Analysis
-
max time kernel
146s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 09:15
Static task
static1
Behavioral task
behavioral1
Sample
c06ac630ec83a7541c4de1ccc68add6e_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c06ac630ec83a7541c4de1ccc68add6e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c06ac630ec83a7541c4de1ccc68add6e_JaffaCakes118.exe
-
Size
45KB
-
MD5
c06ac630ec83a7541c4de1ccc68add6e
-
SHA1
310e57c13ef88d8e2d0f9c656c937d1cb9715237
-
SHA256
4edae73a2c617b011b038cd1882a53308bf469bd96ed70e61e320023d67f6837
-
SHA512
07eb57e340edb15756ec8efbbbbc6c68dc564d8f98bb5faa3559f002a36d25bb8f885dd7fff264cad1022675f8439fc1d793ed0d2db2ae068046bcd773700a1c
-
SSDEEP
768:JC5qVQgwBcxcYeUmoL76iP98LhyvXW7yDyUtcQIQ4kt0brV8xO2:Q5qVQyh9j7EhyNPvqnixO2
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c06ac630ec83a7541c4de1ccc68add6e_JaffaCakes118.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3276 msedge.exe 3276 msedge.exe 4824 msedge.exe 4824 msedge.exe 3792 identity_helper.exe 3792 identity_helper.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4484 wrote to memory of 4824 4484 c06ac630ec83a7541c4de1ccc68add6e_JaffaCakes118.exe 84 PID 4484 wrote to memory of 4824 4484 c06ac630ec83a7541c4de1ccc68add6e_JaffaCakes118.exe 84 PID 4824 wrote to memory of 4892 4824 msedge.exe 85 PID 4824 wrote to memory of 4892 4824 msedge.exe 85 PID 4824 wrote to memory of 2156 4824 msedge.exe 86 PID 4824 wrote to memory of 2156 4824 msedge.exe 86 PID 4824 wrote to memory of 2156 4824 msedge.exe 86 PID 4824 wrote to memory of 2156 4824 msedge.exe 86 PID 4824 wrote to memory of 2156 4824 msedge.exe 86 PID 4824 wrote to memory of 2156 4824 msedge.exe 86 PID 4824 wrote to memory of 2156 4824 msedge.exe 86 PID 4824 wrote to memory of 2156 4824 msedge.exe 86 PID 4824 wrote to memory of 2156 4824 msedge.exe 86 PID 4824 wrote to memory of 2156 4824 msedge.exe 86 PID 4824 wrote to memory of 2156 4824 msedge.exe 86 PID 4824 wrote to memory of 2156 4824 msedge.exe 86 PID 4824 wrote to memory of 2156 4824 msedge.exe 86 PID 4824 wrote to memory of 2156 4824 msedge.exe 86 PID 4824 wrote to memory of 2156 4824 msedge.exe 86 PID 4824 wrote to memory of 2156 4824 msedge.exe 86 PID 4824 wrote to memory of 2156 4824 msedge.exe 86 PID 4824 wrote to memory of 2156 4824 msedge.exe 86 PID 4824 wrote to memory of 2156 4824 msedge.exe 86 PID 4824 wrote to memory of 2156 4824 msedge.exe 86 PID 4824 wrote to memory of 2156 4824 msedge.exe 86 PID 4824 wrote to memory of 2156 4824 msedge.exe 86 PID 4824 wrote to memory of 2156 4824 msedge.exe 86 PID 4824 wrote to memory of 2156 4824 msedge.exe 86 PID 4824 wrote to memory of 2156 4824 msedge.exe 86 PID 4824 wrote to memory of 2156 4824 msedge.exe 86 PID 4824 wrote to memory of 2156 4824 msedge.exe 86 PID 4824 wrote to memory of 2156 4824 msedge.exe 86 PID 4824 wrote to memory of 2156 4824 msedge.exe 86 PID 4824 wrote to memory of 2156 4824 msedge.exe 86 PID 4824 wrote to memory of 2156 4824 msedge.exe 86 PID 4824 wrote to memory of 2156 4824 msedge.exe 86 PID 4824 wrote to memory of 2156 4824 msedge.exe 86 PID 4824 wrote to memory of 2156 4824 msedge.exe 86 PID 4824 wrote to memory of 2156 4824 msedge.exe 86 PID 4824 wrote to memory of 2156 4824 msedge.exe 86 PID 4824 wrote to memory of 2156 4824 msedge.exe 86 PID 4824 wrote to memory of 2156 4824 msedge.exe 86 PID 4824 wrote to memory of 2156 4824 msedge.exe 86 PID 4824 wrote to memory of 2156 4824 msedge.exe 86 PID 4824 wrote to memory of 3276 4824 msedge.exe 87 PID 4824 wrote to memory of 3276 4824 msedge.exe 87 PID 4824 wrote to memory of 3976 4824 msedge.exe 88 PID 4824 wrote to memory of 3976 4824 msedge.exe 88 PID 4824 wrote to memory of 3976 4824 msedge.exe 88 PID 4824 wrote to memory of 3976 4824 msedge.exe 88 PID 4824 wrote to memory of 3976 4824 msedge.exe 88 PID 4824 wrote to memory of 3976 4824 msedge.exe 88 PID 4824 wrote to memory of 3976 4824 msedge.exe 88 PID 4824 wrote to memory of 3976 4824 msedge.exe 88 PID 4824 wrote to memory of 3976 4824 msedge.exe 88 PID 4824 wrote to memory of 3976 4824 msedge.exe 88 PID 4824 wrote to memory of 3976 4824 msedge.exe 88 PID 4824 wrote to memory of 3976 4824 msedge.exe 88 PID 4824 wrote to memory of 3976 4824 msedge.exe 88 PID 4824 wrote to memory of 3976 4824 msedge.exe 88 PID 4824 wrote to memory of 3976 4824 msedge.exe 88 PID 4824 wrote to memory of 3976 4824 msedge.exe 88 PID 4824 wrote to memory of 3976 4824 msedge.exe 88 PID 4824 wrote to memory of 3976 4824 msedge.