Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
13-05-2024 23:40
Static task
static1
Behavioral task
behavioral1
Sample
3d0eec8c53b3ab7fa5b2f0d06987a15b_JaffaCakes118.exe
Resource
win7-20240220-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
3d0eec8c53b3ab7fa5b2f0d06987a15b_JaffaCakes118.exe
Resource
win10v2004-20240426-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
3d0eec8c53b3ab7fa5b2f0d06987a15b_JaffaCakes118.exe
-
Size
322KB
-
MD5
3d0eec8c53b3ab7fa5b2f0d06987a15b
-
SHA1
65e9ba0292f87150f79f39efd558e3868dca61d6
-
SHA256
069058fd00ce55c993c2c70f25aade45984c0f57573e7b26d204d64f544a947b
-
SHA512
dacce7f8830941c43384cca2ca93186f3309148b01ad3db0e7956af8ee2b8074de6584fd56d0e2ae052404d79e320251e570e67435f8fd3c1043ffec87420ceb
-
SSDEEP
6144:hIniZk+NHW1LnCiaE/YLJmzPel+zLklFvWWOs:hIdsW1LnjiQk0s
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2568 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2552 PING.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2568 2764 3d0eec8c53b3ab7fa5b2f0d06987a15b_JaffaCakes118.exe 30 PID 2764 wrote to memory of 2568 2764 3d0eec8c53b3ab7fa5b2f0d06987a15b_JaffaCakes118.exe 30 PID 2764 wrote to memory of 2568 2764 3d0eec8c53b3ab7fa5b2f0d06987a15b_JaffaCakes118.exe 30 PID 2764 wrote to memory of 2568 2764 3d0eec8c53b3ab7fa5b2f0d06987a15b_JaffaCakes118.exe 30 PID 2568 wrote to memory of 2552 2568 cmd.exe 32 PID 2568 wrote to memory of 2552 2568 cmd.exe 32 PID 2568 wrote to memory of 2552 2568 cmd.exe 32 PID 2568 wrote to memory of 2552 2568 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d0eec8c53b3ab7fa5b2f0d06987a15b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3d0eec8c53b3ab7fa5b2f0d06987a15b_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\3d0eec8c53b3ab7fa5b2f0d06987a15b_JaffaCakes118.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:2552
-
-