Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2024, 10:52
Static task
static1
Behavioral task
behavioral1
Sample
05898524789d53af736bfa913fe057a7_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
05898524789d53af736bfa913fe057a7_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
05898524789d53af736bfa913fe057a7_JaffaCakes118.exe
-
Size
316KB
-
MD5
05898524789d53af736bfa913fe057a7
-
SHA1
c7b4f6c211899d6d56c2f231e6077e7b5a6213df
-
SHA256
c261241b2fe871fa42f6e48e4c1028e0f3c3ea1cc1f803fb61188cf6c3a277c5
-
SHA512
b9a7a95f93f3f29075cb9d9c66cbcac411fb02b67ce8a803f49ae03e38d93777ea79668de805b4bc7567d544f898f22d42e531525052afff6384211ac149762d
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiE4e6Aq1C:FytbV3kSoXaLnToslZC
Malware Config
Signatures
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3688 cmd.exe 3296 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3296 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4912 05898524789d53af736bfa913fe057a7_JaffaCakes118.exe 4912 05898524789d53af736bfa913fe057a7_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4912 05898524789d53af736bfa913fe057a7_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4912 wrote to memory of 3688 4912 05898524789d53af736bfa913fe057a7_JaffaCakes118.exe 84 PID 4912 wrote to memory of 3688 4912 05898524789d53af736bfa913fe057a7_JaffaCakes118.exe 84 PID 3688 wrote to memory of 3296 3688 cmd.exe 86 PID 3688 wrote to memory of 3296 3688 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\05898524789d53af736bfa913fe057a7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\05898524789d53af736bfa913fe057a7_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\05898524789d53af736bfa913fe057a7_JaffaCakes118.exe"2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3296
-
-