Analysis

  • max time kernel
    130s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    24-06-2024 15:07

General

  • Target

    093aa4289d9d8d8315ab0ea9b306f0a0_JaffaCakes118.js

  • Size

    179KB

  • MD5

    093aa4289d9d8d8315ab0ea9b306f0a0

  • SHA1

    0316c6e558148a10d0acf63bc84f53ca315b1acf

  • SHA256

    39f7abd459bda03744d7d1dfb7dd15b2204014d75f20d86a13789648d6f44b1d

  • SHA512

    ddea7839a14759a27d17578850fb473f720bf911cb9d6e56c3e55a963eca51a85ae1706d2f8bca31b216fa7ef2457135dd1a198008203e6635cb73fd3df985f8

  • SSDEEP

    3072:+p1gHeX3reXqf6ZKOBRY+7Q0bamKZtvEzKbURCqeGK/6SbIpklgVDSxGfmuZyas:+p1gHeX3reXqf6ZKwRY+cM24RCqeGKZR

Malware Config

Signatures

  • WSHRAT

    WSHRAT is a variant of Houdini worm and has vbs and js variants.

  • WSHRAT payload 1 IoCs
  • Blocklisted process makes network request 6 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\093aa4289d9d8d8315ab0ea9b306f0a0_JaffaCakes118.js
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:836
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\093aa4289d9d8d8315ab0ea9b306f0a0_JaffaCakes118.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:2112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\093aa4289d9d8d8315ab0ea9b306f0a0_JaffaCakes118.js

    Filesize

    179KB

    MD5

    093aa4289d9d8d8315ab0ea9b306f0a0

    SHA1

    0316c6e558148a10d0acf63bc84f53ca315b1acf

    SHA256

    39f7abd459bda03744d7d1dfb7dd15b2204014d75f20d86a13789648d6f44b1d

    SHA512

    ddea7839a14759a27d17578850fb473f720bf911cb9d6e56c3e55a963eca51a85ae1706d2f8bca31b216fa7ef2457135dd1a198008203e6635cb73fd3df985f8