Analysis
-
max time kernel
14s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10-07-2024 13:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
34ea1ef5b35e87d0638a6f4bfffe5edf_JaffaCakes118.exe
Resource
win7-20240704-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
34ea1ef5b35e87d0638a6f4bfffe5edf_JaffaCakes118.exe
Resource
win10v2004-20240709-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
34ea1ef5b35e87d0638a6f4bfffe5edf_JaffaCakes118.exe
-
Size
43KB
-
MD5
34ea1ef5b35e87d0638a6f4bfffe5edf
-
SHA1
36dd944da2a086be25bf7488eb1ceae44759c490
-
SHA256
14f400a81f4e67c7fdc819aaaabcaa4940a8288d51812d9f0da251b722242d75
-
SHA512
e540ce20b3a66b3bea2b1091ac9e18114721f73652d508476f497e0fa65994fb16747d714bc223ba5a03bed0357a1c217917198eb9eb146e5a567270fe31e0d2
-
SSDEEP
768:k2vUF95euQM3IBvgySHLu0m2PQcmZkCA7wzYFuEpUNS0bw6:bNnMYByYQQcmKCAamuEpT2
Score
5/10
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Ir32_a.exe 34ea1ef5b35e87d0638a6f4bfffe5edf_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2896 34ea1ef5b35e87d0638a6f4bfffe5edf_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2896 34ea1ef5b35e87d0638a6f4bfffe5edf_JaffaCakes118.exe Token: SeSystemtimePrivilege 2896 34ea1ef5b35e87d0638a6f4bfffe5edf_JaffaCakes118.exe Token: SeSystemtimePrivilege 2896 34ea1ef5b35e87d0638a6f4bfffe5edf_JaffaCakes118.exe Token: SeSystemtimePrivilege 2896 34ea1ef5b35e87d0638a6f4bfffe5edf_JaffaCakes118.exe Token: SeSystemtimePrivilege 2896 34ea1ef5b35e87d0638a6f4bfffe5edf_JaffaCakes118.exe Token: SeSystemtimePrivilege 2896 34ea1ef5b35e87d0638a6f4bfffe5edf_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 1 IoCs
description pid Process procid_target PID 2896 wrote to memory of 1224 2896 34ea1ef5b35e87d0638a6f4bfffe5edf_JaffaCakes118.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\34ea1ef5b35e87d0638a6f4bfffe5edf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\34ea1ef5b35e87d0638a6f4bfffe5edf_JaffaCakes118.exe"2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2896
-