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\c06ac630ec83a7541c4de1ccc68add6e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c06ac630ec83a7541c4de1ccc68add6e_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://orkut.com/2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb88aa46f8,0x7ffb88aa4708,0x7ffb88aa47183⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,15685307927848573121,3268176166611961026,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:23⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,15685307927848573121,3268176166611961026,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,15685307927848573121,3268176166611961026,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:83⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,15685307927848573121,3268176166611961026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:13⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,15685307927848573121,3268176166611961026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:13⤵PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,15685307927848573121,3268176166611961026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:13⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,15685307927848573121,3268176166611961026,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5288 /prefetch:83⤵PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,15685307927848573121,3268176166611961026,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5288 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,15685307927848573121,3268176166611961026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:13⤵PID:780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,15685307927848573121,3268176166611961026,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:13⤵PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,15685307927848573121,3268176166611961026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:13⤵PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,15685307927848573121,3268176166611961026,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:13⤵PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,15685307927848573121,3268176166611961026,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4868 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2024
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2988
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD548a1b39139cc0e021c539221f8b079e8
SHA17477a8e94cd95a4174c62de967bd6242d7572372
SHA2562a0d8c4752e5422788ee34e99c8ace2e469e48bed6f9a53554c5bf344ed512ad
SHA512e747d5fffe29b01de6c4d94d771b6d52e076c8760b16ac7b90974144a5895fbba6286f3db8a44e4bffb52c8b7993f350c814d9e30a32bd0f4c151fb76c294e52
-
Filesize
880B
MD5b3ee5d67d1a38e6fef7f67495fd6b4b5
SHA1e9165618283d6b0a682682e8fbc5444f73e7d68b
SHA256380d4a68697a931b1311dc4b7c62ead633b24557039b0c6e473975efb6e91e85
SHA5124544ced3191cf268292f75f5febac859ac8226ce8291eb6b5c5071e06d63170ab39840fa3bdd0cc2f4c03ad878e6d99f350bc5f401355661522a52d535b5541e
-
Filesize
5KB
MD5a88e2985c2d8b67c4b250949c2b83698
SHA1d5a4304522bb44d15c369f79b2b8fbdf3c50e573
SHA256a7fb0c186751ee430d2f98ab15298de122b8658351a714cc1216931705bdf530
SHA512b09d57265eb25ebb892381de92efca4e2349352fae2fc079ebeac0366fd6026c0ff000c3170888a75d59e57eb18fb405f7a292c360a6161c514a2da08658deaa
-
Filesize
6KB
MD59e8b6f0eccd92d7dfec8b1a06c5334bf
SHA1bc014bdeebb08eafac4b0f2a0aa8a4d188c52c16
SHA2561fe5db48c8ca5c6e921494ef2933849aeb7b857aa57285b0ed79fb22dd4dd08a
SHA512f1a701f3c00ae7f53fbc8f853e32f2bfc00c0d2c9d9400c0c1a629e9ec836032b59ed878af6bbef756cd1d376fde31c1e97406d5908e7581ffb22e2f80c502b8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59f3945ff9eff08ed004ef8938355aaea
SHA1d26af4af0b153425f447833b73e0513da22acd84
SHA2560a3f1426b4dfdce09a0bbe056fa68dff4e147b49714f56b7f43c10db2a63c8b9
SHA512660b2157fcf44c6a8f24e86d52b559bfaacd5bb09419fe7dcd8757a6e8aef01f4c5054928e708d718d8cd7c5270813b873609048d15c3f3a820add979ee6577b