Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12-04-2024 05:03
Static task
static1
Behavioral task
behavioral1
Sample
ef30d08be6b02f148da164e54892c8e3_JaffaCakes118.js
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ef30d08be6b02f148da164e54892c8e3_JaffaCakes118.js
Resource
win10v2004-20240226-en
General
-
Target
ef30d08be6b02f148da164e54892c8e3_JaffaCakes118.js
-
Size
30KB
-
MD5
ef30d08be6b02f148da164e54892c8e3
-
SHA1
4998edfd067f343a56e03422d3913c1cc7066e4b
-
SHA256
e21dba51d9968a1073d43143b7acbd4179a8fa73fc5f48921eabac7ea9869daa
-
SHA512
9e1b1142248c8088c2ecb2bd33887136e4f39c3590ce3b95f2fa5e93b922a07c7ecd598650d91a7ee93c4f018b898a96e49ed41157be607abf1b1ce9845c72c1
-
SSDEEP
768:OQ6Qw+4YYPOSCqEGm6XBHqwAFibShsWsj0tXYdAZlAwNY03l83:Z6Q7Yxh1hK8bKsxiXgSlAuU
Malware Config
Signatures
-
Blocklisted process makes network request 7 IoCs
flow pid Process 5 2780 wscript.exe 10 2780 wscript.exe 18 2780 wscript.exe 23 2780 wscript.exe 29 2780 wscript.exe 34 2780 wscript.exe 42 2780 wscript.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ef30d08be6b02f148da164e54892c8e3_JaffaCakes118.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ef30d08be6b02f148da164e54892c8e3_JaffaCakes118.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\JMuHxVQRbU.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\JMuHxVQRbU.js wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\JMuHxVQRbU.js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\QTI627R350 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\ef30d08be6b02f148da164e54892c8e3_JaffaCakes118.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2812 2780 wscript.exe 28 PID 2780 wrote to memory of 2812 2780 wscript.exe 28 PID 2780 wrote to memory of 2812 2780 wscript.exe 28
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\ef30d08be6b02f148da164e54892c8e3_JaffaCakes118.js1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\JMuHxVQRbU.js"2⤵
- Drops startup file
- Adds Run key to start application
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD533f71afd870cab678bc8b4967a0bd77f
SHA1fa1f2f046d2daf22065a73232317aa5b0a155bdb
SHA256b45b6d0bad5cb0ec3aa0d3388014d9830e2db4162983772174be612aa2f3aefc
SHA51256021edf4b36a130c536e117b197943c78fa81922c383b952e240828ac7ad803338fef02670d1fdb56f0b5403198c36a46d4b1de430bdce00883eca595ee19d5