Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-04-2024 09:28
Static task
static1
Behavioral task
behavioral1
Sample
ed1957ce99539019ee515eacc3fc2660_JaffaCakes118.js
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ed1957ce99539019ee515eacc3fc2660_JaffaCakes118.js
Resource
win10v2004-20240226-en
General
-
Target
ed1957ce99539019ee515eacc3fc2660_JaffaCakes118.js
-
Size
24KB
-
MD5
ed1957ce99539019ee515eacc3fc2660
-
SHA1
b5be73e11582d601693bd9c10225649e6797cf3a
-
SHA256
d6194c1048c3662b838132f3c112c13f01f83ade44f64bda3bfefb1e9297df5f
-
SHA512
2331642a470f72256d0a1b555e978dcf979cbdbd766303f6598aaae8b6aff1c45262d8bebb61b2fbfb7f0f8d687d94f597260421695a933e4bd5025cb58698e7
-
SSDEEP
768:h+lwW99JDfU0KIgr20On+FibSiVOYsWfL2EHbaBfaXD:4ldzDf+S17bXVPsWfL2EYSz
Malware Config
Signatures
-
Blocklisted process makes network request 19 IoCs
flow pid Process 6 2172 wscript.exe 9 2172 wscript.exe 11 2172 wscript.exe 14 2172 wscript.exe 17 2172 wscript.exe 19 2172 wscript.exe 22 2172 wscript.exe 26 2172 wscript.exe 27 2172 wscript.exe 30 2172 wscript.exe 33 2172 wscript.exe 35 2172 wscript.exe 38 2172 wscript.exe 41 2172 wscript.exe 43 2172 wscript.exe 47 2172 wscript.exe 49 2172 wscript.exe 51 2172 wscript.exe 55 2172 wscript.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ed1957ce99539019ee515eacc3fc2660_JaffaCakes118.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\krCCsOdrEH.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\krCCsOdrEH.js wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\XIKPFFU2BI = "\"C:\\Users\\Admin\\AppData\\Roaming\\ed1957ce99539019ee515eacc3fc2660_JaffaCakes118.js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\krCCsOdrEH.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2172 wrote to memory of 1708 2172 wscript.exe 28 PID 2172 wrote to memory of 1708 2172 wscript.exe 28 PID 2172 wrote to memory of 1708 2172 wscript.exe 28
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\ed1957ce99539019ee515eacc3fc2660_JaffaCakes118.js1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\krCCsOdrEH.js"2⤵
- Drops startup file
- Adds Run key to start application
PID:1708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5ab66a419e295afe9fcd360bc01ae5d48
SHA1e937b624d370a33c904da35c9ffa349a56863b88
SHA2569c9a4d7893a0d433eff735ed54f2d7db6707c5ca306c2d9c7d642064292ccce3
SHA512b5b9170e3989b3013fe5e9723797a0e090fb3ce134346b0061194a1dab3454cc685b02956bc8bcc27c9163d6b4f4243a141b97607c600d5aee284e641aa7f6b0