Analysis
-
max time kernel
130s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24-06-2024 15:07
Behavioral task
behavioral1
Sample
093aa4289d9d8d8315ab0ea9b306f0a0_JaffaCakes118.js
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
093aa4289d9d8d8315ab0ea9b306f0a0_JaffaCakes118.js
Resource
win10v2004-20240508-en
General
-
Target
093aa4289d9d8d8315ab0ea9b306f0a0_JaffaCakes118.js
-
Size
179KB
-
MD5
093aa4289d9d8d8315ab0ea9b306f0a0
-
SHA1
0316c6e558148a10d0acf63bc84f53ca315b1acf
-
SHA256
39f7abd459bda03744d7d1dfb7dd15b2204014d75f20d86a13789648d6f44b1d
-
SHA512
ddea7839a14759a27d17578850fb473f720bf911cb9d6e56c3e55a963eca51a85ae1706d2f8bca31b216fa7ef2457135dd1a198008203e6635cb73fd3df985f8
-
SSDEEP
3072:+p1gHeX3reXqf6ZKOBRY+7Q0bamKZtvEzKbURCqeGK/6SbIpklgVDSxGfmuZyas:+p1gHeX3reXqf6ZKwRY+cM24RCqeGKZR
Malware Config
Signatures
-
WSHRAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000a000000012280-3.dat family_wshrat -
Blocklisted process makes network request 6 IoCs
flow pid Process 6 2112 wscript.exe 7 2112 wscript.exe 8 2112 wscript.exe 9 2112 wscript.exe 11 2112 wscript.exe 12 2112 wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\093aa4289d9d8d8315ab0ea9b306f0a0_JaffaCakes118.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\093aa4289d9d8d8315ab0ea9b306f0a0_JaffaCakes118.js wscript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Run\093aa4289d9d8d8315ab0ea9b306f0a0_JaffaCakes118 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\093aa4289d9d8d8315ab0ea9b306f0a0_JaffaCakes118.js\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\093aa4289d9d8d8315ab0ea9b306f0a0_JaffaCakes118 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\093aa4289d9d8d8315ab0ea9b306f0a0_JaffaCakes118.js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Run\093aa4289d9d8d8315ab0ea9b306f0a0_JaffaCakes118 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\093aa4289d9d8d8315ab0ea9b306f0a0_JaffaCakes118.js\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\093aa4289d9d8d8315ab0ea9b306f0a0_JaffaCakes118 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\093aa4289d9d8d8315ab0ea9b306f0a0_JaffaCakes118.js\"" wscript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip-api.com -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 836 wrote to memory of 2112 836 wscript.exe 28 PID 836 wrote to memory of 2112 836 wscript.exe 28 PID 836 wrote to memory of 2112 836 wscript.exe 28
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\093aa4289d9d8d8315ab0ea9b306f0a0_JaffaCakes118.js1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\093aa4289d9d8d8315ab0ea9b306f0a0_JaffaCakes118.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:2112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
179KB
MD5093aa4289d9d8d8315ab0ea9b306f0a0
SHA10316c6e558148a10d0acf63bc84f53ca315b1acf
SHA25639f7abd459bda03744d7d1dfb7dd15b2204014d75f20d86a13789648d6f44b1d
SHA512ddea7839a14759a27d17578850fb473f720bf911cb9d6e56c3e55a963eca51a85ae1706d2f8bca31b216fa7ef2457135dd1a198008203e6635cb73fd3df985f8