Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
02-04-2024 05:46
Static task
static1
Behavioral task
behavioral1
Sample
8547af690a9b533d6acd08360f5b18d5_JaffaCakes118.js
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
8547af690a9b533d6acd08360f5b18d5_JaffaCakes118.js
Resource
win10v2004-20240226-en
General
-
Target
8547af690a9b533d6acd08360f5b18d5_JaffaCakes118.js
-
Size
45KB
-
MD5
8547af690a9b533d6acd08360f5b18d5
-
SHA1
fe393629e5df70bcfef741a70432af6c6a528b27
-
SHA256
e61713ffb39c48f5a162cbd0635b869bbd9b318ee3ac47a5a62490b572752b7a
-
SHA512
7dcab08f69aaefd585a31cf3636a6fe252a9efa18dd5e587f269ea5ccb8648a5daaa4c9302bc2a22f35fe48ac590a07b1192d7aed7eb7b2badb801b39b37552d
-
SSDEEP
768:klrw9II2LrCko3oHRirCWiUG+Odm4aS/pLF8NQEJUP:klK1MrCP3oHRirWUG+OdOqv8NQEJS
Malware Config
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 8 2252 wscript.exe 25 2252 wscript.exe 47 2252 wscript.exe 53 2252 wscript.exe 60 2252 wscript.exe 66 2252 wscript.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 5 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sURhETJCuW.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sURhETJCuW.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sURhETJCuW.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8547af690a9b533d6acd08360f5b18d5_JaffaCakes118.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8547af690a9b533d6acd08360f5b18d5_JaffaCakes118.js wscript.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\sURhETJCuW.js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\8547af690a9b533d6acd08360f5b18d5_JaffaCakes118 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\8547af690a9b533d6acd08360f5b18d5_JaffaCakes118.js\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\8547af690a9b533d6acd08360f5b18d5_JaffaCakes118 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\8547af690a9b533d6acd08360f5b18d5_JaffaCakes118.js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\8547af690a9b533d6acd08360f5b18d5_JaffaCakes118 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\8547af690a9b533d6acd08360f5b18d5_JaffaCakes118.js\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\8547af690a9b533d6acd08360f5b18d5_JaffaCakes118 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\8547af690a9b533d6acd08360f5b18d5_JaffaCakes118.js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\sURhETJCuW.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1156 wrote to memory of 3092 1156 wscript.exe 91 PID 1156 wrote to memory of 3092 1156 wscript.exe 91 PID 1156 wrote to memory of 2252 1156 wscript.exe 92 PID 1156 wrote to memory of 2252 1156 wscript.exe 92 PID 2252 wrote to memory of 2084 2252 wscript.exe 94 PID 2252 wrote to memory of 2084 2252 wscript.exe 94
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\8547af690a9b533d6acd08360f5b18d5_JaffaCakes118.js1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\sURhETJCuW.js"2⤵
- Drops startup file
- Adds Run key to start application
PID:3092
-
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\8547af690a9b533d6acd08360f5b18d5_JaffaCakes118.js"2⤵
- Blocklisted process makes network request
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\sURhETJCuW.js"3⤵
- Drops startup file
- Adds Run key to start application
PID:2084
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4344 --field-trial-handle=2240,i,16875000905773190493,11379096115878622792,262144 --variations-seed-version /prefetch:81⤵PID:1188
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD58547af690a9b533d6acd08360f5b18d5
SHA1fe393629e5df70bcfef741a70432af6c6a528b27
SHA256e61713ffb39c48f5a162cbd0635b869bbd9b318ee3ac47a5a62490b572752b7a
SHA5127dcab08f69aaefd585a31cf3636a6fe252a9efa18dd5e587f269ea5ccb8648a5daaa4c9302bc2a22f35fe48ac590a07b1192d7aed7eb7b2badb801b39b37552d
-
Filesize
8KB
MD51b42aad624e2912847110be197ac4d15
SHA1d334bd3287bb2068345fd4f436cee2c0fabc687a
SHA2563aae275c07d7764537c56383c404414ad94689c16dfdbf02c7315f1cc3cd870e
SHA51257dbfdaf42cb38e993bb4ab03d2e74919d1d396b9225d99eac3ef39c76fac2d999a7cd2265dc65bf6693ff65863d98b00de7265d54b670b1a680cfcbf9062a8a