Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 20:27
Behavioral task
behavioral1
Sample
3a9a79e1ca5b1cef78e466c89572f0b7_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3a9a79e1ca5b1cef78e466c89572f0b7_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3a9a79e1ca5b1cef78e466c89572f0b7_JaffaCakes118.exe
-
Size
13KB
-
MD5
3a9a79e1ca5b1cef78e466c89572f0b7
-
SHA1
75500870f1feae36bf2ef4dcf1b101a07b01d1c1
-
SHA256
bdc5392ea94f6ba25a765b8e6fbd274ce8b0c9baacbaeeac944a7592165493a6
-
SHA512
e34eb46eb7b9284a2171b45fa49c4bd56e0e2285fd9de7ff8bb1a4b5be8761afcc0847659139bb3a86cd30a1f5e62e258c7d3cd2a09f45db6d814fcb21b9ed65
-
SSDEEP
192:Llp/COzVmK54Alwv7E6ClWIjr9ZCspE+TMwrRmK+vhOrK7x:XaiA7NClDOeM4m/d
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3244-0-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3244-2-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3340 msedge.exe 3340 msedge.exe 4700 msedge.exe 4700 msedge.exe 4792 identity_helper.exe 4792 identity_helper.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3244 3a9a79e1ca5b1cef78e466c89572f0b7_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3244 wrote to memory of 4700 3244 3a9a79e1ca5b1cef78e466c89572f0b7_JaffaCakes118.exe 86 PID 3244 wrote to memory of 4700 3244 3a9a79e1ca5b1cef78e466c89572f0b7_JaffaCakes118.exe 86 PID 4700 wrote to memory of 4948 4700 msedge.exe 87 PID 4700 wrote to memory of 4948 4700 msedge.exe 87 PID 4700 wrote to memory of 4988 4700 msedge.exe 88 PID 4700 wrote to memory of 4988 4700 msedge.exe 88 PID 4700 wrote to memory of 4988 4700 msedge.exe 88 PID 4700 wrote to memory of 4988 4700 msedge.exe 88 PID 4700 wrote to memory of 4988 4700 msedge.exe 88 PID 4700 wrote to memory of 4988 4700 msedge.exe 88 PID 4700 wrote to memory of 4988 4700 msedge.exe 88 PID 4700 wrote to memory of 4988 4700 msedge.exe 88 PID 4700 wrote to memory of 4988 4700 msedge.exe 88 PID 4700 wrote to memory of 4988 4700 msedge.exe 88 PID 4700 wrote to memory of 4988 4700 msedge.exe 88 PID 4700 wrote to memory of 4988 4700 msedge.exe 88 PID 4700 wrote to memory of 4988 4700 msedge.exe 88 PID 4700 wrote to memory of 4988 4700 msedge.exe 88 PID 4700 wrote to memory of 4988 4700 msedge.exe 88 PID 4700 wrote to memory of 4988 4700 msedge.exe 88 PID 4700 wrote to memory of 4988 4700 msedge.exe 88 PID 4700 wrote to memory of 4988 4700 msedge.exe 88 PID 4700 wrote to memory of 4988 4700 msedge.exe 88 PID 4700 wrote to memory of 4988 4700 msedge.exe 88 PID 4700 wrote to memory of 4988 4700 msedge.exe 88 PID 4700 wrote to memory of 4988 4700 msedge.exe 88 PID 4700 wrote to memory of 4988 4700 msedge.exe 88 PID 4700 wrote to memory of 4988 4700 msedge.exe 88 PID 4700 wrote to memory of 4988 4700 msedge.exe 88 PID 4700 wrote to memory of 4988 4700 msedge.exe 88 PID 4700 wrote to memory of 4988 4700 msedge.exe 88 PID 4700 wrote to memory of 4988 4700 msedge.exe 88 PID 4700 wrote to memory of 4988 4700 msedge.exe 88 PID 4700 wrote to memory of 4988 4700 msedge.exe 88 PID 4700 wrote to memory of 4988 4700 msedge.exe 88 PID 4700 wrote to memory of 4988 4700 msedge.exe 88 PID 4700 wrote to memory of 4988 4700 msedge.exe 88 PID 4700 wrote to memory of 4988 4700 msedge.exe 88 PID 4700 wrote to memory of 4988 4700 msedge.exe 88 PID 4700 wrote to memory of 4988 4700 msedge.exe 88 PID 4700 wrote to memory of 4988 4700 msedge.exe 88 PID 4700 wrote to memory of 4988 4700 msedge.exe 88 PID 4700 wrote to memory of 4988 4700 msedge.exe 88 PID 4700 wrote to memory of 4988 4700 msedge.exe 88 PID 4700 wrote to memory of 3340 4700 msedge.exe 89 PID 4700 wrote to memory of 3340 4700 msedge.exe 89 PID 4700 wrote to memory of 2224 4700 msedge.exe 90 PID 4700 wrote to memory of 2224 4700 msedge.exe 90 PID 4700 wrote to memory of 2224 4700 msedge.exe 90 PID 4700 wrote to memory of 2224 4700 msedge.exe 90 PID 4700 wrote to memory of 2224 4700 msedge.exe 90 PID 4700 wrote to memory of 2224 4700 msedge.exe 90 PID 4700 wrote to memory of 2224 4700 msedge.exe 90 PID 4700 wrote to memory of 2224 4700 msedge.exe 90 PID 4700 wrote to memory of 2224 4700 msedge.exe 90 PID 4700 wrote to memory of 2224 4700 msedge.exe 90 PID 4700 wrote to memory of 2224 4700 msedge.exe 90 PID 4700 wrote to memory of 2224 4700 msedge.exe 90 PID 4700 wrote to memory of 2224 4700 msedge.exe 90 PID 4700 wrote to memory of 2224 4700 msedge.exe 90 PID 4700 wrote to memory of 2224 4700 msedge.exe 90 PID 4700 wrote to memory of 2224 4700 msedge.exe 90 PID 4700 wrote to memory of 2224 4700 msedge.exe 90 PID 4700 wrote to memory of 2224 4700 msedge.