Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
10-12-2024 17:54
Static task
static1
Behavioral task
behavioral1
Sample
ddfd5ba555c1ddb846bcfea284304962_JaffaCakes118.jar
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ddfd5ba555c1ddb846bcfea284304962_JaffaCakes118.jar
Resource
win10v2004-20241007-en
General
-
Target
ddfd5ba555c1ddb846bcfea284304962_JaffaCakes118.jar
-
Size
120KB
-
MD5
ddfd5ba555c1ddb846bcfea284304962
-
SHA1
9e046cf863ee0dee8624c47d9eb3c21d1b9ea4d3
-
SHA256
ad73f495299becc7d5b604d46e6c04d228ff16a012fdea41f67bf163d015a7ed
-
SHA512
979e2ea5aed1774b9beebd518e0acb7b56ad4e1fa3f3378e32e0f45f41d930ebf4c90d75d75ba022603ea6232e6410be6fdf134f904d488e852df7f941a2d84f
-
SSDEEP
3072:wcg3Hek0RcdUBNMAg9TpKq1JVLxw1ghxDg3UPZdeE7GCe65/:jgeRusmAghIq1JVS1YxRPZdRqCfp
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2028 2400 java.exe 31 PID 2400 wrote to memory of 2028 2400 java.exe 31 PID 2400 wrote to memory of 2028 2400 java.exe 31 PID 2028 wrote to memory of 2912 2028 wscript.exe 32 PID 2028 wrote to memory of 2912 2028 wscript.exe 32 PID 2028 wrote to memory of 2912 2028 wscript.exe 32
Processes
-
C:\Windows\system32\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\ddfd5ba555c1ddb846bcfea284304962_JaffaCakes118.jar1⤵
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\system32\wscript.exewscript C:\Users\Admin\qdbqpwnlfg.js2⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\tdeljtpvd.txt"3⤵PID:2912
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD572e3da2f8357c43f4fdf82a9479a1c85
SHA10b3b520fdde7958f9d02e388130ff5f6dc3dc1b2
SHA256b1d480ddc3655879f8639184af5f1e6441660dc37216a8079982046e6e60c6c5
SHA5120892f05ec27661901a01015b3751d7575ecafd5468ab33fb157ceb5072a861a4b0d19cd8d0b8cfc89fadde4cb02a9e2e13d52ffbad35fdd1e728c15a9a8c7bf4
-
Filesize
183KB
MD5dbdc17cc3071823c2b75baaf93d4d913
SHA163dce087a69b02e7e25f2edd369dddda2bf40677
SHA2568dde095f7456f4c6cdbbe14223c189d6b4dc67e05a42eb812956dcd62e8fef28
SHA512e6be87150f05b3ca56e03ffae167f304859cabee4e24a345e3bfb9da07cbad23148b54df533c9912e1c7257997680bf8b4d2819c633a5c4bc1b025232646992a