Analysis
-
max time kernel
9s -
max time network
13s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
20-04-2024 06:44
Behavioral task
behavioral1
Sample
fc29acc7941f4eeb0be0baf2c38df787_JaffaCakes118.exe
Resource
win7-20240220-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
fc29acc7941f4eeb0be0baf2c38df787_JaffaCakes118.exe
Resource
win10v2004-20240412-en
windows10-2004-x64
4 signatures
150 seconds
Errors
Reason
Machine shutdown: "{\"level\":\"info\",\"time\":\"2024-04-20T06:44:23Z\",\"message\":\"Dirty snapshot: /var/lib/sandbox/hatchvm/win7-20240220-en/instance_15-dirty.qcow2\"}"
General
-
Target
fc29acc7941f4eeb0be0baf2c38df787_JaffaCakes118.exe
-
Size
7KB
-
MD5
fc29acc7941f4eeb0be0baf2c38df787
-
SHA1
64d19b4fecb4a368440308932f0c087994f5c61f
-
SHA256
ee91905fb5151d7b00736570f633301cc27c34055c7620c5a1970481a2c5d6ff
-
SHA512
26ac88db304d0f7ca27a6c92225dd2e8deeb3a60a4b7e88b2dee257aeeadc13628e7b1f420a5d1bfa5b657df8c88b3b66c2620e4c415d89e0102d7ea11f7ee85
-
SSDEEP
96:rW0ibfoX1MUEyWw4sopxq1X4qijP0LKQyfhJlLISlg0UMDTKZxh3z3o5:d6POWwbopxiXzijPAAJ6+UMXKN4
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/3056-0-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/3056-1-0x0000000000400000-0x0000000000409000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 3056 fc29acc7941f4eeb0be0baf2c38df787_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc29acc7941f4eeb0be0baf2c38df787_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fc29acc7941f4eeb0be0baf2c38df787_JaffaCakes118.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3056
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2924
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2708