Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/05/2024, 21:05
Static task
static1
Behavioral task
behavioral1
Sample
147a531fad5c345cac4028e8cd13533c_JaffaCakes118.exe
Resource
win7-20240221-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
147a531fad5c345cac4028e8cd13533c_JaffaCakes118.exe
Resource
win10v2004-20240226-en
2 signatures
150 seconds
General
-
Target
147a531fad5c345cac4028e8cd13533c_JaffaCakes118.exe
-
Size
330KB
-
MD5
147a531fad5c345cac4028e8cd13533c
-
SHA1
e3ff448349cfde00df570ebe6595f824b8060698
-
SHA256
ac1853aac80eadee0246b72ad9cf09d11acf3424002897e84de15d8636b53e06
-
SHA512
6e1648f1f29e29d97e776c774afd84cfe8629301b84177bda3be54a91eb5c8c3711d8e4b2bde2c5aaaa0eee1dddb61546ffa06f8a84a8d4043a24d274242288b
-
SSDEEP
6144:zSnrWLijLDO8xgDK4ldhAV4lpx5YULmRNCYzGXnp+v:+nrWG/DO/Db3w4lpPYQM7GXp+v
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2648 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2436 PING.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1296 wrote to memory of 2648 1296 147a531fad5c345cac4028e8cd13533c_JaffaCakes118.exe 30 PID 1296 wrote to memory of 2648 1296 147a531fad5c345cac4028e8cd13533c_JaffaCakes118.exe 30 PID 1296 wrote to memory of 2648 1296 147a531fad5c345cac4028e8cd13533c_JaffaCakes118.exe 30 PID 1296 wrote to memory of 2648 1296 147a531fad5c345cac4028e8cd13533c_JaffaCakes118.exe 30 PID 2648 wrote to memory of 2436 2648 cmd.exe 32 PID 2648 wrote to memory of 2436 2648 cmd.exe 32 PID 2648 wrote to memory of 2436 2648 cmd.exe 32 PID 2648 wrote to memory of 2436 2648 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\147a531fad5c345cac4028e8cd13533c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\147a531fad5c345cac4028e8cd13533c_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\147a531fad5c345cac4028e8cd13533c_JaffaCakes118.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:2436
-
-