Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
31/05/2024, 01:18
Static task
static1
Behavioral task
behavioral1
Sample
858fa1781ffd396577fbc63db1f873ba_JaffaCakes118.exe
Resource
win7-20240221-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
858fa1781ffd396577fbc63db1f873ba_JaffaCakes118.exe
Resource
win10v2004-20240426-en
2 signatures
150 seconds
General
-
Target
858fa1781ffd396577fbc63db1f873ba_JaffaCakes118.exe
-
Size
466KB
-
MD5
858fa1781ffd396577fbc63db1f873ba
-
SHA1
ffdb86bc9286b83f87a6e4aa9b1143808d3d221c
-
SHA256
24d199e44317c9405aeb9b893e2ad7c89605e479e7d220727a8a978996150034
-
SHA512
548d1f99b3e55782a440b400e47cd3a3e774c3d2976b7aad8d321bb56a0f236847fb372fc54e0c74fe9a10621deb162545371853cad1dcdffe2cd6abc540f59a
-
SSDEEP
6144:T+ZiKr1JhA8xDWxFjmSyRt5BkJjlHI7p901d/hH0l/YqYHkyfEc8Lenr:SZioa8kxYGptd/xK/Pgr
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1448 PING.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5064 wrote to memory of 4164 5064 858fa1781ffd396577fbc63db1f873ba_JaffaCakes118.exe 90 PID 5064 wrote to memory of 4164 5064 858fa1781ffd396577fbc63db1f873ba_JaffaCakes118.exe 90 PID 5064 wrote to memory of 4164 5064 858fa1781ffd396577fbc63db1f873ba_JaffaCakes118.exe 90 PID 4164 wrote to memory of 1448 4164 cmd.exe 92 PID 4164 wrote to memory of 1448 4164 cmd.exe 92 PID 4164 wrote to memory of 1448 4164 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\858fa1781ffd396577fbc63db1f873ba_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\858fa1781ffd396577fbc63db1f873ba_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\858fa1781ffd396577fbc63db1f873ba_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:1448
-
-