Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11/09/2024, 12:42

General

  • Target

    da5ee952397b22df4618cff8d80061f4_JaffaCakes118.vbs

  • Size

    7KB

  • MD5

    da5ee952397b22df4618cff8d80061f4

  • SHA1

    35694a627b2ef4bf86e0e7ff07ef5a14488bd618

  • SHA256

    db23663a7b8305efaa53cf8c11868e98837d67532a20ae08812edea223386d3e

  • SHA512

    bc4f069dfaa18abd2d2949ebe5a890551bd0b23adf3cc76514338758a75cf9325b25e5714d0ddfa2accd096262a2e3a85abc3b818102dfaa070ec01d373eed81

  • SSDEEP

    96:pXDxoz05Eal5Eag5SDyA+n+x9z5eLbKq5Eajq5EaRq5Eal5Eaa8dfu:dOnagaeSDyO99esaNavagaa81u

Score
10/10

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 34 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\da5ee952397b22df4618cff8d80061f4_JaffaCakes118.vbs"
    1⤵
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Adds Run key to start application
    • Drops autorun.inf file
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1388
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe" /e,/select, C:\Users\Admin\AppData\Local\Temp\da5ee952397b22df4618cff8d80061f4_JaffaCakes118.vbs
      2⤵
        PID:2788
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      PID:2356

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\boot.ini

      Filesize

      7KB

      MD5

      bf55fdfedc87189f2d9e3ff7101132f1

      SHA1

      35af9f4b611e3d527b133d8dc657b6c8dcb77094

      SHA256

      0332de57e9049ffad0a73bb11cee3e4c38b3099225f63cb2c7ebe3ece4c28c79

      SHA512

      76485aab2b9e67873a5a7a7dc334d101ff5d6f1b8dd8ea616e2e42a314f107e80641c3231291ab646c97516851c5ce3ccd54be9700e746ee12157c1b807c4c59

    • F:\.MS32DLL.dll.vbs

      Filesize

      7KB

      MD5

      9fd1a8699acc1562b10e77429386c88b

      SHA1

      1cfd361020b23a0560c9dc3596943ed9bd681628

      SHA256

      517cca470480b923ac50fcb367ad990437eb4e3f63a142d88229e3287e34e592

      SHA512

      399738e20a73a142906f88f71b298740169739d49755fb0896d1c194135c656fc97a2f0f814a7c580ff5b0406b1febd32ab2634f6fa8aab13cd427916637c567

    • F:\autorun.inf

      Filesize

      106B

      MD5

      cc7b643cec40a3c2eafe4bb7c8e68bae

      SHA1

      7bd7934a3123fd7ffb8d40d3896404947e42bb7a

      SHA256

      ed2de48f16e26b2b4a37c0d4e1fd8ed6746399feb1b8ad4a107a74be327794eb

      SHA512

      d29a63267d205ba7e54e3ae8f92abc0d45bc0a809a0a9d6d8887f73ee8a5a0278ecc8ad3c5adb3390183e7493f8b95dc47bb242ed5b9a4d4779ee94a1f81a63b

    • memory/2356-17-0x0000000003D10000-0x0000000003D20000-memory.dmp

      Filesize

      64KB