Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2024, 05:25
Behavioral task
behavioral1
Sample
fe89b66a4b17400c129c744431362a5c_JaffaCakes118.exe
Resource
win7-20240221-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
fe89b66a4b17400c129c744431362a5c_JaffaCakes118.exe
Resource
win10v2004-20240412-en
3 signatures
150 seconds
General
-
Target
fe89b66a4b17400c129c744431362a5c_JaffaCakes118.exe
-
Size
722KB
-
MD5
fe89b66a4b17400c129c744431362a5c
-
SHA1
555d03d2f055cc4fdc19fe7f64f722928c92aec2
-
SHA256
4742b15f4a03647a289ef62a17bb8957701777cb956bd95505b966f53d971422
-
SHA512
a01ddd7063ffbe86f6662f6efb7c7fd1626de6c3abe87c351ad2ca35b9475f40fe777e1aee10890361637c2f2159dbe2e35a00d0810b7c3888a5ab47fd2278fb
-
SSDEEP
12288:VpnnrZzpE4v/dVlu6m2g+ghWT4nnLx7dWfyd+j+E5QP90LAd+2RethMboNfWyWN9:VRE4v/Ru6mhWTsjtXld7SMsNfN2pf
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4412-0-0x0000000000400000-0x000000000057F000-memory.dmp upx behavioral2/memory/4412-5-0x0000000000400000-0x000000000057F000-memory.dmp upx -
Gathers system information 1 TTPs 5 IoCs
Runs systeminfo.exe.
pid Process 4360 systeminfo.exe 5008 systeminfo.exe 4312 systeminfo.exe 2332 systeminfo.exe 4104 systeminfo.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4412 wrote to memory of 4424 4412 fe89b66a4b17400c129c744431362a5c_JaffaCakes118.exe 86 PID 4412 wrote to memory of 4424 4412 fe89b66a4b17400c129c744431362a5c_JaffaCakes118.exe 86 PID 4412 wrote to memory of 4424 4412 fe89b66a4b17400c129c744431362a5c_JaffaCakes118.exe 86 PID 4424 wrote to memory of 4360 4424 CMD.exe 88 PID 4424 wrote to memory of 4360 4424 CMD.exe 88 PID 4424 wrote to memory of 4360 4424 CMD.exe 88 PID 4424 wrote to memory of 5008 4424 CMD.exe 94 PID 4424 wrote to memory of 5008 4424 CMD.exe 94 PID 4424 wrote to memory of 5008 4424 CMD.exe 94 PID 4424 wrote to memory of 4312 4424 CMD.exe 95 PID 4424 wrote to memory of 4312 4424 CMD.exe 95 PID 4424 wrote to memory of 4312 4424 CMD.exe 95 PID 4424 wrote to memory of 2332 4424 CMD.exe 96 PID 4424 wrote to memory of 2332 4424 CMD.exe 96 PID 4424 wrote to memory of 2332 4424 CMD.exe 96 PID 4424 wrote to memory of 4104 4424 CMD.exe 100 PID 4424 wrote to memory of 4104 4424 CMD.exe 100 PID 4424 wrote to memory of 4104 4424 CMD.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe89b66a4b17400c129c744431362a5c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fe89b66a4b17400c129c744431362a5c_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\SysWOW64\CMD.exeCMD /C SYSTEMINFO && SYSTEMINFO && SYSTEMINFO && SYSTEMINFO && SYSTEMINFO && DEL "C:\Users\Admin\AppData\Local\Temp\fe89b66a4b17400c129c744431362a5c_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\SysWOW64\systeminfo.exeSYSTEMINFO3⤵
- Gathers system information
PID:4360
-
-
C:\Windows\SysWOW64\systeminfo.exeSYSTEMINFO3⤵
- Gathers system information
PID:5008
-
-
C:\Windows\SysWOW64\systeminfo.exeSYSTEMINFO3⤵
- Gathers system information
PID:4312
-
-
C:\Windows\SysWOW64\systeminfo.exeSYSTEMINFO3⤵
- Gathers system information
PID:2332
-
-
C:\Windows\SysWOW64\systeminfo.exeSYSTEMINFO3⤵
- Gathers system information
PID:4104
-
-