Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    17-08-2024 11:47

General

  • Target

    a268faad786906f61f2424ad1c0a783d_JaffaCakes118.ps1

  • Size

    49KB

  • MD5

    a268faad786906f61f2424ad1c0a783d

  • SHA1

    49cbfc2da8f092b62f979a0e2349cae875fc5fb7

  • SHA256

    64b9b2fdd0e95c98bcdd4c8b8fa0500a6d4c0561d4358ed279c3ee84d0211e28

  • SHA512

    8cc903b44964cd92407f06a8ba23a43bbd629d96e1d32d8a1f2c295a68e0eff0ed133fcdfeb14f90a2d2c310affa056b02450e515534c11f099c522338e278c7

  • SSDEEP

    768:DtKo1yX9IR4C4+XLS5+Nlwh7vA0rAXxfejfjZBjL9TogNeoiK3:D0w5XG5IlwhrA0kXxfwbZBjL9DNzt

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\a268faad786906f61f2424ad1c0a783d_JaffaCakes118.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2776

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2776-4-0x000007FEF55BE000-0x000007FEF55BF000-memory.dmp

    Filesize

    4KB

  • memory/2776-5-0x000000001B780000-0x000000001BA62000-memory.dmp

    Filesize

    2.9MB

  • memory/2776-6-0x00000000022D0000-0x00000000022D8000-memory.dmp

    Filesize

    32KB

  • memory/2776-7-0x000007FEF5300000-0x000007FEF5C9D000-memory.dmp

    Filesize

    9.6MB

  • memory/2776-8-0x000007FEF5300000-0x000007FEF5C9D000-memory.dmp

    Filesize

    9.6MB

  • memory/2776-9-0x000007FEF5300000-0x000007FEF5C9D000-memory.dmp

    Filesize

    9.6MB

  • memory/2776-11-0x000007FEF5300000-0x000007FEF5C9D000-memory.dmp

    Filesize

    9.6MB

  • memory/2776-10-0x000007FEF5300000-0x000007FEF5C9D000-memory.dmp

    Filesize

    9.6MB

  • memory/2776-12-0x000007FEF5300000-0x000007FEF5C9D000-memory.dmp

    Filesize

    9.6MB