Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 15:52
Behavioral task
behavioral1
Sample
e0847914d8d26db8849e8f06287e7e36_JaffaCakes118.ps1
Resource
win7-20240903-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
e0847914d8d26db8849e8f06287e7e36_JaffaCakes118.ps1
Resource
win10v2004-20240802-en
3 signatures
150 seconds
General
-
Target
e0847914d8d26db8849e8f06287e7e36_JaffaCakes118.ps1
-
Size
2KB
-
MD5
e0847914d8d26db8849e8f06287e7e36
-
SHA1
edb8e36520f0d3f2f60e7e81502b2f23fc8976c2
-
SHA256
aa9e3699feefd65f3cbed37538b15a5fb5f2c5a676802fbb8b55b585caf1fa27
-
SHA512
36a5da3d2e821648e3477897f388f1d66db21f2f84b26e4af230e6cacc65d5844f512ab6486b0f67007a9501db390b25806dba19255b3c062ba540af26290ed3
Score
3/10
Malware Config
Signatures
-
pid Process 1032 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1032 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1032 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\e0847914d8d26db8849e8f06287e7e36_JaffaCakes118.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1032