Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17-04-2024 23:11
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f6c7e899297d6127f581f57fb6f31bb4_JaffaCakes118.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
f6c7e899297d6127f581f57fb6f31bb4_JaffaCakes118.exe
Resource
win10v2004-20240412-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
f6c7e899297d6127f581f57fb6f31bb4_JaffaCakes118.exe
-
Size
488KB
-
MD5
f6c7e899297d6127f581f57fb6f31bb4
-
SHA1
a3ed33eea7e4c1867f1c55bd985e015fbe99b818
-
SHA256
00bf87ae822eacef5d4eaf44ae7ccd8fd215cd96dba75e1fe65ac454be757d02
-
SHA512
1c2ade7671634ac8866975e6a70806bf57e9dff530149f587caeffca46ef77595f0635d41b29d6176a6b75c7ee1178330c4005bccc002f07d45b78d72e2b3d05
-
SSDEEP
12288:FytbV3kSoXaLnTosllJmB/fdXnYgkMp9IkST5DIopv8vQhhN:Eb5kSYaLTVl6B/fBn4BtDIot6chN
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2616 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2924 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2664 f6c7e899297d6127f581f57fb6f31bb4_JaffaCakes118.exe 2664 f6c7e899297d6127f581f57fb6f31bb4_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2664 f6c7e899297d6127f581f57fb6f31bb4_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2664 wrote to memory of 2616 2664 f6c7e899297d6127f581f57fb6f31bb4_JaffaCakes118.exe 28 PID 2664 wrote to memory of 2616 2664 f6c7e899297d6127f581f57fb6f31bb4_JaffaCakes118.exe 28 PID 2664 wrote to memory of 2616 2664 f6c7e899297d6127f581f57fb6f31bb4_JaffaCakes118.exe 28 PID 2616 wrote to memory of 2924 2616 cmd.exe 30 PID 2616 wrote to memory of 2924 2616 cmd.exe 30 PID 2616 wrote to memory of 2924 2616 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6c7e899297d6127f581f57fb6f31bb4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f6c7e899297d6127f581f57fb6f31bb4_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\f6c7e899297d6127f581f57fb6f31bb4_JaffaCakes118.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2924
-
-