Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 21:54
Static task
static1
Behavioral task
behavioral1
Sample
f6edd0eac50f2a0efd32bff77c3af7c7_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
f6edd0eac50f2a0efd32bff77c3af7c7_JaffaCakes118.exe
-
Size
903KB
-
MD5
f6edd0eac50f2a0efd32bff77c3af7c7
-
SHA1
4776b641c07d6320b5657e3e14dfaec2c3ef120a
-
SHA256
18e730c58a9d2c93e49fa190c3443891e8015f680985a84e7e811790bee24965
-
SHA512
889cc71cd5de0eca2cab5d83aade9734807d30c237dcbbea26e24ea6d2c6cb4c40ce3c501c4ab3084ca16b256c12fff05b6193e53df55198c9bf418b546aa73b
-
SSDEEP
24576:tAHnh+eWsN3skA4RV1Hom2KXMmHa8TmwHV5:Mh+ZkldoPK8Ya8TmU
Malware Config
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 5 2496 WScript.exe 8 2496 WScript.exe 9 2496 WScript.exe 11 2496 WScript.exe 12 2496 WScript.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OneDrive.js f6edd0eac50f2a0efd32bff77c3af7c7_JaffaCakes118.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f6edd0eac50f2a0efd32bff77c3af7c7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2732 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2496 2792 f6edd0eac50f2a0efd32bff77c3af7c7_JaffaCakes118.exe 29 PID 2792 wrote to memory of 2496 2792 f6edd0eac50f2a0efd32bff77c3af7c7_JaffaCakes118.exe 29 PID 2792 wrote to memory of 2496 2792 f6edd0eac50f2a0efd32bff77c3af7c7_JaffaCakes118.exe 29 PID 2792 wrote to memory of 2496 2792 f6edd0eac50f2a0efd32bff77c3af7c7_JaffaCakes118.exe 29 PID 2496 wrote to memory of 2732 2496 WScript.exe 32 PID 2496 wrote to memory of 2732 2496 WScript.exe 32 PID 2496 wrote to memory of 2732 2496 WScript.exe 32 PID 2496 wrote to memory of 2732 2496 WScript.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6edd0eac50f2a0efd32bff77c3af7c7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f6edd0eac50f2a0efd32bff77c3af7c7_JaffaCakes118.exe"1⤵
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OneDrive.js"2⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OneDrive.js3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2732
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5ee4ec8513de7ae050c9bb51431a187ee
SHA105a2d86a1f73ebc5911cdcef1a95f146bdb08243
SHA256661f52553c374d882dbcd5e8b1c7cbe8431e31a56b619b080348dd7e1de46e6d
SHA512a7d015deea0091296f2da9cd63d4aa4cffa05c66bca6be0908a87b39fe4664cbbedd19f4ae4201a0426f231afdc64f0d62864421574ecf3ac878752e63b00307