Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/05/2024, 15:46

General

  • Target

    6f0747c213742a6c7c67e2044d710847_JaffaCakes118.vbs

  • Size

    30KB

  • MD5

    6f0747c213742a6c7c67e2044d710847

  • SHA1

    32dfd795583f97cc52bb8e2ceaa8c098f0aa4255

  • SHA256

    0940e6e0f00986b4f2a4c358cb883bf1b56ca9d4844d0ee46be77b6ffa187275

  • SHA512

    9bddecc5bd92189dd4507991595be3c0d46a58531a716790a4fb0dbd77bdd83c847949e5122bbe4860f054ee35c943cb59f1d22982222fc9548b53f574628102

  • SSDEEP

    384:RcCQurFtVdx+MiKBolaNINoLJN3MNhR+z2HEz56386/RvL3Ef7P+c9J/tjVTgrIO:hQcfliKBowwof8v+zGJMaT3EzPvjgrrX

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 9 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\6f0747c213742a6c7c67e2044d710847_JaffaCakes118.vbs"
    1⤵
    • Blocklisted process makes network request
    • Checks computer location settings
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:112
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" "C:\Users\Admin\AppData\Local\Temp\6f0747c213742a6c7c67e2044d710847_JaffaCakes118.vbs" uac
      2⤵
      • Blocklisted process makes network request
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:3772
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe" /k C:\Windows\SYSWOW64\Cscript.exe //nologo "C:\Users\Admin\AppData\Local\Temp\6f0747c213742a6c7c67e2044d710847_JaffaCakes118.vbs"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3476
        • C:\Windows\SYSWOW64\cscript.exe
          C:\Windows\SYSWOW64\Cscript.exe //nologo "C:\Users\Admin\AppData\Local\Temp\6f0747c213742a6c7c67e2044d710847_JaffaCakes118.vbs"
          4⤵
          • Blocklisted process makes network request
          • Drops file in Program Files directory
          PID:4416

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1F356F4D07FE8C483E769E4586569404

          Filesize

          82KB

          MD5

          05a7634e0e5f7e4a07824ef90dea7b3f

          SHA1

          955a81d9570cf1501341fa3c6fb120e6b4bc7ef6

          SHA256

          ffdcc58ca9935717d04e5afe58cbdc93e52ed82c7b6386d488022536c5861fe8

          SHA512

          c1445448c02afd880a1756a6e9fc4062e78abaa771547f18519f36b580073b711f56762ce5ae13d748d3d05da7f5b6533f0e697ede5127b697b84751d69ef643

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5457A8CE4B2A7499F8299A013B6E1C7C_D734EC3DD00546F46D368325396086B0

          Filesize

          5B

          MD5

          5bfa51f3a417b98e7443eca90fc94703

          SHA1

          8c015d80b8a23f780bdd215dc842b0f5551f63bd

          SHA256

          bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

          SHA512

          4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B90B117906B8A74C79D1BC450C2B94B1_A54F26A8A41DE52C237D54D67F12793F

          Filesize

          1KB

          MD5

          ada33d70ab694234da1045556b70f172

          SHA1

          3f56fb5f10611416ba8ceca9698d3eee88faad79

          SHA256

          4faaca4af056c214dc330f037c0c4021fd23398e59ff042f4855d0de6ef007db

          SHA512

          8c96311e3e52db7e13f4d6d12981ced9376bd99a2fbafae48ee9b593044d73f6cae1ff02196d70b7d7d4ed5c39d8d9d89ff664eeccb5fb69e3d7285a409e1634

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F4D9C889B7AEBCF4E1A2DAABC5C3628A_63D8421A6F753BEB51E84AD98CC78C59

          Filesize

          509B

          MD5

          304e684059733b43871f97736b9787b0

          SHA1

          bbedfa44daf246a28c9059b65b75926197de6a3b

          SHA256

          a99fd5545e27c1f313e135a7c1ca69cc7017ec162c852b3245befd6867c6ba35

          SHA512

          fbc0500055f684862acbe966e5a2378bc84d52331af776475e51c0aebe4e89a8b695d81244cb9d0fdcfc69eaf80265762079ffc4c9756409e720534d27f7b12a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1F356F4D07FE8C483E769E4586569404

          Filesize

          300B

          MD5

          13dc4132270cb65f4bd1f5a3afe6c7f1

          SHA1

          d14890c3a845679a469ce739cc3bf7a580b66a9c

          SHA256

          e8334be7155b04e0f16534fd1f075955f3a995a47e3d376f7ad5d5cb7e63a5ec

          SHA512

          80c8571c8351b5e1f585c43503e541274a3150c1214587f5ea52539ca69533a280997b44f25a0e609405235c2d1151f67e86bb8a78f7503ff878db633e8b0ef6

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5457A8CE4B2A7499F8299A013B6E1C7C_D734EC3DD00546F46D368325396086B0

          Filesize

          398B

          MD5

          b8a700a6a711976e473a394d22ed8905

          SHA1

          34ea0a5da91ac29e4e283a79cb7b75e14a746ae9

          SHA256

          640db8d7ffcded3542c174ebcbf7d0eca2b2143e50289f87e5163756fd5be79c

          SHA512

          9df2cc08bb5f853491d13d5e26bfaf3813e7a012b16de14c0989ff95f4e9df51574761522a9b83c7c49dcfa5950829533193e662a6e8fe9fb2045a6bfc49308d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5457A8CE4B2A7499F8299A013B6E1C7C_D734EC3DD00546F46D368325396086B0

          Filesize

          398B

          MD5

          902abb3112757ee86b2cfcb15201b91b

          SHA1

          236c155450ac3093f33fec5bd5c9af771086ca7a

          SHA256

          50ae42f267e998fdbedfd5a2a415a6aa126a286367ad90f2a2bc7037567a8d43

          SHA512

          c80018e002d07aefd894d7e6534be4f3f2e5dce7b66a38f9264ec7c2b54ab0f4c1e76e22e3ba49bb1683d73870050f89107d9ce9e98dccb9c70345909c994c68

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B90B117906B8A74C79D1BC450C2B94B1_A54F26A8A41DE52C237D54D67F12793F

          Filesize

          500B

          MD5

          200c69845848bf9c00a2743de9d61707

          SHA1

          6eae70f9816ce16ffc9cb4d03ce0f5ce622bf3c3

          SHA256

          abf2954035c3da5bf13e18e4a49b6c41ab71170636a05efd06955d9b139ac02e

          SHA512

          556fd15912bd2b395d49bc7228bd7dbfaa7e2cafcf1f548b363c1b68262222eb0bf04d1eae3b51aa3c4872ea9907b558cdd86dd0514cfa6f36b82647b10fe7bb

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F4D9C889B7AEBCF4E1A2DAABC5C3628A_63D8421A6F753BEB51E84AD98CC78C59

          Filesize

          490B

          MD5

          2d8b5c454c0752c7fdd4f7dba77680c1

          SHA1

          4f8b584858fc43aea45e9bd3704b62183c1cc23c

          SHA256

          6002cf46a8258d4deb45f23906316f2f2d3f6133286829f982dc9cf323fd9ef0

          SHA512

          66822017558e221686f51e290bd1d9d889ec9f6e2996baaebb68bc80468a22891afbeddfc06198cc4929bc767a337d30bd56f2731aa0665d4051b676db5f34db