Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
10-01-2025 22:44
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_f041d2da1a5839119c042afda5c966ad.js
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_f041d2da1a5839119c042afda5c966ad.js
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_f041d2da1a5839119c042afda5c966ad.js
-
Size
23KB
-
MD5
f041d2da1a5839119c042afda5c966ad
-
SHA1
78dee5cee82ae393737ddbff9ccf13ad460f6711
-
SHA256
88831eb51e1546b02091a0b2508f19e82c1feea3fec4d4c10fac83e3df107677
-
SHA512
1838dc189474e0896cc5e800d0595ede6a6bc0c6535a3eb247cb2b0525763c923615762de7857ade40ecd970b8b3ef0a33075d2bae9b22e2d5aad7ae0ba37a81
-
SSDEEP
384:Jm3uw3bALv6vsBkAB0W8/u3ZOYEu/99BEm9e0M8LIgyfAmKI2KlVgPIfQI4AqRh3:klrAr+zNWpOC99Gm3BLIgy4mKI22V8QE
Malware Config
Signatures
-
Vjw0rm family
-
Blocklisted process makes network request 18 IoCs
flow pid Process 8 2588 wscript.exe 9 2588 wscript.exe 13 2588 wscript.exe 15 2588 wscript.exe 18 2588 wscript.exe 21 2588 wscript.exe 23 2588 wscript.exe 26 2588 wscript.exe 29 2588 wscript.exe 31 2588 wscript.exe 34 2588 wscript.exe 37 2588 wscript.exe 41 2588 wscript.exe 42 2588 wscript.exe 45 2588 wscript.exe 49 2588 wscript.exe 51 2588 wscript.exe 53 2588 wscript.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\JaffaCakes118_f041d2da1a5839119c042afda5c966ad.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hHHTUAlbjt.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hHHTUAlbjt.js wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\XIKPFFU2BI = "\"C:\\Users\\Admin\\AppData\\Roaming\\JaffaCakes118_f041d2da1a5839119c042afda5c966ad.js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\hHHTUAlbjt.js\"" wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2588 wrote to memory of 2612 2588 wscript.exe 31 PID 2588 wrote to memory of 2612 2588 wscript.exe 31 PID 2588 wrote to memory of 2612 2588 wscript.exe 31
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f041d2da1a5839119c042afda5c966ad.js1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\hHHTUAlbjt.js"2⤵
- Drops startup file
- Adds Run key to start application
PID:2612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD592267ddaf97462922152ddb1e0165db8
SHA199d87937a9844ce24481a4499ae9bc5dd39a0604
SHA25661c77f0004a30e87cb6a0b27b56b54e50436b1e532342f01790b398847640b02
SHA5126d349ce485a573700990c26b845fe559172097c58bf2fee31d61e6feebd73d2be17b61957c582bb4be5f6f6671abe40ec9f8ebe24e360ce26dca9988343220a9