Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 12:22
Static task
static1
Behavioral task
behavioral1
Sample
5f0c59ee4adb2b9a4b2f7e1b57eb33ca_JaffaCakes118.exe
Resource
win7-20240221-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
5f0c59ee4adb2b9a4b2f7e1b57eb33ca_JaffaCakes118.exe
Resource
win10v2004-20240508-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
5f0c59ee4adb2b9a4b2f7e1b57eb33ca_JaffaCakes118.exe
-
Size
466KB
-
MD5
5f0c59ee4adb2b9a4b2f7e1b57eb33ca
-
SHA1
3f980da246174b890fc1f1b19f2ae8281732447c
-
SHA256
15cd0695d697d7a2faa503cc4da06c5266259fccad0074e65d752ada95027b84
-
SHA512
6f8e6e23aafe659a2ff4c274274e5c28e081e2f7bcab583384b95331864dc9fcb3bbe8f4f501030766507c909222dd99f286810157bf7eada038157cb1358e3a
-
SSDEEP
6144:m9MT1T4ggXKBkj9eROvmZATIqdOApCERLiH90KxLSciGU73pkOh2tQ2AFrnv:miTKBj96OOaI87CERLiH90KxrijpX3zv
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2444 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2568 PING.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2892 wrote to memory of 2444 2892 5f0c59ee4adb2b9a4b2f7e1b57eb33ca_JaffaCakes118.exe 33 PID 2892 wrote to memory of 2444 2892 5f0c59ee4adb2b9a4b2f7e1b57eb33ca_JaffaCakes118.exe 33 PID 2892 wrote to memory of 2444 2892 5f0c59ee4adb2b9a4b2f7e1b57eb33ca_JaffaCakes118.exe 33 PID 2892 wrote to memory of 2444 2892 5f0c59ee4adb2b9a4b2f7e1b57eb33ca_JaffaCakes118.exe 33 PID 2444 wrote to memory of 2568 2444 cmd.exe 35 PID 2444 wrote to memory of 2568 2444 cmd.exe 35 PID 2444 wrote to memory of 2568 2444 cmd.exe 35 PID 2444 wrote to memory of 2568 2444 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f0c59ee4adb2b9a4b2f7e1b57eb33ca_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5f0c59ee4adb2b9a4b2f7e1b57eb33ca_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\5f0c59ee4adb2b9a4b2f7e1b57eb33ca_JaffaCakes118.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:2568
-
-