Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
02-05-2024 00:00
Static task
static1
Behavioral task
behavioral1
Sample
0cecca47acad7973fc6f9f57dde5cc4b_JaffaCakes118.js
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
0cecca47acad7973fc6f9f57dde5cc4b_JaffaCakes118.js
Resource
win10v2004-20240419-en
General
-
Target
0cecca47acad7973fc6f9f57dde5cc4b_JaffaCakes118.js
-
Size
25KB
-
MD5
0cecca47acad7973fc6f9f57dde5cc4b
-
SHA1
4e1f3e273159b4d5915d2418820d5dca805294db
-
SHA256
95325bfd74d2ff4d9509357f4b0fd92cb6b28a1a985ec29601eca92a6f550c1e
-
SHA512
ff763c4d2a8c7b95a3497c5cde6bb6c447f3a0b85adc0ab05355ec5e9a63f4d33b113515ffb7c84f20cdcdf46a79f1b235d490b0e4616bf952f863a0d570935b
-
SSDEEP
768:aq+cB487yZLW/PF+3wh9QmFgilK9UUsImZOOYz:1+cB487y2l9Uig9UUsLZOJ
Malware Config
Signatures
-
Blocklisted process makes network request 6 IoCs
Processes:
wscript.exeflow pid process 3 4648 wscript.exe 35 4648 wscript.exe 53 4648 wscript.exe 69 4648 wscript.exe 90 4648 wscript.exe 95 4648 wscript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
wscript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 4 IoCs
Processes:
wscript.exewscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\0cecca47acad7973fc6f9f57dde5cc4b_JaffaCakes118.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\0cecca47acad7973fc6f9f57dde5cc4b_JaffaCakes118.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XvJkBxcskq.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XvJkBxcskq.js wscript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
wscript.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0IDR124VF6 = "\"C:\\Users\\Admin\\AppData\\Roaming\\XvJkBxcskq.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
wscript.exedescription pid process target process PID 4648 wrote to memory of 1616 4648 wscript.exe wscript.exe PID 4648 wrote to memory of 1616 4648 wscript.exe wscript.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\0cecca47acad7973fc6f9f57dde5cc4b_JaffaCakes118.js1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\XvJkBxcskq.js"2⤵
- Drops startup file
- Adds Run key to start application
PID:1616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5adc0c21d3a0ac412f26615c8c164dbd1
SHA15fe5d7659a8582762c1c836e12e515e9b587af71
SHA256919988f6a50c88d4c8be4532c17ac46513b4e004d2db9865895a2aad9f4cf31f
SHA5123f83564a68c60e25b9714caf31dba7e4bfb7d875c17ab2a6dd073d90fa339ee82e72a4430557ff8ba8e7043b0a7680ecae3bb7b4f3c94e0ab74dc9d3e252107b