Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/10/2024, 17:05
Static task
static1
Behavioral task
behavioral1
Sample
52c22d1e0cdd64be69e8d7f4e44202f1_JaffaCakes118.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
52c22d1e0cdd64be69e8d7f4e44202f1_JaffaCakes118.vbs
Resource
win10v2004-20241007-en
General
-
Target
52c22d1e0cdd64be69e8d7f4e44202f1_JaffaCakes118.vbs
-
Size
129KB
-
MD5
52c22d1e0cdd64be69e8d7f4e44202f1
-
SHA1
6351563688e1041b23062dcbf8907cfb941a0254
-
SHA256
6a82095801b579849f93e58c13f4802ced81a5c3cd5f1283fef41ccdea5807bd
-
SHA512
df1dcf29e031f17db1e5487c8696aa7eb0bc823460be10cdfc11d7e514f4e64e756e6a6ceb808ce9d89d49876faa0cee45d516518c145cba74921768dea219f8
-
SSDEEP
1536:bv0thf2r6TbJgT3c8henl/Rq4xRMzyVqDa9Ii0eldJJgV3n97llGAmH+4dfrzyI7:bv06uJyxUl00Vh9Ii8bkJeozBXEc4dQ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 2 IoCs
pid Process 3040 NewTest.exe 2372 NewTest.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3040 set thread context of 2372 3040 NewTest.exe 90 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2468 3040 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NewTest.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings WScript.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 3868 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2372 NewTest.exe 2372 NewTest.exe 2372 NewTest.exe 2372 NewTest.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3648 wrote to memory of 3868 3648 WScript.exe 84 PID 3648 wrote to memory of 3868 3648 WScript.exe 84 PID 3648 wrote to memory of 3040 3648 WScript.exe 85 PID 3648 wrote to memory of 3040 3648 WScript.exe 85 PID 3648 wrote to memory of 3040 3648 WScript.exe 85 PID 3040 wrote to memory of 2372 3040 NewTest.exe 90 PID 3040 wrote to memory of 2372 3040 NewTest.exe 90 PID 3040 wrote to memory of 2372 3040 NewTest.exe 90 PID 3040 wrote to memory of 2372 3040 NewTest.exe 90 PID 3040 wrote to memory of 2372 3040 NewTest.exe 90 PID 2372 wrote to memory of 3424 2372 NewTest.exe 56 PID 2372 wrote to memory of 3424 2372 NewTest.exe 56 PID 2372 wrote to memory of 3424 2372 NewTest.exe 56 PID 2372 wrote to memory of 3424 2372 NewTest.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3424
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\52c22d1e0cdd64be69e8d7f4e44202f1_JaffaCakes118.vbs"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Test.txt3⤵
- Opens file in notepad (likely ransom note)
PID:3868
-
-
C:\NewTest.exe"C:\NewTest.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3040 -s 2244⤵
- Program crash
PID:2468
-
-
C:\NewTest.exeC:\NewTest.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2372
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3040 -ip 30401⤵PID:3600
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5dcda91587cda12c075c612881b9f7a72
SHA15b1d83b4e622ed037aeaf9ed49ceaffe90e70e27
SHA2566a4254f1a181a6421f904048f35054df58393e782c854b53a9ac12c55c32cc81
SHA512cbe1fbb0873c80d65f5365fb97e103511174b46e215506ee156307b6bb5d23411b511f7243eb8f364ec6dad214380b34fb0941a73ecf639f9b219d19976f7d55
-
Filesize
2B
MD581051bcc2cf1bedf378224b0a93e2877
SHA1ba8ab5a0280b953aa97435ff8946cbcbb2755a27
SHA2567eb70257593da06f682a3ddda54a9d260d4fc514f645237f5ca74b08f8da61a6
SHA5121b302a2f1e624a5fb5ad94ddc4e5f8bfd74d26fa37512d0e5face303d8c40eee0d0ffa3649f5da43f439914d128166cb6c4774a7caa3b174d7535451eb697b5d