Analysis
-
max time kernel
141s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 17:39
Behavioral task
behavioral1
Sample
4ab7cd72090f0c087d0f58ca4cd1be6d_JaffaCakes118.exe
Resource
win7-20240704-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
4ab7cd72090f0c087d0f58ca4cd1be6d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
4ab7cd72090f0c087d0f58ca4cd1be6d_JaffaCakes118.exe
-
Size
58KB
-
MD5
4ab7cd72090f0c087d0f58ca4cd1be6d
-
SHA1
8e1135ae503819a1c1518d29891a096f993535c2
-
SHA256
7f1b237f3766979131512c86aecb0b70d12324c1073082de382af33ce642675d
-
SHA512
6e790cf1e8d70bfe0387ab3336eb9da1355cd1d0f1efe28c5e71045d56f1755c6aaf6f1ae1cc7954e3e06a45ec5777e8ac766e5388377c726bfe95454a04106e
-
SSDEEP
1536:SyWg3vgGn8acXjhzwwgt1qt6FWbUfQeACP:SFmvf8pGw8DQbUfQeAC
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2948-0-0x0000000000400000-0x00000000004DB000-memory.dmp upx behavioral2/memory/2948-1-0x0000000000400000-0x00000000004DB000-memory.dmp upx behavioral2/memory/2948-2-0x0000000000400000-0x00000000004DB000-memory.dmp upx behavioral2/memory/2948-3-0x0000000000400000-0x00000000004DB000-memory.dmp upx behavioral2/memory/2948-4-0x0000000000400000-0x00000000004DB000-memory.dmp upx behavioral2/memory/2948-5-0x0000000000400000-0x00000000004DB000-memory.dmp upx behavioral2/memory/2948-6-0x0000000000400000-0x00000000004DB000-memory.dmp upx behavioral2/memory/2948-7-0x0000000000400000-0x00000000004DB000-memory.dmp upx behavioral2/memory/2948-8-0x0000000000400000-0x00000000004DB000-memory.dmp upx behavioral2/memory/2948-9-0x0000000000400000-0x00000000004DB000-memory.dmp upx behavioral2/memory/2948-10-0x0000000000400000-0x00000000004DB000-memory.dmp upx behavioral2/memory/2948-11-0x0000000000400000-0x00000000004DB000-memory.dmp upx behavioral2/memory/2948-12-0x0000000000400000-0x00000000004DB000-memory.dmp upx behavioral2/memory/2948-13-0x0000000000400000-0x00000000004DB000-memory.dmp upx behavioral2/memory/2948-14-0x0000000000400000-0x00000000004DB000-memory.dmp upx behavioral2/memory/2948-15-0x0000000000400000-0x00000000004DB000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1484 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1484 AUDIODG.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ab7cd72090f0c087d0f58ca4cd1be6d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4ab7cd72090f0c087d0f58ca4cd1be6d_JaffaCakes118.exe"1⤵PID:2948
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x294 0x4d01⤵
- Suspicious use of AdjustPrivilegeToken
PID:1484