Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 09:58
Static task
static1
Behavioral task
behavioral1
Sample
45a417545660b1f227a0dd1bfcd8dcda_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
45a417545660b1f227a0dd1bfcd8dcda_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
45a417545660b1f227a0dd1bfcd8dcda_JaffaCakes118.exe
-
Size
948KB
-
MD5
45a417545660b1f227a0dd1bfcd8dcda
-
SHA1
bac6e0bff34a099db014cfc887f695f942c1c018
-
SHA256
87c7d79e1a76b264f81764c51a9c040ddc02db0ad56e6c6c38ea049ea48ad028
-
SHA512
665d522d69093ed5fb4e4d2469e040d5fc73a69d69ec4e65b17086bb034a2567b14ccd7ff7433fc9c911cba8fc897b6a6b95e886c3f246af2375204f98c76808
-
SSDEEP
12288:2CO7BdhTOPjSrHqyTu7g+0OtlyQhFJl6QX90KEjpNXj85vyfO5YHIroQqtNS1ENT:QBwX1hFLKC0Y6KQ
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
mimikatz is an open source tool to dump credentials on Windows 2 IoCs
resource yara_rule behavioral1/memory/2944-3-0x0000000000940000-0x00000000009DF000-memory.dmp mimikatz behavioral1/memory/2944-6-0x0000000000940000-0x00000000009DF000-memory.dmp mimikatz -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2944 45a417545660b1f227a0dd1bfcd8dcda_JaffaCakes118.exe 2944 45a417545660b1f227a0dd1bfcd8dcda_JaffaCakes118.exe 2944 45a417545660b1f227a0dd1bfcd8dcda_JaffaCakes118.exe 2944 45a417545660b1f227a0dd1bfcd8dcda_JaffaCakes118.exe 2944 45a417545660b1f227a0dd1bfcd8dcda_JaffaCakes118.exe 2944 45a417545660b1f227a0dd1bfcd8dcda_JaffaCakes118.exe 2944 45a417545660b1f227a0dd1bfcd8dcda_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2944 45a417545660b1f227a0dd1bfcd8dcda_JaffaCakes118.exe