Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06/07/2024, 10:47
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
28442833220ab38cc8b0e3093fcddd7c_JaffaCakes118.exe
Resource
win7-20240704-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
28442833220ab38cc8b0e3093fcddd7c_JaffaCakes118.exe
Resource
win10v2004-20240704-en
4 signatures
150 seconds
General
-
Target
28442833220ab38cc8b0e3093fcddd7c_JaffaCakes118.exe
-
Size
316KB
-
MD5
28442833220ab38cc8b0e3093fcddd7c
-
SHA1
73bc0aea628bf6b6940418cdab28ff5e83d35153
-
SHA256
5112139fc68b53a3f1ac94b28bc9d484443cbc7ccc656e92dbf64457f5f4c4e5
-
SHA512
6cf53a15435d20cb72e8ecad98eaf13416537561b5d3217beb632c0b0e9c3f98f5a85eae163b6dda8cf09b4f560346db4144a168a7bc68d966133449b5931f2a
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiEOVEDzP/xy:FytbV3kSoXaLnToslKDrpy
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1936 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2180 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2520 28442833220ab38cc8b0e3093fcddd7c_JaffaCakes118.exe 2520 28442833220ab38cc8b0e3093fcddd7c_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2520 28442833220ab38cc8b0e3093fcddd7c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2520 wrote to memory of 1936 2520 28442833220ab38cc8b0e3093fcddd7c_JaffaCakes118.exe 30 PID 2520 wrote to memory of 1936 2520 28442833220ab38cc8b0e3093fcddd7c_JaffaCakes118.exe 30 PID 2520 wrote to memory of 1936 2520 28442833220ab38cc8b0e3093fcddd7c_JaffaCakes118.exe 30 PID 1936 wrote to memory of 2180 1936 cmd.exe 32 PID 1936 wrote to memory of 2180 1936 cmd.exe 32 PID 1936 wrote to memory of 2180 1936 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\28442833220ab38cc8b0e3093fcddd7c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\28442833220ab38cc8b0e3093fcddd7c_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\28442833220ab38cc8b0e3093fcddd7c_JaffaCakes118.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2180
-
-