Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
07-05-2024 22:17
Static task
static1
Behavioral task
behavioral1
Sample
21f52ba8ab460d1a1e9351944752ad7a_JaffaCakes118.exe
Resource
win7-20231129-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
21f52ba8ab460d1a1e9351944752ad7a_JaffaCakes118.exe
Resource
win10v2004-20240419-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
21f52ba8ab460d1a1e9351944752ad7a_JaffaCakes118.exe
-
Size
466KB
-
MD5
21f52ba8ab460d1a1e9351944752ad7a
-
SHA1
65b236ce20049c0184e96480915e2ef16a4fbd29
-
SHA256
10933f83b52b380ab7ce7ec881f4f6eedc4c80191437380d1602dc9bcce9da04
-
SHA512
0c54bfcbe4ec44ca25f1cde06758c3ecefd80ffe10af7796a617f3279dcbf5092611770dc3c69d1e1dbe62a91d0ee6054b0e47a2af066054099cce499c9aa527
-
SSDEEP
12288:g0Hr6Apk5OCmEJ8AeQ8YspTBLBbSHGDg/btFv:ri8s85BBluG+t
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2588 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2572 PING.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2588 2168 21f52ba8ab460d1a1e9351944752ad7a_JaffaCakes118.exe 30 PID 2168 wrote to memory of 2588 2168 21f52ba8ab460d1a1e9351944752ad7a_JaffaCakes118.exe 30 PID 2168 wrote to memory of 2588 2168 21f52ba8ab460d1a1e9351944752ad7a_JaffaCakes118.exe 30 PID 2168 wrote to memory of 2588 2168 21f52ba8ab460d1a1e9351944752ad7a_JaffaCakes118.exe 30 PID 2588 wrote to memory of 2572 2588 cmd.exe 32 PID 2588 wrote to memory of 2572 2588 cmd.exe 32 PID 2588 wrote to memory of 2572 2588 cmd.exe 32 PID 2588 wrote to memory of 2572 2588 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\21f52ba8ab460d1a1e9351944752ad7a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\21f52ba8ab460d1a1e9351944752ad7a_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\21f52ba8ab460d1a1e9351944752ad7a_JaffaCakes118.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:2572
-
-