Analysis
-
max time kernel
94s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 20:27
Static task
static1
Behavioral task
behavioral1
Sample
dcfe54df9a0eb05d23b3a05f5bb2ef0d_JaffaCakes118.vbs
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
dcfe54df9a0eb05d23b3a05f5bb2ef0d_JaffaCakes118.vbs
Resource
win10v2004-20240802-en
General
-
Target
dcfe54df9a0eb05d23b3a05f5bb2ef0d_JaffaCakes118.vbs
-
Size
4KB
-
MD5
dcfe54df9a0eb05d23b3a05f5bb2ef0d
-
SHA1
00221f442db29c3318ca5f6fe1a25c003c625bf3
-
SHA256
663362323267dafbeeedbb10dfe7bcb96df31fc25bb2ff3e3e3514fffff32ec4
-
SHA512
165a2f922f5c0e020c5c1b5d08add6be6fc4e0e08c176457f491a791e611d643b66761ad6da7793f8200e12e8fc443f9dbaaa12bd1dbef4f01f7e7aa469800c7
-
SSDEEP
96:KnMJATSqA/d8Ho+gkZOjBRVUGQ6w9TxnyHh:GM/qAl8Ho+gkZOjBRVVQ6w9TFyB
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2652 2224 WScript.exe 83 PID 2224 wrote to memory of 2652 2224 WScript.exe 83 PID 2652 wrote to memory of 4876 2652 cmd.exe 85 PID 2652 wrote to memory of 4876 2652 cmd.exe 85
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\dcfe54df9a0eb05d23b3a05f5bb2ef0d_JaffaCakes118.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k cscript //nologo "C:\Users\Admin\AppData\Local\Temp\dcfe54df9a0eb05d23b3a05f5bb2ef0d_JaffaCakes118.vbs"2⤵
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\system32\cscript.execscript //nologo "C:\Users\Admin\AppData\Local\Temp\dcfe54df9a0eb05d23b3a05f5bb2ef0d_JaffaCakes118.vbs"3⤵PID:4876
-
-