Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 17:43
Behavioral task
behavioral1
Sample
16e96443763f9eaaf82f183bb64d948f_JaffaCakes118.exe
Resource
win7-20240221-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
16e96443763f9eaaf82f183bb64d948f_JaffaCakes118.exe
Resource
win10v2004-20240611-en
3 signatures
150 seconds
General
-
Target
16e96443763f9eaaf82f183bb64d948f_JaffaCakes118.exe
-
Size
13KB
-
MD5
16e96443763f9eaaf82f183bb64d948f
-
SHA1
cc1be5d366f911a4519e5962aedf9ef1612839b1
-
SHA256
977c2ae6e5cfcbed98dc2e212cb18a4be1f5e0c581235dd5d189977b8644b8fe
-
SHA512
d0d6cdf6e2c556fd16d8478544e71c92a5a7138280ba87135cc007efc0f76d83b7bbda934b077ee5bc26313052f3e4dc633879777092e16b68d67487c9bf198e
-
SSDEEP
384:6ULFa4/oNbA6eBwXFjhaLyujRXRLFrd6XA3gDnh2uyjz3:1Jo/eWjhaNFrd9iJS
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2044-0-0x0000000000400000-0x000000000040A000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2128 2044 WerFault.exe 27 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2044 16e96443763f9eaaf82f183bb64d948f_JaffaCakes118.exe Token: SeSystemtimePrivilege 2044 16e96443763f9eaaf82f183bb64d948f_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2044 wrote to memory of 2128 2044 16e96443763f9eaaf82f183bb64d948f_JaffaCakes118.exe 28 PID 2044 wrote to memory of 2128 2044 16e96443763f9eaaf82f183bb64d948f_JaffaCakes118.exe 28 PID 2044 wrote to memory of 2128 2044 16e96443763f9eaaf82f183bb64d948f_JaffaCakes118.exe 28 PID 2044 wrote to memory of 2128 2044 16e96443763f9eaaf82f183bb64d948f_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\16e96443763f9eaaf82f183bb64d948f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\16e96443763f9eaaf82f183bb64d948f_JaffaCakes118.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2044 -s 1682⤵
- Program crash
PID:2128
-