Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
28-06-2024 06:21
Static task
static1
Behavioral task
behavioral1
Sample
1917abd3ca7fe104a9d3fdb034fc3245_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
1917abd3ca7fe104a9d3fdb034fc3245_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
1917abd3ca7fe104a9d3fdb034fc3245_JaffaCakes118.exe
-
Size
142KB
-
MD5
1917abd3ca7fe104a9d3fdb034fc3245
-
SHA1
b9c12ad4caa3f7b7d71de694ed24328666549505
-
SHA256
1625a6299991ac6e02d815fdb2e3f335cb8159f95e97aeb68944e246fcc3b246
-
SHA512
4282a904709d5254a6b4f558abf58b06ed3ead216a0aca32864de9f9d222bb8a0cf52b315111fe99d859abe0f936ecbe37dc903585019a2154ca0b24ce177121
-
SSDEEP
3072:GPC+w9KM+lbMnqYgQnVu+VZkFC8f1ViHbfH7AXhZNm0h+Md1/lkzL+:/4lbe5xkl1V88xnNkzL
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Print Processors 1 TTPs 2 IoCs
Adversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation.
description ioc Process File created C:\Windows\system32\spool\PRTPROCS\x64\U79iQG.dll 1917abd3ca7fe104a9d3fdb034fc3245_JaffaCakes118.exe File opened for modification C:\Windows\system32\spool\PRTPROCS\x64\U79iQG.dll 1917abd3ca7fe104a9d3fdb034fc3245_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\spool\PRTPROCS\x64\U79iQG.dll 1917abd3ca7fe104a9d3fdb034fc3245_JaffaCakes118.exe File opened for modification C:\Windows\system32\spool\PRTPROCS\x64\U79iQG.dll 1917abd3ca7fe104a9d3fdb034fc3245_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2068 1917abd3ca7fe104a9d3fdb034fc3245_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2068 1917abd3ca7fe104a9d3fdb034fc3245_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1917abd3ca7fe104a9d3fdb034fc3245_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1917abd3ca7fe104a9d3fdb034fc3245_JaffaCakes118.exe"1⤵
- Boot or Logon Autostart Execution: Print Processors
- Drops file in System32 directory
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:2068