Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    08/05/2024, 10:00

General

  • Target

    2453adbd25b4d084a571cc3147f7d543_JaffaCakes118.ps1

  • Size

    7KB

  • MD5

    2453adbd25b4d084a571cc3147f7d543

  • SHA1

    dd0e04800a9f40d53952e5edbe1fd11088f41282

  • SHA256

    705232dfcc8721c795355e49b6d4d982c5e0483c9d358b1907e4250b1bdd486d

  • SHA512

    e8f3542633f387803024aad1a6718ddc9420f4f66a07d69a9ffc3e6f3bff7e71b3d284948a1174c9504ad90ea261e525fe18e6c8a54ecccfb080d9e40df222f5

  • SSDEEP

    96:k6EtXKjFaxaXg4Y2NaZvPeFFRdASbwoGWP8Ip2lr7lv5ZlV+6GixBFCb3KK6tN7B:kv6llNaZ6vGpxltLtN7onyEyvnN

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\2453adbd25b4d084a571cc3147f7d543_JaffaCakes118.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3004

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3004-6-0x0000000002860000-0x0000000002868000-memory.dmp

          Filesize

          32KB

        • memory/3004-5-0x000000001B650000-0x000000001B932000-memory.dmp

          Filesize

          2.9MB

        • memory/3004-4-0x000007FEF53FE000-0x000007FEF53FF000-memory.dmp

          Filesize

          4KB

        • memory/3004-7-0x000007FEF5140000-0x000007FEF5ADD000-memory.dmp

          Filesize

          9.6MB

        • memory/3004-8-0x000007FEF5140000-0x000007FEF5ADD000-memory.dmp

          Filesize

          9.6MB

        • memory/3004-9-0x000007FEF5140000-0x000007FEF5ADD000-memory.dmp

          Filesize

          9.6MB

        • memory/3004-10-0x000007FEF5140000-0x000007FEF5ADD000-memory.dmp

          Filesize

          9.6MB

        • memory/3004-11-0x000007FEF5140000-0x000007FEF5ADD000-memory.dmp

          Filesize

          9.6MB