Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 19:29
Static task
static1
Behavioral task
behavioral1
Sample
071c608a80c84e55ed4ead5e577104ea_JaffaCakes118.jar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
071c608a80c84e55ed4ead5e577104ea_JaffaCakes118.jar
Resource
win10v2004-20240802-en
General
-
Target
071c608a80c84e55ed4ead5e577104ea_JaffaCakes118.jar
-
Size
187KB
-
MD5
071c608a80c84e55ed4ead5e577104ea
-
SHA1
1dd9194c56acd00e0ea5dabe9555334856a620c0
-
SHA256
4fe2155de6e61665205a522e8fc7c95d25f53362f2e319fcd0993c4ea93bbbad
-
SHA512
25d4486c9352b5223113bbbeab5afc64cdfeb621b43f80aeb64f0400aeca364e91e9a3037e894c1918d5bce8a832d9e035aa77c41f57a9c67cd1c294059c7b62
-
SSDEEP
3072:ZIlbuz5kQLKPTzBPDmrKI/aoMQXw8TDcgMZ4sNgvC8xV1Wu4cTXCrnqAq1l8O:Z6ax+7FDA2QA8T3MOM0bVAhO
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
java.exewscript.exedescription pid Process procid_target PID 584 wrote to memory of 2728 584 java.exe 32 PID 584 wrote to memory of 2728 584 java.exe 32 PID 584 wrote to memory of 2728 584 java.exe 32 PID 2728 wrote to memory of 2700 2728 wscript.exe 33 PID 2728 wrote to memory of 2700 2728 wscript.exe 33 PID 2728 wrote to memory of 2700 2728 wscript.exe 33
Processes
-
C:\Windows\system32\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\071c608a80c84e55ed4ead5e577104ea_JaffaCakes118.jar1⤵
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Windows\system32\wscript.exewscript C:\Users\Admin\opzidxsfdk.js2⤵
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\mxksmijbx.txt"3⤵PID:2700
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5caa505646d19fd3e3e7de7b34ed5db77
SHA1e5e5181d3a8c7a22cfb39a4538237bc62697e805
SHA256aab7895819ff88404f40ed2645c0d411f04b56f018b6e72246f8475b3605882b
SHA512f6c492547308564b1129dd03bbec622d5130010e9d50e7e9fa71f3430b75b6f2f291168b80ab4d765e626bbd886703601d880bd4e3aca4517cedcf99e1838603
-
Filesize
866KB
MD5b275441d305e83de9981ae9335b28d46
SHA11e781c8c3475d675a8554e7e3f7025e0bc8dd580
SHA25622a107a28e169cb1332a6e9dcf870610a9573faa0744b4e83570ad748c850573
SHA51220923420748f8efce687b7bf10b21388bdfde0dcbcdadd41077de8fa100fc8b3bae86b991d49f01ffa00e7fec6332b06d4675d15e614a817a852dd7db95877db