Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
12-05-2024 15:07
Static task
static1
Behavioral task
behavioral1
Sample
3abb7a1406539ab2076d4e0c46f17216_JaffaCakes118.vbs
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3abb7a1406539ab2076d4e0c46f17216_JaffaCakes118.vbs
Resource
win10v2004-20240426-en
General
-
Target
3abb7a1406539ab2076d4e0c46f17216_JaffaCakes118.vbs
-
Size
16KB
-
MD5
3abb7a1406539ab2076d4e0c46f17216
-
SHA1
3b734fbe6132bc632d38b21cf5d506e3a91d1354
-
SHA256
6dad1c90f06c2e2d2e3e9a4288ae4812814129678d0876d960ea7bd81551888f
-
SHA512
cfc9735d99092cfe96762c99a8218ded336da10cc39a2a903522aebe31b7107b61e7a78e13b42f323a05f99c5aa6703ce75c1975ffa670028e66809a2a833faf
-
SSDEEP
384:aNzlqK8oOrIOgiThHHsdQ0lz5q1QgE3LzTWEqmak44Cv7vKjshN4:axlqtIOVdsdFlz5mQgE3LzTWEqmYP7C/
Malware Config
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 2 3060 rundll32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
WScript.exedescription pid process target process PID 2224 wrote to memory of 3060 2224 WScript.exe rundll32.exe PID 2224 wrote to memory of 3060 2224 WScript.exe rundll32.exe PID 2224 wrote to memory of 3060 2224 WScript.exe rundll32.exe PID 2224 wrote to memory of 3060 2224 WScript.exe rundll32.exe PID 2224 wrote to memory of 3060 2224 WScript.exe rundll32.exe PID 2224 wrote to memory of 3060 2224 WScript.exe rundll32.exe PID 2224 wrote to memory of 3060 2224 WScript.exe rundll32.exe PID 2224 wrote to memory of 3060 2224 WScript.exe rundll32.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\3abb7a1406539ab2076d4e0c46f17216_JaffaCakes118.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Blocklisted process makes network request
PID:3060