Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-09-2024 21:54

General

  • Target

    f6edd0eac50f2a0efd32bff77c3af7c7_JaffaCakes118.exe

  • Size

    903KB

  • MD5

    f6edd0eac50f2a0efd32bff77c3af7c7

  • SHA1

    4776b641c07d6320b5657e3e14dfaec2c3ef120a

  • SHA256

    18e730c58a9d2c93e49fa190c3443891e8015f680985a84e7e811790bee24965

  • SHA512

    889cc71cd5de0eca2cab5d83aade9734807d30c237dcbbea26e24ea6d2c6cb4c40ce3c501c4ab3084ca16b256c12fff05b6193e53df55198c9bf418b546aa73b

  • SSDEEP

    24576:tAHnh+eWsN3skA4RV1Hom2KXMmHa8TmwHV5:Mh+ZkldoPK8Ya8TmU

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 5 IoCs
  • Drops startup file 1 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6edd0eac50f2a0efd32bff77c3af7c7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f6edd0eac50f2a0efd32bff77c3af7c7_JaffaCakes118.exe"
    1⤵
    • Drops startup file
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2792
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OneDrive.js"
      2⤵
      • Blocklisted process makes network request
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2496
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OneDrive.js
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:2732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\OneDrive.js

    Filesize

    6KB

    MD5

    ee4ec8513de7ae050c9bb51431a187ee

    SHA1

    05a2d86a1f73ebc5911cdcef1a95f146bdb08243

    SHA256

    661f52553c374d882dbcd5e8b1c7cbe8431e31a56b619b080348dd7e1de46e6d

    SHA512

    a7d015deea0091296f2da9cd63d4aa4cffa05c66bca6be0908a87b39fe4664cbbedd19f4ae4201a0426f231afdc64f0d62864421574ecf3ac878752e63b00307