Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
13/06/2024, 00:06
Static task
static1
Behavioral task
behavioral1
Sample
a3126f52540b7d871330a92f8d149c86_JaffaCakes118.exe
Resource
win7-20231129-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
a3126f52540b7d871330a92f8d149c86_JaffaCakes118.exe
Resource
win10v2004-20240508-en
2 signatures
150 seconds
General
-
Target
a3126f52540b7d871330a92f8d149c86_JaffaCakes118.exe
-
Size
470KB
-
MD5
a3126f52540b7d871330a92f8d149c86
-
SHA1
c71803017bca71f7e057ecb90a55ad8953d10711
-
SHA256
11804fbf1dbf4bb73fd1b33d7be15029b6894c75128bd6cee1277ce353129459
-
SHA512
2103d4f40f28d30d3f582d1f15d9e537b1f23f02d1984412347ee57f508a8f6e188099fee8a6751bc53a62a1e6c0738fd97dc85dcab44976f38a27e1e06952de
-
SSDEEP
12288:tx5ARbqSj6AmDImva+3Vqckf+ewtWZh35:tx5IJO0mvaes+ewtOh35
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2692 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2704 PING.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2692 2392 a3126f52540b7d871330a92f8d149c86_JaffaCakes118.exe 30 PID 2392 wrote to memory of 2692 2392 a3126f52540b7d871330a92f8d149c86_JaffaCakes118.exe 30 PID 2392 wrote to memory of 2692 2392 a3126f52540b7d871330a92f8d149c86_JaffaCakes118.exe 30 PID 2392 wrote to memory of 2692 2392 a3126f52540b7d871330a92f8d149c86_JaffaCakes118.exe 30 PID 2692 wrote to memory of 2704 2692 cmd.exe 32 PID 2692 wrote to memory of 2704 2692 cmd.exe 32 PID 2692 wrote to memory of 2704 2692 cmd.exe 32 PID 2692 wrote to memory of 2704 2692 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3126f52540b7d871330a92f8d149c86_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a3126f52540b7d871330a92f8d149c86_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\a3126f52540b7d871330a92f8d149c86_JaffaCakes118.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:2704
-
-