Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
03-10-2024 16:51
Static task
static1
Behavioral task
behavioral1
Sample
0fb5f426a8ec400a5e365f9ca5adf0a6_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0fb5f426a8ec400a5e365f9ca5adf0a6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0fb5f426a8ec400a5e365f9ca5adf0a6_JaffaCakes118.exe
-
Size
488KB
-
MD5
0fb5f426a8ec400a5e365f9ca5adf0a6
-
SHA1
9dc78b060b02df6bb52d691d51893ed3908311d2
-
SHA256
b34885c7a910b4d287de94578dd4a28fb6bd48596fa9192766aea92ed10a004f
-
SHA512
65ba401fef2328a236be2c39dd71e415b3f05e405cea8f908e7fac30b6fb941e6ecb1900ab675cb82be0eabe5a2bf58cd4ee560ba0e3dfbb7e0862e1d2579f67
-
SSDEEP
12288:FytbV3kSoXaLnTosl6ZOnDmWbMPsRakqNyy0o:Eb5kSYaLTVl6Zr8MUlS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2468 cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2468 cmd.exe 2792 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2792 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1508 0fb5f426a8ec400a5e365f9ca5adf0a6_JaffaCakes118.exe 1508 0fb5f426a8ec400a5e365f9ca5adf0a6_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1508 0fb5f426a8ec400a5e365f9ca5adf0a6_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1508 wrote to memory of 2468 1508 0fb5f426a8ec400a5e365f9ca5adf0a6_JaffaCakes118.exe 30 PID 1508 wrote to memory of 2468 1508 0fb5f426a8ec400a5e365f9ca5adf0a6_JaffaCakes118.exe 30 PID 1508 wrote to memory of 2468 1508 0fb5f426a8ec400a5e365f9ca5adf0a6_JaffaCakes118.exe 30 PID 2468 wrote to memory of 2792 2468 cmd.exe 32 PID 2468 wrote to memory of 2792 2468 cmd.exe 32 PID 2468 wrote to memory of 2792 2468 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\0fb5f426a8ec400a5e365f9ca5adf0a6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0fb5f426a8ec400a5e365f9ca5adf0a6_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\0fb5f426a8ec400a5e365f9ca5adf0a6_JaffaCakes118.exe"2⤵
- Deletes itself
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2792
-
-