Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
02-05-2024 15:28
Static task
static1
Behavioral task
behavioral1
Sample
0ee1eb807f3e2ba9790b2bfeae6b495a_JaffaCakes118.exe
Resource
win7-20240221-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
0ee1eb807f3e2ba9790b2bfeae6b495a_JaffaCakes118.exe
Resource
win10v2004-20240419-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
0ee1eb807f3e2ba9790b2bfeae6b495a_JaffaCakes118.exe
-
Size
393KB
-
MD5
0ee1eb807f3e2ba9790b2bfeae6b495a
-
SHA1
16a000e17bd4c2c45e2797174e90aec80795fc3d
-
SHA256
208e86bbbce6551a48c1afb28210e61afc6032c4d4504e38ea6b46e78a6f14a5
-
SHA512
15f61b78f085771dc439e28887b25db7f386e78a6f1c92a9ca6d7c2b8196fee9077528fab185c7c9869b3e166fd13d2f1d40bd318d88f5a67cb85cf99de7ee3d
-
SSDEEP
6144:ioscRUEZ9exrQhFxExo0VStR3qxTiE848BLzcDQGoAM1+34IGSYxh0g:imUk+Wx8oSiuiQ8uQ1+5GSng
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2324 PING.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4188 wrote to memory of 1944 4188 0ee1eb807f3e2ba9790b2bfeae6b495a_JaffaCakes118.exe 93 PID 4188 wrote to memory of 1944 4188 0ee1eb807f3e2ba9790b2bfeae6b495a_JaffaCakes118.exe 93 PID 4188 wrote to memory of 1944 4188 0ee1eb807f3e2ba9790b2bfeae6b495a_JaffaCakes118.exe 93 PID 1944 wrote to memory of 2324 1944 cmd.exe 95 PID 1944 wrote to memory of 2324 1944 cmd.exe 95 PID 1944 wrote to memory of 2324 1944 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ee1eb807f3e2ba9790b2bfeae6b495a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0ee1eb807f3e2ba9790b2bfeae6b495a_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\0ee1eb807f3e2ba9790b2bfeae6b495a_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:2324
-
-