Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 07:05
Static task
static1
Behavioral task
behavioral1
Sample
fbc10919d4aad8541a4918f42fe01e69_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fbc10919d4aad8541a4918f42fe01e69_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fbc10919d4aad8541a4918f42fe01e69_JaffaCakes118.exe
-
Size
316KB
-
MD5
fbc10919d4aad8541a4918f42fe01e69
-
SHA1
aadc56ee862f7c10c7af4274ac9121f1a61a8725
-
SHA256
12af9ee61808dd1660a4c81632fd86be5ab6c5dc5cc673a1370f19934118e779
-
SHA512
d1d7c1d7bb6208b96c29572e1300013c4b6bab9682ba6c293e06cd99f23caba55885cad3a0cdba74f1cae6fecfd5f94e0ee3a4d53b7ec3696b1c4a43447c9fff
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiEtSc8v44BVTTY+:FytbV3kSoXaLnToslC2NBa+
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2388 cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2388 cmd.exe 2020 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2020 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1732 fbc10919d4aad8541a4918f42fe01e69_JaffaCakes118.exe 1732 fbc10919d4aad8541a4918f42fe01e69_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1732 fbc10919d4aad8541a4918f42fe01e69_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2388 1732 fbc10919d4aad8541a4918f42fe01e69_JaffaCakes118.exe 30 PID 1732 wrote to memory of 2388 1732 fbc10919d4aad8541a4918f42fe01e69_JaffaCakes118.exe 30 PID 1732 wrote to memory of 2388 1732 fbc10919d4aad8541a4918f42fe01e69_JaffaCakes118.exe 30 PID 2388 wrote to memory of 2020 2388 cmd.exe 32 PID 2388 wrote to memory of 2020 2388 cmd.exe 32 PID 2388 wrote to memory of 2020 2388 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbc10919d4aad8541a4918f42fe01e69_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fbc10919d4aad8541a4918f42fe01e69_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\fbc10919d4aad8541a4918f42fe01e69_JaffaCakes118.exe"2⤵
- Deletes itself
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2020
-
-