Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-05-2024 14:36
Static task
static1
Behavioral task
behavioral1
Sample
3512d08a932b4b8d6ccdc259def8e064_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3512d08a932b4b8d6ccdc259def8e064_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
3512d08a932b4b8d6ccdc259def8e064_JaffaCakes118.exe
-
Size
690KB
-
MD5
3512d08a932b4b8d6ccdc259def8e064
-
SHA1
420113523781f62428aeb556c35e75da69292177
-
SHA256
1f8ab348af6cbbe737f5831fd3ff5c1313615ef3c15313e42ca6688ece4a7627
-
SHA512
c9bdc77688746f62b88a98d88603cdfb7ee63d618368493a39f839c766ee1d2d8c1fc0ab313440491ef30369705c8c10e864c274fba708477c79fcc7910cfece
-
SSDEEP
12288:Zb7wrmUJeglq/0PwSF0/46I4jlkt4hTF0yhHMLju7Jrn6dYCY3kS5+ZRUk+/KKbw:Zb7wrPJ7lqcY9PJktcp0sz7d+YCYzcEM
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
Powershell.exepid process 2096 Powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Powershell.exedescription pid process Token: SeDebugPrivilege 2096 Powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
3512d08a932b4b8d6ccdc259def8e064_JaffaCakes118.exedescription pid process target process PID 2856 wrote to memory of 2096 2856 3512d08a932b4b8d6ccdc259def8e064_JaffaCakes118.exe Powershell.exe PID 2856 wrote to memory of 2096 2856 3512d08a932b4b8d6ccdc259def8e064_JaffaCakes118.exe Powershell.exe PID 2856 wrote to memory of 2096 2856 3512d08a932b4b8d6ccdc259def8e064_JaffaCakes118.exe Powershell.exe PID 2856 wrote to memory of 2096 2856 3512d08a932b4b8d6ccdc259def8e064_JaffaCakes118.exe Powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3512d08a932b4b8d6ccdc259def8e064_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3512d08a932b4b8d6ccdc259def8e064_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe"Powershell.exe" -ExecutionPolicy UnRestricted -NoLogo [System.Reflection.Assembly]::Load([Convert]::FromBase64String([IO.File]::ReadAllText('C:\Users\Admin\NTUSER'))).EntryPoint.Invoke($null,$null);2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\NTUSERFilesize
340KB
MD57a837a84ff4c1ca8d8604c8fbd104273
SHA1b83d6518e48730bed88066e611a06f01561f8c25
SHA2568253c0a13f03dc521e7e51f2f3a2c1930456f5d544bd56d4138fd677b4eb05db
SHA5123c93820f4db1351df5807510c35c13d2e276b6cf7969936ea4bc30a17e9cf68da22f4d10c5d80a0d60bce6c906c4ac9f75819b3dc2505d6e8f51fc436efd234d
-
memory/2096-7-0x0000000073B91000-0x0000000073B92000-memory.dmpFilesize
4KB
-
memory/2096-9-0x0000000073B90000-0x000000007413B000-memory.dmpFilesize
5.7MB
-
memory/2096-8-0x0000000073B90000-0x000000007413B000-memory.dmpFilesize
5.7MB
-
memory/2096-10-0x0000000073B90000-0x000000007413B000-memory.dmpFilesize
5.7MB
-
memory/2096-12-0x0000000073B90000-0x000000007413B000-memory.dmpFilesize
5.7MB
-
memory/2856-0-0x000000007434E000-0x000000007434F000-memory.dmpFilesize
4KB
-
memory/2856-1-0x00000000000F0000-0x00000000001A2000-memory.dmpFilesize
712KB
-
memory/2856-4-0x0000000074340000-0x0000000074A2E000-memory.dmpFilesize
6.9MB
-
memory/2856-13-0x0000000074340000-0x0000000074A2E000-memory.dmpFilesize
6.9MB