Analysis
-
max time kernel
139s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16-04-2024 20:20
Static task
static1
Behavioral task
behavioral1
Sample
f43fead415dba5687e256d5672837750_JaffaCakes118.iso
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f43fead415dba5687e256d5672837750_JaffaCakes118.iso
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
W091.js
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
W091.js
Resource
win10v2004-20240412-en
General
-
Target
W091.js
-
Size
12KB
-
MD5
173fd53dae86a5a6b7c4af3e08c06539
-
SHA1
601f17247f330e78776eaa58fbd6fa1a3fbdf9f8
-
SHA256
c3e72d149e6ee949a7118dec62a17b6a8513d244cf593381fbaca3890f64e6d7
-
SHA512
a6af8383cfe37f27881573898aca705d1bbdc900da5ac42507ece882a08c6fdd4b48d295d9906def91bf4938c8a96411a64199a651f8bdf26927841694436cbc
-
SSDEEP
192:eqU0WY8BPwheQw5Imv/494dWS++I8SeGru5RPZ3HPLCi6KJIwG7ZZSJy:eqUVfBPwhUGK/665GSNvL/yTvSJy
Malware Config
Signatures
-
Blocklisted process makes network request 14 IoCs
flow pid Process 4 4712 wscript.exe 33 4712 wscript.exe 34 4712 wscript.exe 44 4712 wscript.exe 49 4712 wscript.exe 50 4712 wscript.exe 55 4712 wscript.exe 56 4712 wscript.exe 57 4712 wscript.exe 63 4712 wscript.exe 65 4712 wscript.exe 66 4712 wscript.exe 67 4712 wscript.exe 68 4712 wscript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\W091.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\W091.js wscript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\O3FNWNFPWY = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\W091.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1304 schtasks.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4712 wrote to memory of 1304 4712 wscript.exe 86 PID 4712 wrote to memory of 1304 4712 wscript.exe 86 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\W091.js1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Local\Temp\W091.js2⤵
- Creates scheduled task(s)
PID:1304
-