Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08-07-2024 14:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2ca193572cdf69e9446be0eb8389f801_JaffaCakes118.exe
Resource
win7-20240704-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
2ca193572cdf69e9446be0eb8389f801_JaffaCakes118.exe
Resource
win10v2004-20240704-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
2ca193572cdf69e9446be0eb8389f801_JaffaCakes118.exe
-
Size
98KB
-
MD5
2ca193572cdf69e9446be0eb8389f801
-
SHA1
579987814ddcb4acb9b4044800a5acbc61ca5765
-
SHA256
f7c0dbd6b7ef196492e47779a7d53485b3b22f671c7689220e2706df6059c462
-
SHA512
2a7edf0c4eae00731a502b289309e37a2df56b4f83e76fe6149aee41bbc440e049ff015982557ab6c37bd6f3a595203707f49a8abec85aa2d7c5d48db7f40808
-
SSDEEP
1536:qq7hjiLjBmD4TBCs8Zrrugwz8AsBC/z4toaf1000:qGhjWjBmMTBCs8ZnuJsk/zcf1n0
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2648 cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main 2ca193572cdf69e9446be0eb8389f801_JaffaCakes118.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1808 PING.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2708 2ca193572cdf69e9446be0eb8389f801_JaffaCakes118.exe 2708 2ca193572cdf69e9446be0eb8389f801_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2648 2708 2ca193572cdf69e9446be0eb8389f801_JaffaCakes118.exe 32 PID 2708 wrote to memory of 2648 2708 2ca193572cdf69e9446be0eb8389f801_JaffaCakes118.exe 32 PID 2708 wrote to memory of 2648 2708 2ca193572cdf69e9446be0eb8389f801_JaffaCakes118.exe 32 PID 2708 wrote to memory of 2648 2708 2ca193572cdf69e9446be0eb8389f801_JaffaCakes118.exe 32 PID 2648 wrote to memory of 1808 2648 cmd.exe 34 PID 2648 wrote to memory of 1808 2648 cmd.exe 34 PID 2648 wrote to memory of 1808 2648 cmd.exe 34 PID 2648 wrote to memory of 1808 2648 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ca193572cdf69e9446be0eb8389f801_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ca193572cdf69e9446be0eb8389f801_JaffaCakes118.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\cmd.execmd.exe /e:on /d /c ping -n 6 127.0.0.1 && DEL /F "C:\Users\Admin\AppData\Local\Temp\2ca193572cdf69e9446be0eb8389f801_JaffaCakes118.exe" >> nul2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\PING.EXEping -n 6 127.0.0.13⤵
- Runs ping.exe
PID:1808
-
-