Analysis
-
max time kernel
125s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02-05-2024 08:14
Behavioral task
behavioral1
Sample
0df73d88a049d8a9f761e3880e0f76d9_JaffaCakes118.ps1
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0df73d88a049d8a9f761e3880e0f76d9_JaffaCakes118.ps1
Resource
win10v2004-20240419-en
General
-
Target
0df73d88a049d8a9f761e3880e0f76d9_JaffaCakes118.ps1
-
Size
218KB
-
MD5
0df73d88a049d8a9f761e3880e0f76d9
-
SHA1
a42d4fdb38ba695187591fd2155cca7e4075d006
-
SHA256
e6c004a175a684d76533ce3835f76b89977a92e3d4ac0945305a89d3490e9c6a
-
SHA512
b35032d24eb40702d5382869a767173500baacaaa325352fdb72aaf2a9e767c3245ce339b176140bf344b16fa7730e5cb6034dee29f1e595f2941e4f77672fa8
-
SSDEEP
3072:vUGohZPM/yTRR96XuG5Ez5FgfrG+2upRQ/3UFkxTK7Yh+4q2vzGPWCZmDXuVu5VZ:MOurzYQ/3Skxe7YhLI+KInlKOZf
Malware Config
Signatures
-
Blocklisted process makes network request 4 IoCs
Processes:
powershell.exeflow pid process 3 2192 powershell.exe 5 2192 powershell.exe 8 2192 powershell.exe 9 2192 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 2192 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2192 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\0df73d88a049d8a9f761e3880e0f76d9_JaffaCakes118.ps11⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2192-4-0x000007FEF60DE000-0x000007FEF60DF000-memory.dmpFilesize
4KB
-
memory/2192-5-0x000000001B6A0000-0x000000001B982000-memory.dmpFilesize
2.9MB
-
memory/2192-7-0x000007FEF5E20000-0x000007FEF67BD000-memory.dmpFilesize
9.6MB
-
memory/2192-6-0x0000000002860000-0x0000000002868000-memory.dmpFilesize
32KB
-
memory/2192-8-0x000007FEF5E20000-0x000007FEF67BD000-memory.dmpFilesize
9.6MB
-
memory/2192-9-0x000007FEF5E20000-0x000007FEF67BD000-memory.dmpFilesize
9.6MB
-
memory/2192-10-0x000007FEF5E20000-0x000007FEF67BD000-memory.dmpFilesize
9.6MB
-
memory/2192-11-0x000007FEF5E20000-0x000007FEF67BD000-memory.dmpFilesize
9.6MB
-
memory/2192-12-0x000007FEF5E20000-0x000007FEF67BD000-memory.dmpFilesize
9.6MB
-
memory/2192-13-0x000007FEF5E20000-0x000007FEF67BD000-memory.dmpFilesize
9.6MB
-
memory/2192-14-0x000007FEF60DE000-0x000007FEF60DF000-memory.dmpFilesize
4KB