Analysis
-
max time kernel
142s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 02:04
Behavioral task
behavioral1
Sample
65b965156d08aba62e47441550f7e277_JaffaCakes118.exe
Resource
win7-20240708-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
65b965156d08aba62e47441550f7e277_JaffaCakes118.exe
Resource
win10v2004-20240709-en
2 signatures
150 seconds
General
-
Target
65b965156d08aba62e47441550f7e277_JaffaCakes118.exe
-
Size
83KB
-
MD5
65b965156d08aba62e47441550f7e277
-
SHA1
3b9c3d2b156d267386af4e046549f37fc0240544
-
SHA256
2ef2915a4ffa02ad49e51c41649664465e102b9c672f9dc76e0466b73c0027bd
-
SHA512
b19af93a104d6b4ffb498a1d6cac6a9ee48d4f7190c1d764ebd433efdd0420d5887a50fd91f4e31d3e28014aaa51a89fa429976dedceb65b232e04d671275c56
-
SSDEEP
1536:gmIhyLeX4j5zrR9dypT1cFuwQTHwzDEG8eEUb+XDX/UooCAb5fo:gmmyLeoj5rq07QTwzDEbeNc/UwC
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/524-0-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral2/memory/524-1-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral2/memory/524-2-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral2/memory/524-3-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral2/memory/524-4-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral2/memory/524-5-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral2/memory/524-6-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral2/memory/524-7-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral2/memory/524-8-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral2/memory/524-9-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral2/memory/524-10-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral2/memory/524-11-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral2/memory/524-12-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral2/memory/524-13-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral2/memory/524-14-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral2/memory/524-15-0x0000000000400000-0x000000000044F000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 804 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 804 AUDIODG.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\65b965156d08aba62e47441550f7e277_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\65b965156d08aba62e47441550f7e277_JaffaCakes118.exe"1⤵PID:524
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2f4 0x4941⤵
- Suspicious use of AdjustPrivilegeToken
PID:804