Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26/04/2024, 09:52
Static task
static1
Behavioral task
behavioral1
Sample
008294cac966fa28e27caca0ff63d171_JaffaCakes118.exe
Resource
win7-20240221-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
008294cac966fa28e27caca0ff63d171_JaffaCakes118.exe
Resource
win10v2004-20240226-en
2 signatures
150 seconds
General
-
Target
008294cac966fa28e27caca0ff63d171_JaffaCakes118.exe
-
Size
385KB
-
MD5
008294cac966fa28e27caca0ff63d171
-
SHA1
f179b7890f4b3365fa5d1462d06ef489f3870678
-
SHA256
14c567626fda87aa8aa123a0eddfeef784fce2645d1e86b6dd4a31be9bb471e9
-
SHA512
5f29fe1e3d7089e520f3a25df31d4e3e9dc73851ce2d644bb8d149bdd2e89dc12cda749fc0a7eafd860b374613d83c7b878ec0e30b13501bad6f15edb49d98c1
-
SSDEEP
6144:XYU7CGagzZydyiMJI+/JH1+bFRBuv/rwQ4x5RHr0JpBM4wOhn8tdLpGI:lPagzMgiAIuJ0bFDyjw2a4wKCUI
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1476 PING.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4604 wrote to memory of 1808 4604 008294cac966fa28e27caca0ff63d171_JaffaCakes118.exe 90 PID 4604 wrote to memory of 1808 4604 008294cac966fa28e27caca0ff63d171_JaffaCakes118.exe 90 PID 4604 wrote to memory of 1808 4604 008294cac966fa28e27caca0ff63d171_JaffaCakes118.exe 90 PID 1808 wrote to memory of 1476 1808 cmd.exe 92 PID 1808 wrote to memory of 1476 1808 cmd.exe 92 PID 1808 wrote to memory of 1476 1808 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\008294cac966fa28e27caca0ff63d171_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\008294cac966fa28e27caca0ff63d171_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\008294cac966fa28e27caca0ff63d171_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:1476
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3936 --field-trial-handle=2304,i,6987730730348465820,3913273227385401271,262144 --variations-seed-version /prefetch:81⤵PID:1088