Analysis
-
max time kernel
6s -
max time network
9s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/04/2024, 12:14
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e7700dbda55cb2f9b9e17d61e1c3014a_JaffaCakes118.exe
Resource
win7-20240221-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
e7700dbda55cb2f9b9e17d61e1c3014a_JaffaCakes118.exe
Resource
win10v2004-20240226-en
5 signatures
150 seconds
Errors
Reason
Machine shutdown
General
-
Target
e7700dbda55cb2f9b9e17d61e1c3014a_JaffaCakes118.exe
-
Size
78KB
-
MD5
e7700dbda55cb2f9b9e17d61e1c3014a
-
SHA1
0a2f8c076d2610ee28e95fa0638bed59d444e002
-
SHA256
2470e70583d750270b553d8d61e6a10831fb3dfcc9b5fc702fbc9a32b1407667
-
SHA512
05a9a34d3a092bfa8d4d788cf35d7fe63199755cb060b976d8ca86f3afb06c7877a3ea284bd8ae37824bcaea063b180a76aacdd8f84fcd468000b1b2e68f32d4
-
SSDEEP
1536:cWG/FI34wTFgZ2h93DS8EH7oHzNMLtKXhhRcmU1DpgOAoKJlIK:qI34wTFTh93k7oHCLcvRspBAoKJlIK
Score
8/10
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\slgocck.dll e7700dbda55cb2f9b9e17d61e1c3014a_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 1712 e7700dbda55cb2f9b9e17d61e1c3014a_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7700dbda55cb2f9b9e17d61e1c3014a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e7700dbda55cb2f9b9e17d61e1c3014a_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1712
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:3036
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2676