Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 20:53
Static task
static1
Behavioral task
behavioral1
Sample
fd1ff162c6ad1440cd76a9a02e717e47_JaffaCakes118.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd1ff162c6ad1440cd76a9a02e717e47_JaffaCakes118.vbs
Resource
win10v2004-20240802-en
General
-
Target
fd1ff162c6ad1440cd76a9a02e717e47_JaffaCakes118.vbs
-
Size
4KB
-
MD5
fd1ff162c6ad1440cd76a9a02e717e47
-
SHA1
54dfb12426808b13a1ec8a2297ce8b175745e346
-
SHA256
efccb4e58a62a6cb2f78ac9fa59d6da0fcbde311a74e7cd3e652efb996494b87
-
SHA512
b94353bf12cf6f11a91af7d1605757007cfbfd32a2697a379ed3797c91fb466c3c8f675b7867156d0d8d827a7afc13bdedff3262fa5b5f55088414c90009c62e
-
SSDEEP
48:fpKzLl2iKDwNB5yhrxthOmmSB0lYMybjRQuOiX2VC3p:RKgDYBeommQjyuM+
Malware Config
Signatures
-
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\windows\system\init.vbs WScript.exe File opened for modification C:\windows\system\init.vbs WScript.exe File created C:\windows\local\SEND.txt WScript.exe File created C:\windows\local\DATA.vbs WScript.exe File opened for modification C:\windows\local\SEND.txt WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2892 2204 WScript.exe 30 PID 2204 wrote to memory of 2892 2204 WScript.exe 30 PID 2204 wrote to memory of 2892 2204 WScript.exe 30 PID 2892 wrote to memory of 3056 2892 net.exe 32 PID 2892 wrote to memory of 3056 2892 net.exe 32 PID 2892 wrote to memory of 3056 2892 net.exe 32
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fd1ff162c6ad1440cd76a9a02e717e47_JaffaCakes118.vbs"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" share local=C:\windows\local2⤵
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 share local=C:\windows\local3⤵PID:3056
-
-