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a9a79e1ca5b1cef78e466c89572f0b7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3a9a79e1ca5b1cef78e466c89572f0b7_JaffaCakes118.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://ads.eorezo.com/cgi-bin/advert/getads?did=4332⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb94a846f8,0x7ffb94a84708,0x7ffb94a847183⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,13461041059314052315,2184371290616096693,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:23⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,13461041059314052315,2184371290616096693,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,13461041059314052315,2184371290616096693,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:83⤵PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,13461041059314052315,2184371290616096693,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:13⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,13461041059314052315,2184371290616096693,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:13⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,13461041059314052315,2184371290616096693,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 /prefetch:83⤵PID:1992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,13461041059314052315,2184371290616096693,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,13461041059314052315,2184371290616096693,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:13⤵PID:3304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,13461041059314052315,2184371290616096693,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:13⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,13461041059314052315,2184371290616096693,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5720 /prefetch:13⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,13461041059314052315,2184371290616096693,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:13⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,13461041059314052315,2184371290616096693,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5312 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4356
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1772
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD575c9f57baeefeecd6c184627de951c1e
SHA152e0468e13cbfc9f15fc62cc27ce14367a996cff
SHA256648ba270261690bb792f95d017e134d81a612ef4fc76dc41921c9e5b8f46d98f
SHA512c4570cc4bb4894de3ecc8eee6cd8bfa5809ea401ceef683557fb170175ff4294cc21cdc6834db4e79e5e82d3bf16105894fff83290d26343423324bc486d4a15
-
Filesize
152B
MD510fa19df148444a77ceec60cabd2ce21
SHA1685b599c497668166ede4945d8885d204fd8d70f
SHA256c3b5deb970d0f06a05c8111da90330ffe25da195aafa4e182211669484d1964b
SHA5123518ce16fef66c59e0bdb772db51aeaa9042c44ca399be61ca3d9979351f93655393236711cf2b1988d5f90a5b9318a7569a8cef3374fc745a8f9aa8323691ef
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD535df701d5e19b52f92151dd2d127ce54
SHA126d60f18b8b1c706afc07373f34383724c17e5b9
SHA25629ef0a0a66f64a11e7e5db9570178df867d3723f1e896aaa60f73c45ed2c2511
SHA512321a93105f43acb299135940768ff1817bffb7cbc831403634c6a882ce54049bf876310c4fa3b6b2ec7d2c0e23dad36277e921e904645cfda5788d831100024c
-
Filesize
6KB
MD52a5e65f421524a318cef27c6418ceeb1
SHA1c932e3fd0946057a3b5d707960218821e2f6ea49
SHA2560f79add61f8197518a9fad91994412e416d6418fdf671182af6390490d6bb0b2
SHA5120417bd6e5a5d717d6354178ed07cbb458d540ecec4558fc5003c2d8411df6c6cef3787981392acefff6d49879b8dc66da3151e41505164375568505677ca4b07
-
Filesize
6KB
MD5fb06f1c92e8d06dcd91af6eadb840624
SHA1f67bb9c4879adae3de0797ed82a8a0a11df4ae88
SHA2561ae2f9106235304c8274df654e0f6063382329acfa36a9554ceaeda235f65af1
SHA51276079b21d060ead452133718130724627483cbf58aeb2d4b16c0fad4401856747f3d0dff6af1483d3c7bb1d982a7d77a3ec657ec978c9a99c469cbab89eb2c1a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c4c6c55c76f81f657aeb34324435e020
SHA1994440279501a50274778148f17b5c4280e2c983
SHA256df43a45a4cee3c3b65132af7e7d90b47ee81c76535d2490806bc8aa7c90b3a95
SHA512d3abc587efcaca58b131d74d2ab2a97c738ec77051900ad6f30741e8d64b0fd31f9ccc161ce6ee235fad4a5f5a3dd746f48004ba4c293d4b32803a1b1dbe80ef