Analysis
-
max time kernel
146s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-08-2024 07:38
Behavioral task
behavioral1
Sample
b29eb60b8c1e990d654195f59c76efb7_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
b29eb60b8c1e990d654195f59c76efb7_JaffaCakes118.exe
-
Size
13KB
-
MD5
b29eb60b8c1e990d654195f59c76efb7
-
SHA1
cd6ab6dad745e37ed19b170f6e0ba05dc426ded8
-
SHA256
a606c49420e8e4ea520a39a9d595e042d5fefaccd138b7ff4d46a285ffa0a0fc
-
SHA512
ad5dc9a88d61d5651fb880450ade16278df6632984bd320670625d3f0d60b9b4f4525675507f23950d706d068ec99bfc6d596eec9a727a48649d1ce0b3e96f02
-
SSDEEP
192:yS4gbgkAN4SJj+bfrJsUwv7E6cO/sgZu7Br9ZCspE+TMIr3/bjOg+vtwJrRDM:yS4uI44aJ+7Np/3ZLeME/bjTDM
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3516-0-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3516-2-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b29eb60b8c1e990d654195f59c76efb7_JaffaCakes118.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2020 msedge.exe 2020 msedge.exe 3968 msedge.exe 3968 msedge.exe 4780 identity_helper.exe 4780 identity_helper.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3516 b29eb60b8c1e990d654195f59c76efb7_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3516 wrote to memory of 3968 3516 b29eb60b8c1e990d654195f59c76efb7_JaffaCakes118.exe 87 PID 3516 wrote to memory of 3968 3516 b29eb60b8c1e990d654195f59c76efb7_JaffaCakes118.exe 87 PID 3968 wrote to memory of 2204 3968 msedge.exe 88 PID 3968 wrote to memory of 2204 3968 msedge.exe 88 PID 3968 wrote to memory of 3988 3968 msedge.exe 90 PID 3968 wrote to memory of 3988 3968 msedge.exe 90 PID 3968 wrote to memory of 3988 3968 msedge.exe 90 PID 3968 wrote to memory of 3988 3968 msedge.exe 90 PID 3968 wrote to memory of 3988 3968 msedge.exe 90 PID 3968 wrote to memory of 3988 3968 msedge.exe 90 PID 3968 wrote to memory of 3988 3968 msedge.exe 90 PID 3968 wrote to memory of 3988 3968 msedge.exe 90 PID 3968 wrote to memory of 3988 3968 msedge.exe 90 PID 3968 wrote to memory of 3988 3968 msedge.exe 90 PID 3968 wrote to memory of 3988 3968 msedge.exe 90 PID 3968 wrote to memory of 3988 3968 msedge.exe 90 PID 3968 wrote to memory of 3988 3968 msedge.exe 90 PID 3968 wrote to memory of 3988 3968 msedge.exe 90 PID 3968 wrote to memory of 3988 3968 msedge.exe 90 PID 3968 wrote to memory of 3988 3968 msedge.exe 90 PID 3968 wrote to memory of 3988 3968 msedge.exe 90 PID 3968 wrote to memory of 3988 3968 msedge.exe 90 PID 3968 wrote to memory of 3988 3968 msedge.exe 90 PID 3968 wrote to memory of 3988 3968 msedge.exe 90 PID 3968 wrote to memory of 3988 3968 msedge.exe 90 PID 3968 wrote to memory of 3988 3968 msedge.exe 90 PID 3968 wrote to memory of 3988 3968 msedge.exe 90 PID 3968 wrote to memory of 3988 3968 msedge.exe 90 PID 3968 wrote to memory of 3988 3968 msedge.exe 90 PID 3968 wrote to memory of 3988 3968 msedge.exe 90 PID 3968 wrote to memory of 3988 3968 msedge.exe 90 PID 3968 wrote to memory of 3988 3968 msedge.exe 90 PID 3968 wrote to memory of 3988 3968 msedge.exe 90 PID 3968 wrote to memory of 3988 3968 msedge.exe 90 PID 3968 wrote to memory of 3988 3968 msedge.exe 90 PID 3968 wrote to memory of 3988 3968 msedge.exe 90 PID 3968 wrote to memory of 3988 3968 msedge.exe 90 PID 3968 wrote to memory of 3988 3968 msedge.exe 90 PID 3968 wrote to memory of 3988 3968 msedge.exe 90 PID 3968 wrote to memory of 3988 3968 msedge.exe 90 PID 3968 wrote to memory of 3988 3968 msedge.exe 90 PID 3968 wrote to memory of 3988 3968 msedge.exe 90 PID 3968 wrote to memory of 3988 3968 msedge.exe 90 PID 3968 wrote to memory of 3988 3968 msedge.exe 90 PID 3968 wrote to memory of 2020 3968 msedge.exe 91 PID 3968 wrote to memory of 2020 3968 msedge.exe 91 PID 3968 wrote to memory of 4196 3968 msedge.exe 92 PID 3968 wrote to memory of 4196 3968 msedge.exe 92 PID 3968 wrote to memory of 4196 3968 msedge.exe 92 PID 3968 wrote to memory of 4196 3968 msedge.exe 92 PID 3968 wrote to memory of 4196 3968 msedge.exe 92 PID 3968 wrote to memory of 4196 3968 msedge.exe 92 PID 3968 wrote to memory of 4196 3968 msedge.exe 92 PID 3968 wrote to memory of 4196 3968 msedge.exe 92 PID 3968 wrote to memory of 4196 3968 msedge.exe 92 PID 3968 wrote to memory of 4196 3968 msedge.exe 92 PID 3968 wrote to memory of 4196 3968 msedge.exe 92 PID 3968 wrote to memory of 4196 3968 msedge.exe 92 PID 3968 wrote to memory of 4196 3968 msedge.exe 92 PID 3968 wrote to memory of 4196 3968 msedge.exe 92 PID 3968 wrote to memory of 4196 3968 msedge.exe 92 PID 3968 wrote to memory of 4196 3968 msedge.exe 92 PID 3968 wrote to memory of 4196 3968 msedge.exe 92 PID 3968 wrote to memory of 4196 3968 msedge.