Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 11:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d1d42b2c37fc270eae7c87fc7e4fd1ac_JaffaCakes118.exe
Resource
win7-20240903-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
d1d42b2c37fc270eae7c87fc7e4fd1ac_JaffaCakes118.exe
Resource
win10v2004-20240802-en
4 signatures
150 seconds
General
-
Target
d1d42b2c37fc270eae7c87fc7e4fd1ac_JaffaCakes118.exe
-
Size
71KB
-
MD5
d1d42b2c37fc270eae7c87fc7e4fd1ac
-
SHA1
8041a2b0031a8aa178f2a9c1a28dab118e23df19
-
SHA256
4450f117affaaa8b1efdb2cf6da27f960dea97ceb6c871b878e5a92c8fc1870b
-
SHA512
81be75caa6834fd3f429d0efc45df9649442c6e5e14d750740693a3bd283af60025a3811168af7966686db0565b02b00159433796db24c0a67460e802c1c45ba
-
SSDEEP
1536:71Djs4X+qDH/O+g/k1nLjY6AsBiCqTFHACxxxxxxxokI6drG:u4X+qDHWH/k1nLBnA2Cxxxxxxxk6Y
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3068 d1d42b2c37fc270eae7c87fc7e4fd1ac_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2380 3068 d1d42b2c37fc270eae7c87fc7e4fd1ac_JaffaCakes118.exe 30 PID 3068 wrote to memory of 2380 3068 d1d42b2c37fc270eae7c87fc7e4fd1ac_JaffaCakes118.exe 30 PID 3068 wrote to memory of 2380 3068 d1d42b2c37fc270eae7c87fc7e4fd1ac_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1d42b2c37fc270eae7c87fc7e4fd1ac_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d1d42b2c37fc270eae7c87fc7e4fd1ac_JaffaCakes118.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 4802⤵PID:2380
-