Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 16:44
Static task
static1
Behavioral task
behavioral1
Sample
4a880a2e48119fc94fd1eeecf005bf13_JaffaCakes118.ps1
Resource
win7-20240705-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
4a880a2e48119fc94fd1eeecf005bf13_JaffaCakes118.ps1
Resource
win10v2004-20240709-en
3 signatures
150 seconds
General
-
Target
4a880a2e48119fc94fd1eeecf005bf13_JaffaCakes118.ps1
-
Size
68KB
-
MD5
4a880a2e48119fc94fd1eeecf005bf13
-
SHA1
427d0495d22a8795f42143b961a3c14d551267bf
-
SHA256
40923542532bddd3e785cd84b90f97455d322c2caf7a2327e96011cdf52fd454
-
SHA512
8ffedd76395c39e6cfa393e54f72eff326eaffc20bac27d273d0c44570907d18f4d861bdc9125980ed382b210d761c8dbe077ec246a74a579469219e74d5a154
-
SSDEEP
1536:IJz6V9W30iO9ykGgAlw2tsNI0qhp7uqfjftqpBjL9CjNVLp:cz6V9W30iO9ykGgAlw2tsNI0kp7rfjfd
Score
3/10
Malware Config
Signatures
-
pid Process 2648 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2648 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2648 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\4a880a2e48119fc94fd1eeecf005bf13_JaffaCakes118.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2648