Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/03/2024, 21:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1011c00013fcfe39ad64ba39f36aec85_JaffaCakes118.exe
Resource
win7-20240221-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
1011c00013fcfe39ad64ba39f36aec85_JaffaCakes118.exe
Resource
win10v2004-20240226-en
4 signatures
150 seconds
General
-
Target
1011c00013fcfe39ad64ba39f36aec85_JaffaCakes118.exe
-
Size
316KB
-
MD5
1011c00013fcfe39ad64ba39f36aec85
-
SHA1
d330b9cb2eb3fed44bb35efdfd4c413c42d90890
-
SHA256
7d3d1c34e2bc364b885a667984611dbb3024b33283dcb08a9218e91dd040ecac
-
SHA512
7ddddf4f64ce16ce5e170722bdcd13dd210e11473936954d4f7667b1e898b729cd4a13eb524bb6dd349c48ac84f5f34980ac8351588a84c110dbce4b1ed67da8
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiEYmJHSX2U:FytbV3kSoXaLnToslfm+
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1692 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2564 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3000 1011c00013fcfe39ad64ba39f36aec85_JaffaCakes118.exe 3000 1011c00013fcfe39ad64ba39f36aec85_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3000 1011c00013fcfe39ad64ba39f36aec85_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3000 wrote to memory of 1692 3000 1011c00013fcfe39ad64ba39f36aec85_JaffaCakes118.exe 28 PID 3000 wrote to memory of 1692 3000 1011c00013fcfe39ad64ba39f36aec85_JaffaCakes118.exe 28 PID 3000 wrote to memory of 1692 3000 1011c00013fcfe39ad64ba39f36aec85_JaffaCakes118.exe 28 PID 1692 wrote to memory of 2564 1692 cmd.exe 30 PID 1692 wrote to memory of 2564 1692 cmd.exe 30 PID 1692 wrote to memory of 2564 1692 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1011c00013fcfe39ad64ba39f36aec85_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1011c00013fcfe39ad64ba39f36aec85_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\1011c00013fcfe39ad64ba39f36aec85_JaffaCakes118.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2564
-
-