Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2024, 02:56
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
fbc681ec0f4c57691d1135a20e14ff56_JaffaCakes118.exe
Resource
win7-20240221-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
fbc681ec0f4c57691d1135a20e14ff56_JaffaCakes118.exe
Resource
win10v2004-20240412-en
4 signatures
150 seconds
General
-
Target
fbc681ec0f4c57691d1135a20e14ff56_JaffaCakes118.exe
-
Size
316KB
-
MD5
fbc681ec0f4c57691d1135a20e14ff56
-
SHA1
f75bb1d09314f23167b9d11847adb2575cb9b327
-
SHA256
ac7792f2fee6036411238ea3085352a26b6a6eb44e5509a16c63bce0c1f71444
-
SHA512
247ec80e4613c59abc15a4024e72d637c653ac576d13dd4050571b5521f36e804fbc7dcb568002f5ec7e809c0198647532a66cdb971752b687ada6dec57d0489
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiEJ6qSsYGvX:FytbV3kSoXaLnTosly6qSsxv
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3496 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2384 fbc681ec0f4c57691d1135a20e14ff56_JaffaCakes118.exe 2384 fbc681ec0f4c57691d1135a20e14ff56_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2384 fbc681ec0f4c57691d1135a20e14ff56_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2384 wrote to memory of 4016 2384 fbc681ec0f4c57691d1135a20e14ff56_JaffaCakes118.exe 84 PID 2384 wrote to memory of 4016 2384 fbc681ec0f4c57691d1135a20e14ff56_JaffaCakes118.exe 84 PID 4016 wrote to memory of 3496 4016 cmd.exe 86 PID 4016 wrote to memory of 3496 4016 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbc681ec0f4c57691d1135a20e14ff56_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fbc681ec0f4c57691d1135a20e14ff56_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\fbc681ec0f4c57691d1135a20e14ff56_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:3496
-
-