Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
25-12-2024 19:22
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_80c30db2d99ff849295e7c0a8e6924ead10228105d0d675f02c1244ef6bd0106.gz
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_80c30db2d99ff849295e7c0a8e6924ead10228105d0d675f02c1244ef6bd0106.gz
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Orignal Invoice_pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Orignal Invoice_pdf.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
duzcazams.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
duzcazams.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_80c30db2d99ff849295e7c0a8e6924ead10228105d0d675f02c1244ef6bd0106.gz
-
Size
285KB
-
MD5
d567702d13ddeae99886f3a93f0ae154
-
SHA1
d46838b89c6005ec784cde3009e1b3f1291f4b7a
-
SHA256
80c30db2d99ff849295e7c0a8e6924ead10228105d0d675f02c1244ef6bd0106
-
SHA512
c82ab3a14182285aaf84d05709e7b1f4c0226d1221c670a4502eb1793668c239149580f625821578b384b8321a9ab3238946a72af29888eac7ff5dcbff4976ac
-
SSDEEP
6144:gU5eQvXds9hxRIAlk7SMLtxPfvNrLZcC5voZjuwOZ4w:qyXds97R9pMPH5vQSwy4w
Malware Config
Signatures
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2756 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 2756 7zFM.exe Token: 35 2756 7zFM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2756 7zFM.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_80c30db2d99ff849295e7c0a8e6924ead10228105d0d675f02c1244ef6bd0106.gz"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2756