Analysis
-
max time kernel
67s -
max time network
54s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
29/04/2024, 07:48
Static task
static1
Behavioral task
behavioral1
Sample
0729a648a4fb3676068a8d0133456e2d_JaffaCakes118.exe
Resource
win7-20240221-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
0729a648a4fb3676068a8d0133456e2d_JaffaCakes118.exe
Resource
win10v2004-20240419-en
2 signatures
150 seconds
General
-
Target
0729a648a4fb3676068a8d0133456e2d_JaffaCakes118.exe
-
Size
334KB
-
MD5
0729a648a4fb3676068a8d0133456e2d
-
SHA1
2d77721a69fe3e0ed2e7fcfe87e06725d798e5ad
-
SHA256
235c544d800ee6249a3db93962d47dd133a8258c1b1121c5df00de64cb8e5ecf
-
SHA512
876c858cd4a2e431e8330bc8915130709d758bb1d1b8e3a2231947ad3033621dce2bfff55f6f788aa3901314ce90cc75630ee6e13640dc95d3a827b294e997df
-
SSDEEP
6144:jIj06YQX+hotuIMtr/q1ZuGeAwot5JvQMv0KZTSfI8u7rTreixnCwTW:jJ6LX+AuIMreZuG3hrvQe0KZTSf473F2
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4268 PING.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4140 wrote to memory of 2708 4140 0729a648a4fb3676068a8d0133456e2d_JaffaCakes118.exe 88 PID 4140 wrote to memory of 2708 4140 0729a648a4fb3676068a8d0133456e2d_JaffaCakes118.exe 88 PID 4140 wrote to memory of 2708 4140 0729a648a4fb3676068a8d0133456e2d_JaffaCakes118.exe 88 PID 2708 wrote to memory of 4268 2708 cmd.exe 90 PID 2708 wrote to memory of 4268 2708 cmd.exe 90 PID 2708 wrote to memory of 4268 2708 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\0729a648a4fb3676068a8d0133456e2d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0729a648a4fb3676068a8d0133456e2d_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\0729a648a4fb3676068a8d0133456e2d_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:4268
-
-