Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12-07-2024 14:52
Static task
static1
Behavioral task
behavioral1
Sample
3dd29d6a10609b2f55c038fd50132ce3_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3dd29d6a10609b2f55c038fd50132ce3_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3dd29d6a10609b2f55c038fd50132ce3_JaffaCakes118.exe
-
Size
142KB
-
MD5
3dd29d6a10609b2f55c038fd50132ce3
-
SHA1
8c7323c52edfea158713c08d70b1c85020f5e776
-
SHA256
c7f15685ccc4cf8354cf4f1590d7577f4bbf8781a3494ca5c6d982fa5cf7e073
-
SHA512
2ec3f3643e3ba84d504ec31fdde15619e46035e075303c978c815603e5057b35a895cf4a772418b66c2949af8ab177f6251d0f42bc89f1d2fd4de27afbc319f7
-
SSDEEP
3072:nPC+w9KM+lbMnqYgQnVu+VZkFC8f1ViHbfH7AXhZNm0h+Md1/lkzL+:a4lbe5xkl1V88xnNkzL
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Print Processors 1 TTPs 2 IoCs
Adversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation.
description ioc Process File created C:\Windows\system32\spool\PRTPROCS\x64\qGMYW.dll 3dd29d6a10609b2f55c038fd50132ce3_JaffaCakes118.exe File opened for modification C:\Windows\system32\spool\PRTPROCS\x64\qGMYW.dll 3dd29d6a10609b2f55c038fd50132ce3_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\spool\PRTPROCS\x64\qGMYW.dll 3dd29d6a10609b2f55c038fd50132ce3_JaffaCakes118.exe File opened for modification C:\Windows\system32\spool\PRTPROCS\x64\qGMYW.dll 3dd29d6a10609b2f55c038fd50132ce3_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3028 3dd29d6a10609b2f55c038fd50132ce3_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3028 3dd29d6a10609b2f55c038fd50132ce3_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3dd29d6a10609b2f55c038fd50132ce3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3dd29d6a10609b2f55c038fd50132ce3_JaffaCakes118.exe"1⤵
- Boot or Logon Autostart Execution: Print Processors
- Drops file in System32 directory
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:3028