Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 20:02
Static task
static1
Behavioral task
behavioral1
Sample
b0a1e62efed0013ac8a71866dbfed747_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b0a1e62efed0013ac8a71866dbfed747_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b0a1e62efed0013ac8a71866dbfed747_JaffaCakes118.exe
-
Size
64KB
-
MD5
b0a1e62efed0013ac8a71866dbfed747
-
SHA1
593b0a0f87484ae1430b892712e8685ef99668e2
-
SHA256
65452f36997f541c137ea95a435b5c99256903c91366462767b672237b13c34b
-
SHA512
99a907d691f0ad0f6cbed6ae93572e0696c2b56b4aa0e9e42ef1b5abe10eb10449861b00cd6c4b1cbcc0cbaeceafbba8c117a7cf35c12b4b5651665381b1afde
-
SSDEEP
1536:fpqFQqHJOfPZTAKTnVLpM3JBdRzRccYxG:AZHAfqKTNpM3n9pYxG
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b0a1e62efed0013ac8a71866dbfed747_JaffaCakes118.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4856 msedge.exe 4856 msedge.exe 3584 msedge.exe 3584 msedge.exe 3836 identity_helper.exe 3836 identity_helper.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1576 wrote to memory of 3584 1576 b0a1e62efed0013ac8a71866dbfed747_JaffaCakes118.exe 88 PID 1576 wrote to memory of 3584 1576 b0a1e62efed0013ac8a71866dbfed747_JaffaCakes118.exe 88 PID 3584 wrote to memory of 2020 3584 msedge.exe 89 PID 3584 wrote to memory of 2020 3584 msedge.exe 89 PID 3584 wrote to memory of 2808 3584 msedge.exe 90 PID 3584 wrote to memory of 2808 3584 msedge.exe 90 PID 3584 wrote to memory of 2808 3584 msedge.exe 90 PID 3584 wrote to memory of 2808 3584 msedge.exe 90 PID 3584 wrote to memory of 2808 3584 msedge.exe 90 PID 3584 wrote to memory of 2808 3584 msedge.exe 90 PID 3584 wrote to memory of 2808 3584 msedge.exe 90 PID 3584 wrote to memory of 2808 3584 msedge.exe 90 PID 3584 wrote to memory of 2808 3584 msedge.exe 90 PID 3584 wrote to memory of 2808 3584 msedge.exe 90 PID 3584 wrote to memory of 2808 3584 msedge.exe 90 PID 3584 wrote to memory of 2808 3584 msedge.exe 90 PID 3584 wrote to memory of 2808 3584 msedge.exe 90 PID 3584 wrote to memory of 2808 3584 msedge.exe 90 PID 3584 wrote to memory of 2808 3584 msedge.exe 90 PID 3584 wrote to memory of 2808 3584 msedge.exe 90 PID 3584 wrote to memory of 2808 3584 msedge.exe 90 PID 3584 wrote to memory of 2808 3584 msedge.exe 90 PID 3584 wrote to memory of 2808 3584 msedge.exe 90 PID 3584 wrote to memory of 2808 3584 msedge.exe 90 PID 3584 wrote to memory of 2808 3584 msedge.exe 90 PID 3584 wrote to memory of 2808 3584 msedge.exe 90 PID 3584 wrote to memory of 2808 3584 msedge.exe 90 PID 3584 wrote to memory of 2808 3584 msedge.exe 90 PID 3584 wrote to memory of 2808 3584 msedge.exe 90 PID 3584 wrote to memory of 2808 3584 msedge.exe 90 PID 3584 wrote to memory of 2808 3584 msedge.exe 90 PID 3584 wrote to memory of 2808 3584 msedge.exe 90 PID 3584 wrote to memory of 2808 3584 msedge.exe 90 PID 3584 wrote to memory of 2808 3584 msedge.exe 90 PID 3584 wrote to memory of 2808 3584 msedge.exe 90 PID 3584 wrote to memory of 2808 3584 msedge.exe 90 PID 3584 wrote to memory of 2808 3584 msedge.exe 90 PID 3584 wrote to memory of 2808 3584 msedge.exe 90 PID 3584 wrote to memory of 2808 3584 msedge.exe 90 PID 3584 wrote to memory of 2808 3584 msedge.exe 90 PID 3584 wrote to memory of 2808 3584 msedge.exe 90 PID 3584 wrote to memory of 2808 3584 msedge.exe 90 PID 3584 wrote to memory of 2808 3584 msedge.exe 90 PID 3584 wrote to memory of 2808 3584 msedge.exe 90 PID 3584 wrote to memory of 4856 3584 msedge.exe 91 PID 3584 wrote to memory of 4856 3584 msedge.exe 91 PID 3584 wrote to memory of 1340 3584 msedge.exe 92 PID 3584 wrote to memory of 1340 3584 msedge.exe 92 PID 3584 wrote to memory of 1340 3584 msedge.exe 92 PID 3584 wrote to memory of 1340 3584 msedge.exe 92 PID 3584 wrote to memory of 1340 3584 msedge.exe 92 PID 3584 wrote to memory of 1340 3584 msedge.exe 92 PID 3584 wrote to memory of 1340 3584 msedge.exe 92 PID 3584 wrote to memory of 1340 3584 msedge.exe 92 PID 3584 wrote to memory of 1340 3584 msedge.exe 92 PID 3584 wrote to memory of 1340 3584 msedge.exe 92 PID 3584 wrote to memory of 1340 3584 msedge.exe 92 PID 3584 wrote to memory of 1340 3584 msedge.exe 92 PID 3584 wrote to memory of 1340 3584 msedge.exe 92 PID 3584 wrote to memory of 1340 3584 msedge.exe 92 PID 3584 wrote to memory of 1340 3584 msedge.exe 92 PID 3584 wrote to memory of 1340 3584 msedge.exe 92 PID 3584 wrote to memory of 1340 3584 msedge.exe 92 PID 3584 wrote to memory of 1340 3584 msedge.