Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
12-05-2024 02:58
Behavioral task
behavioral1
Sample
37e602c075b556227abcc2e6496c9f7a_JaffaCakes118.ps1
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
37e602c075b556227abcc2e6496c9f7a_JaffaCakes118.ps1
Resource
win10v2004-20240426-en
General
-
Target
37e602c075b556227abcc2e6496c9f7a_JaffaCakes118.ps1
-
Size
2KB
-
MD5
37e602c075b556227abcc2e6496c9f7a
-
SHA1
8803cba7987a5b6b0396ef4fe4efc52b70ff6628
-
SHA256
d4ef7b92009d4db0978be27b58dc3f4a830d596964ba323d5b757565e2ba2a5e
-
SHA512
c4889fca09e764fb4baab832db4da5c3c19ccca638645af0e43de7d228532b23ac84204bb608127741ff7a673b85aa9dbb83891c945854a1fc4676fdfc536960
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exeflow pid process 3 1296 powershell.exe 7 1296 powershell.exe -
Processes:
powershell.exepowershell.exepid process 2320 powershell.exe 1296 powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepowershell.exepid process 2320 powershell.exe 1296 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 2320 powershell.exe Token: SeDebugPrivilege 1296 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
powershell.exedescription pid process target process PID 2320 wrote to memory of 1296 2320 powershell.exe powershell.exe PID 2320 wrote to memory of 1296 2320 powershell.exe powershell.exe PID 2320 wrote to memory of 1296 2320 powershell.exe powershell.exe PID 2320 wrote to memory of 1296 2320 powershell.exe powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\37e602c075b556227abcc2e6496c9f7a_JaffaCakes118.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\syswow64\windowspowershell\v1.0\powershell.exe"c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" -s -NoLogo -NoProfile2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\2R9NJGL30Z9RD0CL00FT.tempFilesize
7KB
MD54666d558466d0c3f3965f40f256a1848
SHA1673084454e5a228902815a8c6f8e0abf3f72bc39
SHA256423a0a318e4651b2698bc1658c8b72d2b1bfc83787d8b7e4bdc93f146b983c92
SHA5124271b79301ff5a7dfb62252fe10ffc0a7afce8058d18bf9c8fe9b2df2f776106f0fe0e5e67515a552e6781f3cf448b7f5d7874017ddba7b4a8028f4d034bff8c
-
memory/2320-12-0x0000000002A70000-0x0000000002AA2000-memory.dmpFilesize
200KB
-
memory/2320-7-0x000007FEF4560000-0x000007FEF4EFD000-memory.dmpFilesize
9.6MB
-
memory/2320-5-0x000000001B680000-0x000000001B962000-memory.dmpFilesize
2.9MB
-
memory/2320-8-0x000007FEF4560000-0x000007FEF4EFD000-memory.dmpFilesize
9.6MB
-
memory/2320-9-0x000007FEF4560000-0x000007FEF4EFD000-memory.dmpFilesize
9.6MB
-
memory/2320-10-0x000007FEF4560000-0x000007FEF4EFD000-memory.dmpFilesize
9.6MB
-
memory/2320-6-0x0000000002860000-0x0000000002868000-memory.dmpFilesize
32KB
-
memory/2320-4-0x000007FEF481E000-0x000007FEF481F000-memory.dmpFilesize
4KB
-
memory/2320-11-0x0000000002A70000-0x0000000002AA2000-memory.dmpFilesize
200KB
-
memory/2320-15-0x000007FEF4560000-0x000007FEF4EFD000-memory.dmpFilesize
9.6MB
-
memory/2320-16-0x000007FEF481E000-0x000007FEF481F000-memory.dmpFilesize
4KB
-
memory/2320-17-0x000007FEF4560000-0x000007FEF4EFD000-memory.dmpFilesize
9.6MB
-
memory/2320-18-0x000007FEF4560000-0x000007FEF4EFD000-memory.dmpFilesize
9.6MB
-
memory/2320-19-0x000007FEF4560000-0x000007FEF4EFD000-memory.dmpFilesize
9.6MB
-
memory/2320-22-0x000007FEF4560000-0x000007FEF4EFD000-memory.dmpFilesize
9.6MB