Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-05-2024 13:26
Static task
static1
Behavioral task
behavioral1
Sample
12ef735e7a1fb227acf5827b57ea31ee_JaffaCakes118.exe
Resource
win7-20240221-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
12ef735e7a1fb227acf5827b57ea31ee_JaffaCakes118.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
12ef735e7a1fb227acf5827b57ea31ee_JaffaCakes118.exe
-
Size
466KB
-
MD5
12ef735e7a1fb227acf5827b57ea31ee
-
SHA1
6af37a7e3fc3ccfd1c46cba08ac6957241a528cb
-
SHA256
1182d7175e153678266ae472c8b5ac6ddcd3139d0ad3a6a640ffee33994b56ff
-
SHA512
b8914d4f805bb86628a6b705027b3284ad6c6dd440fee20ba3bdb7b663d7d5db0dd34a8ce6b8a1e7f1c32d3f89deb6238dcab5bbd7d4e2bc880570dd09b9cc56
-
SSDEEP
6144:EtbnBjBRSZjS7msxoUB1qtSdaZdV/m2Y91uM+dz0U6RjCFh4sPxL2nTSABYnW:UBP7msxtqgEQ1SwZMFh4sPs9mW
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2568 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2712 PING.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2492 wrote to memory of 2568 2492 12ef735e7a1fb227acf5827b57ea31ee_JaffaCakes118.exe 30 PID 2492 wrote to memory of 2568 2492 12ef735e7a1fb227acf5827b57ea31ee_JaffaCakes118.exe 30 PID 2492 wrote to memory of 2568 2492 12ef735e7a1fb227acf5827b57ea31ee_JaffaCakes118.exe 30 PID 2492 wrote to memory of 2568 2492 12ef735e7a1fb227acf5827b57ea31ee_JaffaCakes118.exe 30 PID 2568 wrote to memory of 2712 2568 cmd.exe 32 PID 2568 wrote to memory of 2712 2568 cmd.exe 32 PID 2568 wrote to memory of 2712 2568 cmd.exe 32 PID 2568 wrote to memory of 2712 2568 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\12ef735e7a1fb227acf5827b57ea31ee_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\12ef735e7a1fb227acf5827b57ea31ee_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\12ef735e7a1fb227acf5827b57ea31ee_JaffaCakes118.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:2712
-
-