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0a1e62efed0013ac8a71866dbfed747_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b0a1e62efed0013ac8a71866dbfed747_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.voxcards.com/2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc538f46f8,0x7ffc538f4708,0x7ffc538f47183⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,9415164031407090046,7997423979791855829,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1472 /prefetch:23⤵PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,9415164031407090046,7997423979791855829,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,9415164031407090046,7997423979791855829,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:83⤵PID:1340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,9415164031407090046,7997423979791855829,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:13⤵PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,9415164031407090046,7997423979791855829,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:13⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,9415164031407090046,7997423979791855829,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4056 /prefetch:13⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,9415164031407090046,7997423979791855829,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5448 /prefetch:83⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,9415164031407090046,7997423979791855829,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5448 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,9415164031407090046,7997423979791855829,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3696 /prefetch:13⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,9415164031407090046,7997423979791855829,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:13⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,9415164031407090046,7997423979791855829,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:13⤵PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,9415164031407090046,7997423979791855829,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:13⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,9415164031407090046,7997423979791855829,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4732 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4876
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3924
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD58ad9c6a60419b0e079180a228f96bbcc
SHA14cf046cc766aff27d1fdf660c8db549852c75765
SHA2562e830cee8c833d71448e59eaf662b5e6a9a1b7164f80c7d8e076bb83c33958f5
SHA5122df6a745daff1c5e5b081b47f4b6df29c9cba7144b1ea8b322821f0e55d81da939f62888e4346704c8811bb0d47cb6fada84b1cd98e0b8dd650153c588ab6155
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD581ad28135221414683260e4d4f828257
SHA14c639082bf736cee867f96aa798fb7e6f3378d5f
SHA256204348e3ed2357321fde794ee7f50894e2168efbebbf51f083876bc92e70b6cd
SHA512143bfb9d69efa21f328076f52e57e568f398bf13ca340f715a038144123b12f43edcb925a4d3ca66d1652b0dd0120f4f382cff6794e91581fe04c1e5d879028b
-
Filesize
539B
MD5058f02ba22c7b46a8401b9db8e57da9a
SHA1a249502b2d636e793af6dafc038658c62389ea99
SHA2561a418c7c08a4d0fcef7dca3f659cffddcc3bf5b9788a6e35ae4c90725d9bd39e
SHA512ac0afa316ad04cfaa2e97a63b1312ee6f88e9f11a73cefd1f1f00e848ace46b35ebd2ae3bda4e8d44a90782e393565089e629fc53a3b0244f184c13058d89493
-
Filesize
6KB
MD52ec30d2c9fc615d29c655adc7ba218c3
SHA10a33d2d696afbdaf3bc007534bb3a3a9d4e47a91
SHA25607d78f69fce741e16420a49305cef2bc4b3c999a763ef86c48794776bd295945
SHA5125f28b658a6d89325e53aa3491ac9f748e4b3ec422f8086243ca8a2237afd5644dc25d4a818d5bd184329c458bd26b0304b7e5ab378843c26d5a08a7a5f618f0f
-
Filesize
6KB
MD5f528de4a0f094ae7ced86d0c6ff0a740
SHA1a31bba24ddeffbd0d95a098ce2575ff5e8018cc0
SHA2564f5c355dd8e6d7ccfe204144ef2b5be3bdad1f44d77990a0bb2e7fc475b69671
SHA512368ef9f977fa4a9f59f8feb7fefa9fd3d478265ab79fa06c28121d0299873e69298471b1151d060aff7b1e44b441fdf2c2b592eac199fe8f5701487502b7025c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5638b40da004f80fbe9b4a1b6e3d4907c
SHA11b1e2deb07540b500b1b6d693cdb5b98e2b54719
SHA256bbaf6bf6ff46ff1a30fe83993d7e10d7625d34025785e848a88cdee3d9ddcf78
SHA512279769cc654ed071ad98b65fae03b1b1fe1c5257302cb1d8cf05f66e7b0e5676263eb62f4866c9f4d66202e655a2a9f267adc12d7b9cc74848da0e559519fbc6