Analysis

  • max time kernel
    14s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    06-01-2025 16:43

General

  • Target

    JaffaCakes118_2ecfe00e0cfcf45ff8454452b6122226.ps1

  • Size

    332KB

  • MD5

    2ecfe00e0cfcf45ff8454452b6122226

  • SHA1

    6d646c61e6cc0ebf17adcc78bb29ae9edfe1fa78

  • SHA256

    7eb7b284890091dda7cf5b13084bc33a380105c841e82d8e9e11ac6efcac2884

  • SHA512

    123e02a62e0f8a928223d000e4cc9198578f934c7a5aabd1a91d6b6d7817a01181e39740ab9c35161af16b1c82204e25eb24a59b70ee915a0447d03d7fab9202

  • SSDEEP

    1536:sNCXSwzbxJtFvWNB7LHJJ8JMEkTd9P78hEffND29hcHblsmUhP6a1/fWDzFGTO9R:C

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2ecfe00e0cfcf45ff8454452b6122226.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2348

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2348-4-0x000007FEF630E000-0x000007FEF630F000-memory.dmp

    Filesize

    4KB

  • memory/2348-5-0x000000001B2C0000-0x000000001B5A2000-memory.dmp

    Filesize

    2.9MB

  • memory/2348-6-0x00000000026E0000-0x00000000026E8000-memory.dmp

    Filesize

    32KB

  • memory/2348-7-0x000007FEF6050000-0x000007FEF69ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2348-8-0x000007FEF6050000-0x000007FEF69ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2348-9-0x000007FEF6050000-0x000007FEF69ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2348-10-0x000007FEF6050000-0x000007FEF69ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2348-11-0x000007FEF6050000-0x000007FEF69ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2348-12-0x000007FEF6050000-0x000007FEF69ED000-memory.dmp

    Filesize

    9.6MB