Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2024, 12:32

General

  • Target

    a28b4c53cf93523eb83f59e7f14e4339_JaffaCakes118.exe

  • Size

    14KB

  • MD5

    a28b4c53cf93523eb83f59e7f14e4339

  • SHA1

    bf8cd7b339e7a0f8d4733eee8a99f9558ad32b2f

  • SHA256

    416eb0a67bacdc1655dfdc051774cdc1606cadac936b0edb313721c410119f2e

  • SHA512

    65a1d40c797b939eaa98c6d52e96db9d3d7808435875739bc5c951d623292c5482374813af18144ccf69eb0cf52cb136ea6e757bd1c6df72033e65e42579ebe1

  • SSDEEP

    384:9usaFyeb+3ObFDUBPNjm3GoAnCoxJMOUFQqhlXBbxv:9OyebsObFsPJJnCQJMOUBlX7v

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\lsass.exe
    C:\Windows\system32\lsass.exe
    1⤵
      PID:488
    • C:\Users\Admin\AppData\Local\Temp\a28b4c53cf93523eb83f59e7f14e4339_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\a28b4c53cf93523eb83f59e7f14e4339_JaffaCakes118.exe"
      1⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1952

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/488-1-0x0000000000210000-0x0000000000211000-memory.dmp

      Filesize

      4KB

    • memory/488-0-0x0000000000210000-0x0000000000211000-memory.dmp

      Filesize

      4KB