Analysis
-
max time kernel
138s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 01:34
Static task
static1
Behavioral task
behavioral1
Sample
694e6b6d2181763fce0eb4935f21de22_JaffaCakes118.exe
Resource
win7-20240508-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
694e6b6d2181763fce0eb4935f21de22_JaffaCakes118.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
694e6b6d2181763fce0eb4935f21de22_JaffaCakes118.exe
-
Size
458KB
-
MD5
694e6b6d2181763fce0eb4935f21de22
-
SHA1
aaab711709fa50ef83dd625203ce412229b74c94
-
SHA256
241246b84cd223823e17beb21158d016ec4cc2b73d01ed0517a3b0c9dd11b244
-
SHA512
7652854ca19daa36c039026e95cc228851a580652bda5ccc25f9b6c50596dc0c4bc9fc79adeb1192faa8d55090eb38bc6aeeb6e7d0af9cbac454205972d68886
-
SSDEEP
6144:khcI8Q4aYvSBLRP4bdIMOZ/feg1RNpxDjVZWj/xTONRp23gmzfHM4:kheatDP4b/6RL5jVc9ONRpazV
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
694e6b6d2181763fce0eb4935f21de22_JaffaCakes118.execmd.exedescription pid process target process PID 3324 wrote to memory of 2264 3324 694e6b6d2181763fce0eb4935f21de22_JaffaCakes118.exe cmd.exe PID 3324 wrote to memory of 2264 3324 694e6b6d2181763fce0eb4935f21de22_JaffaCakes118.exe cmd.exe PID 3324 wrote to memory of 2264 3324 694e6b6d2181763fce0eb4935f21de22_JaffaCakes118.exe cmd.exe PID 2264 wrote to memory of 1592 2264 cmd.exe PING.EXE PID 2264 wrote to memory of 1592 2264 cmd.exe PING.EXE PID 2264 wrote to memory of 1592 2264 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\694e6b6d2181763fce0eb4935f21de22_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\694e6b6d2181763fce0eb4935f21de22_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\694e6b6d2181763fce0eb4935f21de22_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:1592
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1328 --field-trial-handle=3060,i,1774866140584649235,8085848018931772189,262144 --variations-seed-version /prefetch:81⤵PID:4240