Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 04:14
Static task
static1
Behavioral task
behavioral1
Sample
2841ff4d9d0c98485397c29ebacf172c_JaffaCakes118.exe
Resource
win7-20240221-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2841ff4d9d0c98485397c29ebacf172c_JaffaCakes118.exe
Resource
win10v2004-20240508-en
2 signatures
150 seconds
General
-
Target
2841ff4d9d0c98485397c29ebacf172c_JaffaCakes118.exe
-
Size
458KB
-
MD5
2841ff4d9d0c98485397c29ebacf172c
-
SHA1
52aa7cbc8889b6da2e3cfe8e48b86b4d4f081b8d
-
SHA256
205dcbedf8e0d388a9f05c823f30e6d1fd94b6efb480a1dea9cc4a316fa2b7aa
-
SHA512
06133627948d830e5b7c36b81f001ef895495f1276f5fc359833563eb9bc15d17a1318c4e9a7b1f4c1330ad7eaf4703f9d92d5336076747fe762a18cb72aa80e
-
SSDEEP
6144:qUsesMAlvASzVyH5xORjFzbT9WA3seuhQsDhgZeQsaSdtsxTFYiGgYAN+8R2o:eesMA6xCjFzXkdh5OZ8s1CiGgS
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1532 PING.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4772 wrote to memory of 4420 4772 2841ff4d9d0c98485397c29ebacf172c_JaffaCakes118.exe 82 PID 4772 wrote to memory of 4420 4772 2841ff4d9d0c98485397c29ebacf172c_JaffaCakes118.exe 82 PID 4772 wrote to memory of 4420 4772 2841ff4d9d0c98485397c29ebacf172c_JaffaCakes118.exe 82 PID 4420 wrote to memory of 1532 4420 cmd.exe 84 PID 4420 wrote to memory of 1532 4420 cmd.exe 84 PID 4420 wrote to memory of 1532 4420 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2841ff4d9d0c98485397c29ebacf172c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2841ff4d9d0c98485397c29ebacf172c_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\2841ff4d9d0c98485397c29ebacf172c_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:1532
-
-