Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 04:44
Static task
static1
Behavioral task
behavioral1
Sample
2d687bee9dca5f9fcc0267c6d28f2e0c_JaffaCakes118.exe
Resource
win7-20240221-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2d687bee9dca5f9fcc0267c6d28f2e0c_JaffaCakes118.exe
Resource
win10v2004-20240508-en
2 signatures
150 seconds
General
-
Target
2d687bee9dca5f9fcc0267c6d28f2e0c_JaffaCakes118.exe
-
Size
486KB
-
MD5
2d687bee9dca5f9fcc0267c6d28f2e0c
-
SHA1
481fd5db8c6e209350aaefc77eb08f7a196cb706
-
SHA256
1139c1c39d57eab081c114296595d7281006b84b67cde3eaa161706a799bbb17
-
SHA512
48db9618f1a5c166576b5bf0f821a4ac74ff7c76f4c9a24677632d8cdfd8f8276f65030883b12d08c4c6feb91d22e638d0a8e9a569e2c4390f44576f4963affe
-
SSDEEP
6144:fq9v6Y99WYaSSutIOHJdKzDF8fsX1v0vRcf3EHd/bfKC9kYoZs:PQIdSSu+OpdKXF8kXaRAKd/bfKsYs
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2528 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2388 PING.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2528 2160 2d687bee9dca5f9fcc0267c6d28f2e0c_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2528 2160 2d687bee9dca5f9fcc0267c6d28f2e0c_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2528 2160 2d687bee9dca5f9fcc0267c6d28f2e0c_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2528 2160 2d687bee9dca5f9fcc0267c6d28f2e0c_JaffaCakes118.exe 30 PID 2528 wrote to memory of 2388 2528 cmd.exe 32 PID 2528 wrote to memory of 2388 2528 cmd.exe 32 PID 2528 wrote to memory of 2388 2528 cmd.exe 32 PID 2528 wrote to memory of 2388 2528 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d687bee9dca5f9fcc0267c6d28f2e0c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2d687bee9dca5f9fcc0267c6d28f2e0c_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\2d687bee9dca5f9fcc0267c6d28f2e0c_JaffaCakes118.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:2388
-
-