Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/04/2024, 03:04
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f0276179388614ba19506dce944516f1_JaffaCakes118.exe
Resource
win7-20240221-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
f0276179388614ba19506dce944516f1_JaffaCakes118.exe
Resource
win10v2004-20240412-en
4 signatures
150 seconds
General
-
Target
f0276179388614ba19506dce944516f1_JaffaCakes118.exe
-
Size
488KB
-
MD5
f0276179388614ba19506dce944516f1
-
SHA1
267f38146c68987ceafad4edee9d7cdc4b1fa1a7
-
SHA256
e7fd027280a464d944ab04b4342812621c6c5617eb9797286cce574e9d30efb7
-
SHA512
d36c0b1f196e1170fefe8b6fec6b5df36ff8a8ef9dd34e842620979cc3d791faf7f020a02f8a4c54c9bc34dac9e68a5741d7638537a30983e9e12fafb097a431
-
SSDEEP
12288:FytbV3kSoXaLnTosli+u3p0OLST2bx4ircTcF5jfEtl:Eb5kSYaLTVlxnOLSTa+e/q
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2196 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2816 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2892 f0276179388614ba19506dce944516f1_JaffaCakes118.exe 2892 f0276179388614ba19506dce944516f1_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2892 f0276179388614ba19506dce944516f1_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2892 wrote to memory of 2196 2892 f0276179388614ba19506dce944516f1_JaffaCakes118.exe 28 PID 2892 wrote to memory of 2196 2892 f0276179388614ba19506dce944516f1_JaffaCakes118.exe 28 PID 2892 wrote to memory of 2196 2892 f0276179388614ba19506dce944516f1_JaffaCakes118.exe 28 PID 2196 wrote to memory of 2816 2196 cmd.exe 30 PID 2196 wrote to memory of 2816 2196 cmd.exe 30 PID 2196 wrote to memory of 2816 2196 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0276179388614ba19506dce944516f1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f0276179388614ba19506dce944516f1_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\f0276179388614ba19506dce944516f1_JaffaCakes118.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2816
-
-