Analysis
-
max time kernel
96s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 20:53
Static task
static1
Behavioral task
behavioral1
Sample
fd1ff162c6ad1440cd76a9a02e717e47_JaffaCakes118.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd1ff162c6ad1440cd76a9a02e717e47_JaffaCakes118.vbs
Resource
win10v2004-20240802-en
General
-
Target
fd1ff162c6ad1440cd76a9a02e717e47_JaffaCakes118.vbs
-
Size
4KB
-
MD5
fd1ff162c6ad1440cd76a9a02e717e47
-
SHA1
54dfb12426808b13a1ec8a2297ce8b175745e346
-
SHA256
efccb4e58a62a6cb2f78ac9fa59d6da0fcbde311a74e7cd3e652efb996494b87
-
SHA512
b94353bf12cf6f11a91af7d1605757007cfbfd32a2697a379ed3797c91fb466c3c8f675b7867156d0d8d827a7afc13bdedff3262fa5b5f55088414c90009c62e
-
SSDEEP
48:fpKzLl2iKDwNB5yhrxthOmmSB0lYMybjRQuOiX2VC3p:RKgDYBeommQjyuM+
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation WScript.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\windows\local\SEND.txt WScript.exe File created C:\windows\system\init.vbs WScript.exe File opened for modification C:\windows\system\init.vbs WScript.exe File created C:\windows\local\SEND.txt WScript.exe File created C:\windows\local\DATA.vbs WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 5032 wrote to memory of 3384 5032 WScript.exe 82 PID 5032 wrote to memory of 3384 5032 WScript.exe 82 PID 3384 wrote to memory of 3784 3384 net.exe 84 PID 3384 wrote to memory of 3784 3384 net.exe 84
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fd1ff162c6ad1440cd76a9a02e717e47_JaffaCakes118.vbs"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" share local=C:\windows\local2⤵
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 share local=C:\windows\local3⤵PID:3784
-
-