Analysis
-
max time kernel
7s -
max time network
11s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21/04/2024, 18:01
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ffd905231df365042fc65bef59cd3e65_JaffaCakes118.exe
Resource
win7-20240221-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
ffd905231df365042fc65bef59cd3e65_JaffaCakes118.exe
Resource
win10v2004-20240412-en
5 signatures
150 seconds
Errors
Reason
Machine shutdown: "{\"level\":\"info\",\"time\":\"2024-04-21T18:01:23Z\",\"message\":\"Dirty snapshot: /var/lib/sandbox/hatchvm/win7-20240221-en/instance_12-dirty.qcow2\"}"
General
-
Target
ffd905231df365042fc65bef59cd3e65_JaffaCakes118.exe
-
Size
124KB
-
MD5
ffd905231df365042fc65bef59cd3e65
-
SHA1
f704ec89f0dc0965aada951bc08cc0f70c02f4f4
-
SHA256
68a6c17bf04a11cc7f88fb815ef68ecf6805838a4c52af7a344aef91be191b64
-
SHA512
2575e42fa07802eeee0b4f4b0dd5b18790d99d21c5b89d2e14481fb097ecb9596ae9a6b25899ed94007c10c7147b1a9b3f21c902f623292fe244c56e49558579
-
SSDEEP
3072:qipJFTJOR1kVR9SCiNHGrHOuQoirwMiLiHo5LWAE5zY:qiFTJq1299QHGruho1VX6z
Score
8/10
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\lgmxbuh.dll ffd905231df365042fc65bef59cd3e65_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 2020 ffd905231df365042fc65bef59cd3e65_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ffd905231df365042fc65bef59cd3e65_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ffd905231df365042fc65bef59cd3e65_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2020
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2064
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2584