Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/04/2024, 14:56
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f15374ff0de1d25eb72217dd0aec42f3_JaffaCakes118.exe
Resource
win7-20240221-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
f15374ff0de1d25eb72217dd0aec42f3_JaffaCakes118.exe
Resource
win10v2004-20240412-en
4 signatures
150 seconds
General
-
Target
f15374ff0de1d25eb72217dd0aec42f3_JaffaCakes118.exe
-
Size
316KB
-
MD5
f15374ff0de1d25eb72217dd0aec42f3
-
SHA1
3709d0585c85ec60a34928c2d75ea64f106d4928
-
SHA256
d0bb6abcff9c3dafec9fbe72e7d117fadd73280f41ec24a1314b1367e4b4a044
-
SHA512
e79b239c04839aca528e7fcab8de72c8b085d41e2799122274191e2f3216c910ee09df674f6144287bc144295ea7762368431c86096da25abd616ab61e571322
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiEG04CX:FytbV3kSoXaLnToslh0tX
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2236 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2052 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1908 f15374ff0de1d25eb72217dd0aec42f3_JaffaCakes118.exe 1908 f15374ff0de1d25eb72217dd0aec42f3_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1908 f15374ff0de1d25eb72217dd0aec42f3_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1908 wrote to memory of 2236 1908 f15374ff0de1d25eb72217dd0aec42f3_JaffaCakes118.exe 28 PID 1908 wrote to memory of 2236 1908 f15374ff0de1d25eb72217dd0aec42f3_JaffaCakes118.exe 28 PID 1908 wrote to memory of 2236 1908 f15374ff0de1d25eb72217dd0aec42f3_JaffaCakes118.exe 28 PID 2236 wrote to memory of 2052 2236 cmd.exe 30 PID 2236 wrote to memory of 2052 2236 cmd.exe 30 PID 2236 wrote to memory of 2052 2236 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f15374ff0de1d25eb72217dd0aec42f3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f15374ff0de1d25eb72217dd0aec42f3_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\f15374ff0de1d25eb72217dd0aec42f3_JaffaCakes118.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2052
-
-