Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 16:03
Static task
static1
Behavioral task
behavioral1
Sample
dc92098fed3f3bd811855c23d7590259_JaffaCakes118.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc92098fed3f3bd811855c23d7590259_JaffaCakes118.js
Resource
win10v2004-20240802-en
General
-
Target
dc92098fed3f3bd811855c23d7590259_JaffaCakes118.js
-
Size
19KB
-
MD5
dc92098fed3f3bd811855c23d7590259
-
SHA1
91e47896c6e48bc49173ae16fcb5e7d00f4aa91b
-
SHA256
9471fe7cdfa2a3bdb4e6cb98b1a54ffa45c059db47a4b3b0875b04f9fb967652
-
SHA512
2964adb2b05eaaa0ab114e749b24da3123b662a163072bedee8462d6466c65eda46fe8f8327ca66f7cde9cc9f1820ab99f0c8328b2d3cecfef63b51e5917809f
-
SSDEEP
384:cAyFOFwVfmTQ86AHpFh0h4xdeD3Ie9X760vFbQUK3XnE/4ZrKG72WEg:cT8F3TQZAHFa4xU3VLaHtZrKG7BEg
Malware Config
Extracted
metasploit
windows/download_exec
http://azurlink.net:443/tempur-pedic/tempur-ergo-adjustable-base/mfi134086.html
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1076 wrote to memory of 2920 1076 wscript.exe 30 PID 1076 wrote to memory of 2920 1076 wscript.exe 30 PID 1076 wrote to memory of 2920 1076 wscript.exe 30