Analysis

  • max time kernel
    94s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-01-2025 00:50

General

  • Target

    JaffaCakes118_08e454a691a4836663a117c9c43f6323.zip

  • Size

    1.4MB

  • MD5

    08e454a691a4836663a117c9c43f6323

  • SHA1

    e1a0c968af234ea32acec2cbe06cb903635c78f2

  • SHA256

    38b3ed66ac80892a8564b4f7896cf97249db45e002ed0d2008da4c27fa984cfe

  • SHA512

    06a6a3350ea979d9a1b7eec17d7c94f754890e3a63f5102b53ffc64ddb8481c46ff9bcf5605091f686b78a59f2fbee9911dfc1dda419050f238f26f48cf107e0

  • SSDEEP

    24576:Dkce2OiadG/s07CoSi2+fbj36/US4llFTMnQPyH59q4M5L+pvC2PsY7CiAz:c2Oi6G97CodfH6/z4llSdZo4Zp62kYWr

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_08e454a691a4836663a117c9c43f6323.zip"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4012

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads