Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-04-2024 14:01
Static task
static1
Behavioral task
behavioral1
Sample
fa7455d6a61fb3e6188ac979bbe934e7_JaffaCakes118.js
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fa7455d6a61fb3e6188ac979bbe934e7_JaffaCakes118.js
Resource
win10v2004-20240412-en
General
-
Target
fa7455d6a61fb3e6188ac979bbe934e7_JaffaCakes118.js
-
Size
31KB
-
MD5
fa7455d6a61fb3e6188ac979bbe934e7
-
SHA1
79015b30c58c35330d500967afbf6f1ba5e9f924
-
SHA256
ee80374831fab3f0f3adff5866ec8dacfd1001454b416c121ec5dcba099c5a51
-
SHA512
981662d3abbc5022a456509a352e9c5fa998d10aab21a99a1f082105f085696243281b669302e22b8059b1f8b30ea0aba98a5d14945c17a22f86ad06bf3f3747
-
SSDEEP
768:s14jK4anPHIspku5360lXGdcY3KEyTZT2p0VTx5NEY03l83:E4SHIa5XGdcJSpATx5eU
Malware Config
Signatures
-
Blocklisted process makes network request 32 IoCs
Processes:
wscript.exeflow pid process 5 1368 wscript.exe 7 1368 wscript.exe 9 1368 wscript.exe 10 1368 wscript.exe 13 1368 wscript.exe 14 1368 wscript.exe 17 1368 wscript.exe 18 1368 wscript.exe 21 1368 wscript.exe 22 1368 wscript.exe 24 1368 wscript.exe 25 1368 wscript.exe 28 1368 wscript.exe 30 1368 wscript.exe 32 1368 wscript.exe 33 1368 wscript.exe 35 1368 wscript.exe 36 1368 wscript.exe 40 1368 wscript.exe 41 1368 wscript.exe 43 1368 wscript.exe 44 1368 wscript.exe 46 1368 wscript.exe 48 1368 wscript.exe 51 1368 wscript.exe 52 1368 wscript.exe 55 1368 wscript.exe 56 1368 wscript.exe 58 1368 wscript.exe 59 1368 wscript.exe 61 1368 wscript.exe 63 1368 wscript.exe -
Drops startup file 2 IoCs
Processes:
wscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tHpwtWlHkV.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tHpwtWlHkV.js wscript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
wscript.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\tHpwtWlHkV.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
wscript.exedescription pid process target process PID 1368 wrote to memory of 2744 1368 wscript.exe wscript.exe PID 1368 wrote to memory of 2744 1368 wscript.exe wscript.exe PID 1368 wrote to memory of 2744 1368 wscript.exe wscript.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\fa7455d6a61fb3e6188ac979bbe934e7_JaffaCakes118.js1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\tHpwtWlHkV.js"2⤵
- Drops startup file
- Adds Run key to start application
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5f8c499a37127e740518507c1d3a2caa3
SHA19798bedde67191ad5f515d30fe30b6616965355f
SHA25610ab2382646c3af7434f6db3001f43954b57e3274ab8780e031663af06506d9c
SHA5125886f47fe9abc391a79ac17c84b9387f8b8258dcea754dbe21332b5d7e8c818d0b62e527e0a5291f66ade5dcfd1e16d62fbbfb19787256f79ff2dd7b2b214a50