Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2024, 09:30
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_ed7953e4573f862ce1ff418416e392670944a7d1f25ce25b2164c903470b6daf.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_ed7953e4573f862ce1ff418416e392670944a7d1f25ce25b2164c903470b6daf.vbs
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_ed7953e4573f862ce1ff418416e392670944a7d1f25ce25b2164c903470b6daf.vbs
-
Size
7KB
-
MD5
2d279b1ff24694aedac0940f3e297a71
-
SHA1
983522f60204a435e0b05ee93608303c177a296d
-
SHA256
ed7953e4573f862ce1ff418416e392670944a7d1f25ce25b2164c903470b6daf
-
SHA512
3948feaefed27971edf6d8f725a867b6975f54e9f9e183dfa8f61482303a300cb7910a920cf98ee5e7b65ef4e302f6da4b39d9a9a69cfd2b9c71af0cd1e9cde3
-
SSDEEP
96:joRhn5eXGILYvLL8ervgBsM+PzzrDpoI1yF1dMFVBgDlBu3r77aC:UhnQlYvLL8e8GB9XN7BgHu37r
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_tcp
192.168.77.130:8080
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 1 IoCs
pid Process 3592 gvUnDdEkO.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gvUnDdEkO.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2588 wrote to memory of 3592 2588 WScript.exe 83 PID 2588 wrote to memory of 3592 2588 WScript.exe 83 PID 2588 wrote to memory of 3592 2588 WScript.exe 83
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ed7953e4573f862ce1ff418416e392670944a7d1f25ce25b2164c903470b6daf.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\rad2F074.tmp\gvUnDdEkO.exe"C:\Users\Admin\AppData\Local\Temp\rad2F074.tmp\gvUnDdEkO.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3592
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD51d47107ef6844fb699ae752396f92f8c
SHA193aa8d70d4bccfb9c02ca049b2c7fe82e1347554
SHA256d3f8a7c6d7e89756278d20a9c0de00a9809bf374ec0a40c20500b809607344b7
SHA512844bf95165246687ae55f1ac485c01181709fb9d03c80aa9b0f2c534ee34040cc92d70218366f183ee8a746688bfe7c0dafd81ab43d9815c31c38f06e4fdff5c