Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 16:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
38f8ceb1081cb4259772f4ea4b51a40a_JaffaCakes118.exe
Resource
win7-20240704-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
38f8ceb1081cb4259772f4ea4b51a40a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
2 signatures
150 seconds
General
-
Target
38f8ceb1081cb4259772f4ea4b51a40a_JaffaCakes118.exe
-
Size
31KB
-
MD5
38f8ceb1081cb4259772f4ea4b51a40a
-
SHA1
87588e4a846d27e3c5b8b380dcbe895c057fd479
-
SHA256
3163cea7eaca94ee4f3b57e6831cb203f690a3f76451694eb0961312bc4e14c0
-
SHA512
97b0909ac424240fb4438169e76613be494b25b4bddce685d98eb14d15479d4987cad73eaea800742222ca8156d619c422131ffd7dba7fe10a3f8b7f9e9d7ff9
-
SSDEEP
768:zIPfXOhlKoLxtCt74y/842kGim5admgS0CX0MQu:4CKoLD+h/84UimkdxMQu
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4612 38f8ceb1081cb4259772f4ea4b51a40a_JaffaCakes118.exe 4612 38f8ceb1081cb4259772f4ea4b51a40a_JaffaCakes118.exe 4612 38f8ceb1081cb4259772f4ea4b51a40a_JaffaCakes118.exe 4612 38f8ceb1081cb4259772f4ea4b51a40a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4612 wrote to memory of 3588 4612 38f8ceb1081cb4259772f4ea4b51a40a_JaffaCakes118.exe 56 PID 4612 wrote to memory of 3588 4612 38f8ceb1081cb4259772f4ea4b51a40a_JaffaCakes118.exe 56 PID 4612 wrote to memory of 3588 4612 38f8ceb1081cb4259772f4ea4b51a40a_JaffaCakes118.exe 56 PID 4612 wrote to memory of 3588 4612 38f8ceb1081cb4259772f4ea4b51a40a_JaffaCakes118.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3588
-
C:\Users\Admin\AppData\Local\Temp\38f8ceb1081cb4259772f4ea4b51a40a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\38f8ceb1081cb4259772f4ea4b51a40a_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4612
-