memory of 3060 2980 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\025867b7ffe0d10ac1e78a0156252c75_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\025867b7ffe0d10ac1e78a0156252c75_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\025867b7ffe0d10ac1e78a0156252c75_JaffaCakes118.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:3060
-
-