Analysis
-
max time kernel
6s -
max time network
10s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06/07/2024, 23:13
Static task
static1
Behavioral task
behavioral1
Sample
298d5123706fae529c7cb5fd2dc65b87_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
298d5123706fae529c7cb5fd2dc65b87_JaffaCakes118.exe
Resource
win10v2004-20240704-en
Errors
General
-
Target
298d5123706fae529c7cb5fd2dc65b87_JaffaCakes118.exe
-
Size
88KB
-
MD5
298d5123706fae529c7cb5fd2dc65b87
-
SHA1
1296db736cbe25f7a813eefacb507b1e5e0b6bc3
-
SHA256
d7da1b8fc32c7889572593f3046244f497062596c9dd86c1770a21ad90fbd855
-
SHA512
5e48d10b0867a979ed83a6153c0f520f6fb06b6d87e2f55f73d19effa6b2a6822cab37fba00692ccf5fa95e61ea7fb385c7bf9af674e00eceb23b329f5e02f3a
-
SSDEEP
1536:DyIW48R58v+Lf84PX/4HnpjQhK8DsLZez3sYvNeK7Sl8EEEC7xZopSluTHT9KoTX:DTRWtYHnpjctdzdFx7Sl8BEC7oEkrhKQ
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\cjfkyxg.dll 298d5123706fae529c7cb5fd2dc65b87_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 2788 298d5123706fae529c7cb5fd2dc65b87_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\298d5123706fae529c7cb5fd2dc65b87_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\298d5123706fae529c7cb5fd2dc65b87_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2788
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2568
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2644