Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12-09-2024 16:03

General

  • Target

    dc92098fed3f3bd811855c23d7590259_JaffaCakes118.js

  • Size

    19KB

  • MD5

    dc92098fed3f3bd811855c23d7590259

  • SHA1

    91e47896c6e48bc49173ae16fcb5e7d00f4aa91b

  • SHA256

    9471fe7cdfa2a3bdb4e6cb98b1a54ffa45c059db47a4b3b0875b04f9fb967652

  • SHA512

    2964adb2b05eaaa0ab114e749b24da3123b662a163072bedee8462d6466c65eda46fe8f8327ca66f7cde9cc9f1820ab99f0c8328b2d3cecfef63b51e5917809f

  • SSDEEP

    384:cAyFOFwVfmTQ86AHpFh0h4xdeD3Ie9X760vFbQUK3XnE/4ZrKG72WEg:cT8F3TQZAHFa4xU3VLaHtZrKG7BEg

Malware Config

Extracted

Family

metasploit

Version

windows/download_exec

C2

http://azurlink.net:443/tempur-pedic/tempur-ergo-adjustable-base/mfi134086.html

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\dc92098fed3f3bd811855c23d7590259_JaffaCakes118.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1076
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 1076 -s 772
      2⤵
        PID:2920

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1076-0-0x000007FEF5B43000-0x000007FEF5B44000-memory.dmp

      Filesize

      4KB

    • memory/1076-1-0x0000000004670000-0x0000000004766000-memory.dmp

      Filesize

      984KB

    • memory/1076-2-0x0000000001F40000-0x0000000001F48000-memory.dmp

      Filesize

      32KB

    • memory/1076-3-0x000007FEF5B40000-0x000007FEF652C000-memory.dmp

      Filesize

      9.9MB

    • memory/1076-4-0x0000000001FF0000-0x0000000001FF1000-memory.dmp

      Filesize

      4KB

    • memory/1076-6-0x000007FEF5B43000-0x000007FEF5B44000-memory.dmp

      Filesize

      4KB

    • memory/1076-7-0x000007FEF5B40000-0x000007FEF652C000-memory.dmp

      Filesize

      9.9MB