Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 11:34
Static task
static1
Behavioral task
behavioral1
Sample
95ef2585373be3d51717c4098ecab07b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
95ef2585373be3d51717c4098ecab07b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
95ef2585373be3d51717c4098ecab07b_JaffaCakes118.exe
-
Size
316KB
-
MD5
95ef2585373be3d51717c4098ecab07b
-
SHA1
122fb94358581b5a1f9045a6d75e90fe43894aa4
-
SHA256
152e963601f9fd28c909de3491910c90603b31535f4320484779f56c8ee482aa
-
SHA512
e8337ab5d8bc02a5edae0343c55d0e85c20804c016b88a848975a608eea9fe35d877c3119c63604b65ac5cfecf3abbda3cb210de4e99edc0ac4a48815b409289
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiExbmY+ypdpW4P0:FytbV3kSoXaLnToslkj+Uy5
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2964 cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2964 cmd.exe 2260 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2260 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2220 95ef2585373be3d51717c4098ecab07b_JaffaCakes118.exe 2220 95ef2585373be3d51717c4098ecab07b_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2220 95ef2585373be3d51717c4098ecab07b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2964 2220 95ef2585373be3d51717c4098ecab07b_JaffaCakes118.exe 30 PID 2220 wrote to memory of 2964 2220 95ef2585373be3d51717c4098ecab07b_JaffaCakes118.exe 30 PID 2220 wrote to memory of 2964 2220 95ef2585373be3d51717c4098ecab07b_JaffaCakes118.exe 30 PID 2964 wrote to memory of 2260 2964 cmd.exe 32 PID 2964 wrote to memory of 2260 2964 cmd.exe 32 PID 2964 wrote to memory of 2260 2964 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\95ef2585373be3d51717c4098ecab07b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\95ef2585373be3d51717c4098ecab07b_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\95ef2585373be3d51717c4098ecab07b_JaffaCakes118.exe"2⤵
- Deletes itself
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2260
-
-