Analysis
-
max time kernel
17s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
10-01-2025 16:21
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e8b088e5944106e2ea4faf15fe283be5.ps1
Resource
win7-20241010-en
windows7-x64
3 signatures
150 seconds
General
-
Target
JaffaCakes118_e8b088e5944106e2ea4faf15fe283be5.ps1
-
Size
3.7MB
-
MD5
e8b088e5944106e2ea4faf15fe283be5
-
SHA1
f2a69aca792d12cb5181b7e79011d160631c96c9
-
SHA256
4006ccc6035e25005fcd9568eaa3e4aa4559cea66afe969ef74143d0b8caac60
-
SHA512
b626548865f7c98ef44191ce4555c263ab45c5d4a84fc80779bb3795cb1ccc6dbf2ae987a1dbccfd62a603d2016685b13176d4f99cc91a179009232dd1c8765a
-
SSDEEP
24576:IryW3GF/TM9IG9L9ZlR7FJfSvrl+sUic7Za0aFg4bkcOFIk86q5hpmqP147IR/vM:C
Score
3/10
Malware Config
Signatures
-
pid Process 2248 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2248 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2248 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e8b088e5944106e2ea4faf15fe283be5.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2248