Analysis
-
max time kernel
138s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12-07-2024 23:12
Static task
static1
Behavioral task
behavioral1
Sample
3f3fb6c4a75fbb16b3e606ad8e2d02db_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3f3fb6c4a75fbb16b3e606ad8e2d02db_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3f3fb6c4a75fbb16b3e606ad8e2d02db_JaffaCakes118.exe
-
Size
946KB
-
MD5
3f3fb6c4a75fbb16b3e606ad8e2d02db
-
SHA1
1df357189a51c817424e136cee8a7328c4909fd0
-
SHA256
3a9b139a1964f6aac91b667ac08d58be8cff754d1ab3bfa0f4481a173bbcda96
-
SHA512
3884859a336111886b262ceecb14e72a1c840a53e9cb3ab9a114590cade48fc759b6be57b7c5f6bd043c9d0611110e5f6f000ad813c57bc08a12bac23da24523
-
SSDEEP
24576:SYrawIcSkDsgxm9rbudn0K2BYiQPMn47s:lrawIckImjhiiQPS4Q
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4432 msedge.exe 4432 msedge.exe 2028 msedge.exe 2028 msedge.exe 2412 identity_helper.exe 2412 identity_helper.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1424 3f3fb6c4a75fbb16b3e606ad8e2d02db_JaffaCakes118.exe 1424 3f3fb6c4a75fbb16b3e606ad8e2d02db_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1424 wrote to memory of 2028 1424 3f3fb6c4a75fbb16b3e606ad8e2d02db_JaffaCakes118.exe 86 PID 1424 wrote to memory of 2028 1424 3f3fb6c4a75fbb16b3e606ad8e2d02db_JaffaCakes118.exe 86 PID 2028 wrote to memory of 4992 2028 msedge.exe 87 PID 2028 wrote to memory of 4992 2028 msedge.exe 87 PID 2028 wrote to memory of 2764 2028 msedge.exe 88 PID 2028 wrote to memory of 2764 2028 msedge.exe 88 PID 2028 wrote to memory of 2764 2028 msedge.exe 88 PID 2028 wrote to memory of 2764 2028 msedge.exe 88 PID 2028 wrote to memory of 2764 2028 msedge.exe 88 PID 2028 wrote to memory of 2764 2028 msedge.exe 88 PID 2028 wrote to memory of 2764 2028 msedge.exe 88 PID 2028 wrote to memory of 2764 2028 msedge.exe 88 PID 2028 wrote to memory of 2764 2028 msedge.exe 88 PID 2028 wrote to memory of 2764 2028 msedge.exe 88 PID 2028 wrote to memory of 2764 2028 msedge.exe 88 PID 2028 wrote to memory of 2764 2028 msedge.exe 88 PID 2028 wrote to memory of 2764 2028 msedge.exe 88 PID 2028 wrote to memory of 2764 2028 msedge.exe 88 PID 2028 wrote to memory of 2764 2028 msedge.exe 88 PID 2028 wrote to memory of 2764 2028 msedge.exe 88 PID 2028 wrote to memory of 2764 2028 msedge.exe 88 PID 2028 wrote to memory of 2764 2028 msedge.exe 88 PID 2028 wrote to memory of 2764 2028 msedge.exe 88 PID 2028 wrote to memory of 2764 2028 msedge.exe 88 PID 2028 wrote to memory of 2764 2028 msedge.exe 88 PID 2028 wrote to memory of 2764 2028 msedge.exe 88 PID 2028 wrote to memory of 2764 2028 msedge.exe 88 PID 2028 wrote to memory of 2764 2028 msedge.exe 88 PID 2028 wrote to memory of 2764 2028 msedge.exe 88 PID 2028 wrote to memory of 2764 2028 msedge.exe 88 PID 2028 wrote to memory of 2764 2028 msedge.exe 88 PID 2028 wrote to memory of 2764 2028 msedge.exe 88 PID 2028 wrote to memory of 2764 2028 msedge.exe 88 PID 2028 wrote to memory of 2764 2028 msedge.exe 88 PID 2028 wrote to memory of 2764 2028 msedge.exe 88 PID 2028 wrote to memory of 2764 2028 msedge.exe 88 PID 2028 wrote to memory of 2764 2028 msedge.exe 88 PID 2028 wrote to memory of 2764 2028 msedge.exe 88 PID 2028 wrote to memory of 2764 2028 msedge.exe 88 PID 2028 wrote to memory of 2764 2028 msedge.exe 88 PID 2028 wrote to memory of 2764 2028 msedge.exe 88 PID 2028 wrote to memory of 2764 2028 msedge.exe 88 PID 2028 wrote to memory of 2764 2028 msedge.exe 88 PID 2028 wrote to memory of 2764 2028 msedge.exe 88 PID 2028 wrote to memory of 4432 2028 msedge.exe 89 PID 2028 wrote to memory of 4432 2028 msedge.exe 89 PID 2028 wrote to memory of 928 2028 msedge.exe 90 PID 2028 wrote to memory of 928 2028 msedge.exe 90 PID 2028 wrote to memory of 928 2028 msedge.exe 90 PID 2028 wrote to memory of 928 2028 msedge.exe 90 PID 2028 wrote to memory of 928 2028 msedge.exe 90 PID 2028 wrote to memory of 928 2028 msedge.exe 90 PID 2028 wrote to memory of 928 2028 msedge.exe 90 PID 2028 wrote to memory of 928 2028 msedge.exe 90 PID 2028 wrote to memory of 928 2028 msedge.exe 90 PID 2028 wrote to memory of 928 2028 msedge.exe 90 PID 2028 wrote to memory of 928 2028 msedge.exe 90 PID 2028 wrote to memory of 928 2028 msedge.exe 90 PID 2028 wrote to memory of 928 2028 msedge.exe 90 PID 2028 wrote to memory of 928 2028 msedge.exe 90 PID 2028 wrote to memory of 928 2028 msedge.exe 90 PID 2028 wrote to memory of 928 2028 msedge.exe 90 PID 2028 wrote to memory of 928 2028 msedge.exe 90 PID 2028 wrote to memory of 928 2028 msedge.