Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19-04-2024 14:01
Static task
static1
Behavioral task
behavioral1
Sample
fa7455d6a61fb3e6188ac979bbe934e7_JaffaCakes118.js
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fa7455d6a61fb3e6188ac979bbe934e7_JaffaCakes118.js
Resource
win10v2004-20240412-en
General
-
Target
fa7455d6a61fb3e6188ac979bbe934e7_JaffaCakes118.js
-
Size
31KB
-
MD5
fa7455d6a61fb3e6188ac979bbe934e7
-
SHA1
79015b30c58c35330d500967afbf6f1ba5e9f924
-
SHA256
ee80374831fab3f0f3adff5866ec8dacfd1001454b416c121ec5dcba099c5a51
-
SHA512
981662d3abbc5022a456509a352e9c5fa998d10aab21a99a1f082105f085696243281b669302e22b8059b1f8b30ea0aba98a5d14945c17a22f86ad06bf3f3747
-
SSDEEP
768:s14jK4anPHIspku5360lXGdcY3KEyTZT2p0VTx5NEY03l83:E4SHIa5XGdcJSpATx5eU
Malware Config
Signatures
-
Blocklisted process makes network request 16 IoCs
Processes:
wscript.exeflow pid process 5 4344 wscript.exe 32 4344 wscript.exe 34 4344 wscript.exe 36 4344 wscript.exe 52 4344 wscript.exe 54 4344 wscript.exe 57 4344 wscript.exe 67 4344 wscript.exe 69 4344 wscript.exe 72 4344 wscript.exe 93 4344 wscript.exe 95 4344 wscript.exe 97 4344 wscript.exe 100 4344 wscript.exe 102 4344 wscript.exe 107 4344 wscript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
wscript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
Processes:
wscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tHpwtWlHkV.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tHpwtWlHkV.js wscript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
wscript.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\tHpwtWlHkV.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
wscript.exedescription pid process target process PID 4344 wrote to memory of 1816 4344 wscript.exe wscript.exe PID 4344 wrote to memory of 1816 4344 wscript.exe wscript.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\fa7455d6a61fb3e6188ac979bbe934e7_JaffaCakes118.js1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\tHpwtWlHkV.js"2⤵
- Drops startup file
- Adds Run key to start application
PID:1816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5f8c499a37127e740518507c1d3a2caa3
SHA19798bedde67191ad5f515d30fe30b6616965355f
SHA25610ab2382646c3af7434f6db3001f43954b57e3274ab8780e031663af06506d9c
SHA5125886f47fe9abc391a79ac17c84b9387f8b8258dcea754dbe21332b5d7e8c818d0b62e527e0a5291f66ade5dcfd1e16d62fbbfb19787256f79ff2dd7b2b214a50