Analysis
-
max time kernel
2s -
max time network
0s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 03:17
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
493c226a16351fb5398ef0473965b872_JaffaCakes118.exe
Resource
win7-20240508-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
493c226a16351fb5398ef0473965b872_JaffaCakes118.exe
Resource
win10v2004-20240426-en
4 signatures
150 seconds
General
-
Target
493c226a16351fb5398ef0473965b872_JaffaCakes118.exe
-
Size
5.0MB
-
MD5
493c226a16351fb5398ef0473965b872
-
SHA1
bda7f89d72526ff8085fb593c3f2120e671e3554
-
SHA256
a8d098bc3e81972117153c550893775dc3d7f96f947f536037c7ccac0ed74389
-
SHA512
61357bcf3f504bd6e7ee425100b1ea1c9e0a22b56bf39f2f64b115d3f6e5ce6474c91dd2e407b1a2fa14fc9d555d9b030f73fce143364d226b31c834ce1a8182
-
SSDEEP
98304:yi67Sb+ci/PGAtaxHYIBME1/jluRlNHPMQ+ep8jjxYcIHomwMwWALlYrxQSZwb:yx7nn/PGAta5YIB5RMfvAep8jjeVoD7Z
Score
5/10
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2684 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 29 PID 3016 wrote to memory of 2684 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 29 PID 3016 wrote to memory of 2684 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 29 PID 3016 wrote to memory of 2752 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 30 PID 3016 wrote to memory of 2752 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 30 PID 3016 wrote to memory of 2752 3016 493c226a16351fb5398ef0473965b872_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\493c226a16351fb5398ef0473965b872_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\493c226a16351fb5398ef0473965b872_JaffaCakes118.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c color b2⤵PID:2684
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2752
-
-
C:\Windows\system32\verclsid.exe"C:\Windows\system32\verclsid.exe" /S /C {7007ACC7-3202-11D1-AAD2-00805FC1270E} /I {000214E6-0000-0000-C000-000000000046} /X 0x4011⤵PID:2532