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\b29eb60b8c1e990d654195f59c76efb7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b29eb60b8c1e990d654195f59c76efb7_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://ads.eorezo.com/cgi-bin/advert/getads?did=432⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd860746f8,0x7ffd86074708,0x7ffd860747183⤵PID:2204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,16930627587824399758,752912583670058140,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2004 /prefetch:23⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2000,16930627587824399758,752912583670058140,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2000,16930627587824399758,752912583670058140,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:83⤵PID:4196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,16930627587824399758,752912583670058140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:13⤵PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,16930627587824399758,752912583670058140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:13⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,16930627587824399758,752912583670058140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4172 /prefetch:13⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,16930627587824399758,752912583670058140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:13⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2000,16930627587824399758,752912583670058140,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5328 /prefetch:83⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2000,16930627587824399758,752912583670058140,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5328 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,16930627587824399758,752912583670058140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4292 /prefetch:13⤵PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,16930627587824399758,752912583670058140,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4204 /prefetch:13⤵PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,16930627587824399758,752912583670058140,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4232 /prefetch:13⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,16930627587824399758,752912583670058140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:13⤵PID:2660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,16930627587824399758,752912583670058140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2164 /prefetch:13⤵PID:324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,16930627587824399758,752912583670058140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:13⤵PID:912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,16930627587824399758,752912583670058140,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5036 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4016
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4072
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
6KB
MD551f48558fe997c85570e6e09e8f30891
SHA1767bb98c20c95433f5aa93c638443df14e16a391
SHA256928f5e5ed6048b9bb5e889f47fff8dcb27a8706cb41a737c55fd8d01f6bd1fc3
SHA51212a87ba6c4b641357c005ca5172971449fd152b24eab1af739b0367e94f5a94a582b42c2438cc37a1db1c3c102bbd701ad34a8861d91cffc8ce8e1536eefda61
-
Filesize
5KB
MD55dfefdb8cc2521aa5438af7d8a91839b
SHA120a5628d1ed39190aede9ab80df9b37a22ef0829
SHA256faed3b8f0d32a58a857d4b7dcf1fc69d9f5b16b913f2c2f31aa5f01592701e5d
SHA512d1b47ce4985018ee86163a20e68770e1b1cbd07ce063c8131fc7648141a335c907af1e0999bc8b1f77c697a57cc081b332178481ef4d048676120da62e6965dc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD566a217d38895b8a6768e149248536dfd
SHA1f2319fa44d16cf849d18e5d0225166b01152ec0f
SHA2563a0192701d173a2c744f23ab1f0a4388d0f7dd9d8f26e80874cae7998c18146f
SHA512db92a83758ec5497b8c928ff1dd4faee48167ff536dd9ec8f3a973eceea1ae872dec48ceb24308e6e1e18b4914352b12de7c593e6ac51cf0ca964f2424ac2938