Analysis

  • max time kernel
    141s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    21/04/2024, 14:45

General

  • Target

    ff853b9eb04d18ba0141d90fee516f27_JaffaCakes118.exe

  • Size

    97KB

  • MD5

    ff853b9eb04d18ba0141d90fee516f27

  • SHA1

    bc687a8a931987257454dcfcf21151f493cb8425

  • SHA256

    942b9fc9f81f3dc6a4ef027d7a0a24b07c323dab8f992188bda6f0d416aa13f6

  • SHA512

    cbec41b3817f22b1cfbabf6c7c57641ea3a14b51fc9e3c6ef304924b025211b866a24f8d037b86f2b5167b5fc8ddc986237d635f3bcc20512d8da232acba8f9f

  • SSDEEP

    1536:51IjsLmIDpsg34biwAz90VbNj7tdAzXof1tqkzOO5cSi4iXHifKvtotm:5ajsbSgKAz9CdAzXE1YXPOKvtotm

Score
1/10

Malware Config

Signatures

  • Kills process with taskkill 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ff853b9eb04d18ba0141d90fee516f27_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ff853b9eb04d18ba0141d90fee516f27_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2768
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill.exe /F /IM MSASCui.exe
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2812

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2768-0-0x0000000000250000-0x000000000025C000-memory.dmp

    Filesize

    48KB

  • memory/2768-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2768-2-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB