Analysis
-
max time kernel
6s -
max time network
7s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
21-07-2024 20:20
Static task
static1
Behavioral task
behavioral1
Sample
61418d954e511351bdd314ce29047e37_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
61418d954e511351bdd314ce29047e37_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Errors
General
-
Target
61418d954e511351bdd314ce29047e37_JaffaCakes118.exe
-
Size
104KB
-
MD5
61418d954e511351bdd314ce29047e37
-
SHA1
f877f9e05323f9f4445515889e31c82f4857602b
-
SHA256
403730d7e474eeb27cc5c3521e43df64344540af7d90065c6ed92e36e1664a89
-
SHA512
5327b2db8927d73ee6d53e3a1ae54d24716b384bd3b2325da33624d1f31d2ff175bbed76c704b45ed6afb0f22c0984d535094365c28e3f742e9c5e78dfb29ff3
-
SSDEEP
3072:9s2weSSpfSiLN9jQBFzWMWLLpebBgyoD0:ueS72uzmoqG
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\wpxsqgn.dll 61418d954e511351bdd314ce29047e37_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 600 61418d954e511351bdd314ce29047e37_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\61418d954e511351bdd314ce29047e37_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\61418d954e511351bdd314ce29047e37_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:600
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2164
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2700