Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2024 18:11
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_c346c5553d730a5f500588c0cb604454019e0a9a8c234b09e3050de08c5c4de9.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_c346c5553d730a5f500588c0cb604454019e0a9a8c234b09e3050de08c5c4de9.js
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_c346c5553d730a5f500588c0cb604454019e0a9a8c234b09e3050de08c5c4de9.js
-
Size
10KB
-
MD5
bd854a8caf7e7c7755481169afebeb9d
-
SHA1
46d81477627836bdda15137a8837d10eb84bbbfc
-
SHA256
c346c5553d730a5f500588c0cb604454019e0a9a8c234b09e3050de08c5c4de9
-
SHA512
5d311fdf3958f117d5b06cb4e975a7bd373a1b9e8379e2df133472bcd30dca710afd382b848bffaf3899cfa1e887f0fe74f019878a24c326a081d15afa73e3e5
-
SSDEEP
192:gkMig/R6za3lOkLkE5mJcwbEMLZkkaRXB4QqcQpspQJg0w:giaVaEYJwML6kAKcQpspQJgB
Malware Config
Signatures
-
Vjw0rm family
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\JaffaCakes118_c346c5553d730a5f500588c0cb604454019e0a9a8c234b09e3050de08c5c4de9.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\JaffaCakes118_c346c5553d730a5f500588c0cb604454019e0a9a8c234b09e3050de08c5c4de9.js wscript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_c346c5553d730a5f500588c0cb604454019e0a9a8c234b09e3050de08c5c4de9.js\"" wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).