Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19-04-2024 16:32
Behavioral task
behavioral1
Sample
fab5dc6e03b8a168cfad2e782d3c104a_JaffaCakes118.exe
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
fab5dc6e03b8a168cfad2e782d3c104a_JaffaCakes118.exe
Resource
win10v2004-20240412-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
fab5dc6e03b8a168cfad2e782d3c104a_JaffaCakes118.exe
-
Size
66KB
-
MD5
fab5dc6e03b8a168cfad2e782d3c104a
-
SHA1
79f117d9a1c97c909167eca075f066db098345a0
-
SHA256
4a6f91c623f3051929f0f20f7884a3e6be5e5ec79db908bf0a7b6d4393def6eb
-
SHA512
c61389b3ad65a67e333abebc1b9ab5cdbf8c6b31150e864e2a6431370ff0c315a51c7d26ac6fe3bc29acbf60b6d007e73b0bf6035c87848dc00dc33385d674ca
-
SSDEEP
768:Mnpk5ZnhBgrLGBYR5b6NvOq8+RXVo8x8t8bwpaOnRLn:Mnpk5ZhijR5WYq8+RXVo8x8t8bQamn
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3784-0-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/3784-1-0x0000000000400000-0x0000000000412000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 3784 fab5dc6e03b8a168cfad2e782d3c104a_JaffaCakes118.exe