Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
30-08-2024 20:00
Static task
static1
Behavioral task
behavioral1
Sample
cb908352d719b9e0a7142c4110ae502e_JaffaCakes118.lnk
Resource
win7-20240704-en
windows7-x64
4 signatures
150 seconds
General
-
Target
cb908352d719b9e0a7142c4110ae502e_JaffaCakes118.lnk
-
Size
938KB
-
MD5
cb908352d719b9e0a7142c4110ae502e
-
SHA1
e50a8c33b315517a4bad5eb35fb09e572c3ee9fa
-
SHA256
f5f79e2169db3bbe7b7ae3ff4a0f40659d11051e69ee784f5469659a708e829e
-
SHA512
9502d7c069532571277e3c8c849e9ce81130a11bf5ad892dad688aa9e53973abc76fb5b53aee72ca37fe29e50aa2543f2681a6d849ada59b9e07ff6e3b574909
-
SSDEEP
12288:HZ3Si/5CQsdRgvhS+u1vBcxqDE/4QiqkgLGVRivcLwOtIO1nKnVn/oGugLF3:53D5C5LgvMr1mx8y4dqLGnZn12Vngfg9
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 588 wrote to memory of 2908 588 cmd.exe 31 PID 588 wrote to memory of 2908 588 cmd.exe 31 PID 588 wrote to memory of 2908 588 cmd.exe 31 PID 2908 wrote to memory of 2612 2908 cmd.exe 32 PID 2908 wrote to memory of 2612 2908 cmd.exe 32 PID 2908 wrote to memory of 2612 2908 cmd.exe 32 PID 2908 wrote to memory of 3044 2908 cmd.exe 33 PID 2908 wrote to memory of 3044 2908 cmd.exe 33 PID 2908 wrote to memory of 3044 2908 cmd.exe 33 PID 2908 wrote to memory of 2752 2908 cmd.exe 34 PID 2908 wrote to memory of 2752 2908 cmd.exe 34 PID 2908 wrote to memory of 2752 2908 cmd.exe 34
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\cb908352d719b9e0a7142c4110ae502e_JaffaCakes118.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c path=C:\Windows\system32&move "VerificationDocuments.pdf.lnk " "C:\Users\Admin\AppData\Local\Temp\1.lnk"&type "C:\Users\Admin\AppData\Local\Temp\1.lnk"|find "END2">"C:\Users\Admin\AppData\Local\Temp\0.js"&wscript "C:\Users\Admin\AppData\Local\Temp\0.js"2⤵
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" type "C:\Users\Admin\AppData\Local\Temp\1.lnk""3⤵PID:2612
-
-
C:\Windows\system32\find.exefind "END2"3⤵PID:3044
-
-
C:\Windows\system32\wscript.exewscript "C:\Users\Admin\AppData\Local\Temp\0.js"3⤵PID:2752
-
-