Analysis
-
max time kernel
151s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
27-06-2024 18:16
Behavioral task
behavioral1
Sample
1703079511d9a66c78b36eb62f6228d3_JaffaCakes118.exe
Resource
win7-20240611-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
1703079511d9a66c78b36eb62f6228d3_JaffaCakes118.exe
Resource
win10v2004-20240508-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
1703079511d9a66c78b36eb62f6228d3_JaffaCakes118.exe
-
Size
120KB
-
MD5
1703079511d9a66c78b36eb62f6228d3
-
SHA1
f7cda1666945dd2cff7e4f22839c669d257a36c9
-
SHA256
967da689c75eec222ded563c5bd54909035d9f2288824ac15ff8eb1b6781b8d2
-
SHA512
198b24134349c9e1e8026e6b68404e0ab02ac64d61bccadd4c217b0602052c02cba7e6539f3abd0c2f30ffcb86c6e0cf85590c6e69d817419d89bec57f9d28d3
-
SSDEEP
1536:wsqss/kkOCuum9hjDOwFvHKlYJ3TA0sa3y19NtE2ZlpJKBCwhT:wPaNCuNhjDOoylY1cJa3E82ZRKn
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2244-0-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2384 2244 WerFault.exe 27 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2244 1703079511d9a66c78b36eb62f6228d3_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2244 1703079511d9a66c78b36eb62f6228d3_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2384 2244 1703079511d9a66c78b36eb62f6228d3_JaffaCakes118.exe 28 PID 2244 wrote to memory of 2384 2244 1703079511d9a66c78b36eb62f6228d3_JaffaCakes118.exe 28 PID 2244 wrote to memory of 2384 2244 1703079511d9a66c78b36eb62f6228d3_JaffaCakes118.exe 28 PID 2244 wrote to memory of 2384 2244 1703079511d9a66c78b36eb62f6228d3_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1703079511d9a66c78b36eb62f6228d3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1703079511d9a66c78b36eb62f6228d3_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2244 -s 2882⤵
- Program crash
PID:2384
-