Analysis
-
max time kernel
6s -
max time network
7s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 10:49
Static task
static1
Behavioral task
behavioral1
Sample
1b016e0a60d586c40b353683235a0403_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1b016e0a60d586c40b353683235a0403_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Errors
General
-
Target
1b016e0a60d586c40b353683235a0403_JaffaCakes118.exe
-
Size
100KB
-
MD5
1b016e0a60d586c40b353683235a0403
-
SHA1
b80a276d01a5397796ec7a55a8db3a78943e859b
-
SHA256
c40fc96893500411c0be9a5230d4a4d2ee33b0b466e09b3677e40b07258dab25
-
SHA512
29acfbb59b22bc385ddbc65040684119f0df34c209bfb718d215abb369a6d09e8265eb4110704f59eec736fa6037513d5add6750c51963816d1c6f9744899828
-
SSDEEP
3072:iAslxp/LdszuXKfCtR13t5Jx0YPLgo47Y:Lsl7jdGg3t5JNI7Y
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\ahmtkyi.dll 1b016e0a60d586c40b353683235a0403_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 1928 1b016e0a60d586c40b353683235a0403_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b016e0a60d586c40b353683235a0403_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1b016e0a60d586c40b353683235a0403_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1928
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2160
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2228