Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 15:56
Static task
static1
Behavioral task
behavioral1
Sample
0f7d1fb2bee47f49077d9de0aafb23ae_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0f7d1fb2bee47f49077d9de0aafb23ae_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0f7d1fb2bee47f49077d9de0aafb23ae_JaffaCakes118.exe
-
Size
172KB
-
MD5
0f7d1fb2bee47f49077d9de0aafb23ae
-
SHA1
df0487cb69f47401f231d2ec740aefdc9c81669a
-
SHA256
7289169a0c069b41b7cf1151caf4e1008ba7f396256aea790d88383253d39fd7
-
SHA512
44d5bfa730f93da372169875fa5499f08257d18b4bd301523a44b2f436d64a4aebc13958e4c2a22bf635988ab1958545e5ca546e86b20d045d6bf69c6777b97d
-
SSDEEP
3072:HIqEfToqwf/7ubQZqNBlrZwqlBMt4/l7BE5n1W0KJeOGYzOtL8HAP4cD5B:HIjfCf/SbQZkMqleqG5n1Y4YK6HvoT
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Print Processors 1 TTPs 2 IoCs
Adversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation.
description ioc Process File created C:\Windows\system32\spool\PRTPROCS\x64\G5i5q.dll 0f7d1fb2bee47f49077d9de0aafb23ae_JaffaCakes118.exe File opened for modification C:\Windows\system32\spool\PRTPROCS\x64\G5i5q.dll 0f7d1fb2bee47f49077d9de0aafb23ae_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\spool\PRTPROCS\x64\G5i5q.dll 0f7d1fb2bee47f49077d9de0aafb23ae_JaffaCakes118.exe File opened for modification C:\Windows\system32\spool\PRTPROCS\x64\G5i5q.dll 0f7d1fb2bee47f49077d9de0aafb23ae_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1984 0f7d1fb2bee47f49077d9de0aafb23ae_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1984 0f7d1fb2bee47f49077d9de0aafb23ae_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f7d1fb2bee47f49077d9de0aafb23ae_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0f7d1fb2bee47f49077d9de0aafb23ae_JaffaCakes118.exe"1⤵
- Boot or Logon Autostart Execution: Print Processors
- Drops file in System32 directory
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:1984