Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
12-05-2024 13:24
Static task
static1
Behavioral task
behavioral1
Sample
3a53c78fe9cd7f38f85258a17b37fe6e_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3a53c78fe9cd7f38f85258a17b37fe6e_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
KtlVtDDtCbxIugvgm.ps1
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
KtlVtDDtCbxIugvgm.ps1
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
KtlVtDDtCbxIugvgma5.exe
Resource
win7-20240419-en
Behavioral task
behavioral6
Sample
KtlVtDDtCbxIugvgma5.exe
Resource
win10v2004-20240226-en
General
-
Target
KtlVtDDtCbxIugvgm.ps1
-
Size
548KB
-
MD5
759df20fc9033fe2ce3af881567a0829
-
SHA1
d0fc50a7b88b54a573b5ffdfaba36c380da5f222
-
SHA256
dd52fa10a43e5082981ecf90523d3f308fbdffea66844148e96a547ad133c8e7
-
SHA512
60381d28369bbcb9f08396abd5cbcff336758e546223086d93e76b77c478cf200dfbed77e8120406fb589abb304e8fb466be7d0e06e579e9f4ec6fc67560fdc9
-
SSDEEP
3072:lNgCN7HUJSqCDKNEsVPctRNHByrsGCaAYciERk5R9XFd5K/PF5dxaaODKYXPgB4S:D
Malware Config
Signatures
-
pid Process 1780 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1780 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1780 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\KtlVtDDtCbxIugvgm.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1780