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f3fb6c4a75fbb16b3e606ad8e2d02db_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3f3fb6c4a75fbb16b3e606ad8e2d02db_JaffaCakes118.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://board.codesoft.cc/forumdisplay.php?f=852⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0xd8,0x7ffcbc3746f8,0x7ffcbc374708,0x7ffcbc3747183⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,435766596657939552,1054484661138583630,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:23⤵PID:2764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,435766596657939552,1054484661138583630,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,435766596657939552,1054484661138583630,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:83⤵PID:928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,435766596657939552,1054484661138583630,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:13⤵PID:1792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,435766596657939552,1054484661138583630,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:13⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,435766596657939552,1054484661138583630,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4160 /prefetch:83⤵PID:2884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,435766596657939552,1054484661138583630,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4160 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,435766596657939552,1054484661138583630,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:13⤵PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,435766596657939552,1054484661138583630,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:13⤵PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,435766596657939552,1054484661138583630,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4648 /prefetch:13⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,435766596657939552,1054484661138583630,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:13⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,435766596657939552,1054484661138583630,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:13⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,435766596657939552,1054484661138583630,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3560 /prefetch:13⤵PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,435766596657939552,1054484661138583630,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:13⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,435766596657939552,1054484661138583630,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3096 /prefetch:13⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,435766596657939552,1054484661138583630,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5936 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1976
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1384
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2072
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5584971c8ba88c824fd51a05dddb45a98
SHA1b7c9489b4427652a9cdd754d1c1b6ac4034be421
SHA256e2d8de6c2323bbb3863ec50843d9b58a22e911fd626d31430658b9ea942cd307
SHA5125dbf1a4631a04d1149d8fab2b8e0e43ccd97b7212de43b961b9128a8bf03329164fdeb480154a8ffea5835f28417a7d2b115b8bf8d578d00b13c3682aa5ca726
-
Filesize
152B
MD5b28ef7d9f6d74f055cc49876767c886c
SHA1d6b3267f36c340979f8fc3e012fdd02c468740bf
SHA256fa6804456884789f4bdf9c3f5a4a8f29e0ededde149c4384072f3d8cc85bcc37
SHA512491f893c8f765e5d629bce8dd5067cef4e2ebc558d43bfb05e358bca43e1a66ee1285519bc266fd0ff5b5e09769a56077b62ac55fa8797c1edf6205843356e75
-
Filesize
6KB
MD5230bcee3cf2d790cf35ce65efad731f7
SHA1a2f841e3a28da84860fbee8c863a42cca7348b24
SHA256b11a9bb8f64024d6da585053da9938dcf88902a996e2e4f009d59e3e174735d1
SHA51233efb19ec96b29ccbb28f4bde790f1e000ccfe476b705559e935a0b59f11d7b2431ece6e4b2d2b712d3008fd80225b24a7eebf7ff3fca73164e72a3a59a2227a
-
Filesize
6KB
MD5b7db091efb1323a20a8791dce531efe7
SHA1714b6c83c8f7b3c4d9259ff14b7f22fb3d7822fe
SHA256a05a57ea430740c52dfd283fdc307b0e13cf5f5a6256d8af17cd27570010909a
SHA5128e6d572c2130b8bb72a577dbbd009a61a92fada5715dd11257125f8043e1587fda219707690efd14490aba7e8e4ef34f790d55ec2e121768cc7901ed1a97d827
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59abbd8c464e35e741a93999ee5e32525
SHA1d12101df23df8c34eb633d1a0839df271d8680e9
SHA2564f24b61794ddb45ce858555ac700c85aa51d09a7142936fcba3a74a270e34aef
SHA51250798c23261588b2c8b160f329b4246f2373b87998df780648b9cff09e7554773971c4675fee7d5829986ba98dc2782ab14f78e8727d31dc957e3587899836ac