Analysis
-
max time kernel
153s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2024, 00:19
Static task
static1
Behavioral task
behavioral1
Sample
fdfcb38dd0980ad5bb06a166a3441774_JaffaCakes118.vbs
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fdfcb38dd0980ad5bb06a166a3441774_JaffaCakes118.vbs
Resource
win10v2004-20240226-en
General
-
Target
fdfcb38dd0980ad5bb06a166a3441774_JaffaCakes118.vbs
-
Size
83KB
-
MD5
fdfcb38dd0980ad5bb06a166a3441774
-
SHA1
51576748a2c4f88ecf24147aeb4d588823acba57
-
SHA256
8a328702e6f93d553c959d003079964102bee95ba3e6de7afa898884f21e5a1f
-
SHA512
2dfc0995ce30e8172822a24ad65b7431af26bb7d25fa1e165b8aee4d5ce856aa04d99bbff5c02b59ae39daef3363188ea26b0e4431a946a7af7c39fbd6993eab
-
SSDEEP
1536:fsMdmTjWtM1BY1euyMF/dddddddddddddddddNQQdzDCFveotw8d6R93x4:fssmTY9ZXaJbd633e
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 2 3152 WScript.exe 5 3152 WScript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 1 IoCs
pid Process 4764 2A917B97BC6A4FF28643AC1EF8E4617B.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3152 wrote to memory of 4764 3152 WScript.exe 92 PID 3152 wrote to memory of 4764 3152 WScript.exe 92 PID 3152 wrote to memory of 4764 3152 WScript.exe 92
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fdfcb38dd0980ad5bb06a166a3441774_JaffaCakes118.vbs"1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\2A917B97BC6A4FF28643AC1EF8E4617B.exe"C:\Users\Admin\AppData\Local\Temp\2A917B97BC6A4FF28643AC1EF8E4617B.exe"2⤵
- Executes dropped EXE
PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3972 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:81⤵PID:2260
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD5ba33713e87a12f20fe50f50a09a74e7f
SHA1455760a6cd7b4fcfea8d5654f9b46c7402d6cd80
SHA256253435a4f57db4b631ff88e58144264f6268ba34171d0b910157be2c494f3ebf
SHA51244053f3996f8c2feb221c151770df19dfda062454c3e3e2231c98a1d37c07bc61a3dfe1b72ea6b2fc12274c406644feab97b9b874b14ef184e7e6aab39e98bec