Analysis
-
max time kernel
146s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 04:40
Static task
static1
Behavioral task
behavioral1
Sample
ea9a862e48dd3ed5da25acb9bf7e955c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea9a862e48dd3ed5da25acb9bf7e955c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ea9a862e48dd3ed5da25acb9bf7e955c_JaffaCakes118.exe
-
Size
50KB
-
MD5
ea9a862e48dd3ed5da25acb9bf7e955c
-
SHA1
98709be3402db16509c98f0266801b1f753b0e9b
-
SHA256
ef86a14cb8d51a57ee30eac91e70cffa42cbb1733dd80b1cf8f7da2d6ec7ad2d
-
SHA512
1c2e7502754682e57b117485adf4fe67262e2f3704937d2b9fe87517dc740f9b503df0aec15eb53baf74f484dbcb91eb83bc5f9e587c06dbf8db8a5b769ffb02
-
SSDEEP
1536:rsyqFgkWbZJjhWMKkb4nNI//ffpPCeGIEx:rJJPhbiGRPCLbx
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\ef26ev.dll ea9a862e48dd3ed5da25acb9bf7e955c_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea9a862e48dd3ed5da25acb9bf7e955c_JaffaCakes118.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3616 msedge.exe 3616 msedge.exe 880 msedge.exe 880 msedge.exe 1824 identity_helper.exe 1824 identity_helper.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1892 wrote to memory of 880 1892 ea9a862e48dd3ed5da25acb9bf7e955c_JaffaCakes118.exe 81 PID 1892 wrote to memory of 880 1892 ea9a862e48dd3ed5da25acb9bf7e955c_JaffaCakes118.exe 81 PID 880 wrote to memory of 1252 880 msedge.exe 82 PID 880 wrote to memory of 1252 880 msedge.exe 82 PID 880 wrote to memory of 4412 880 msedge.exe 83 PID 880 wrote to memory of 4412 880 msedge.exe 83 PID 880 wrote to memory of 4412 880 msedge.exe 83 PID 880 wrote to memory of 4412 880 msedge.exe 83 PID 880 wrote to memory of 4412 880 msedge.exe 83 PID 880 wrote to memory of 4412 880 msedge.exe 83 PID 880 wrote to memory of 4412 880 msedge.exe 83 PID 880 wrote to memory of 4412 880 msedge.exe 83 PID 880 wrote to memory of 4412 880 msedge.exe 83 PID 880 wrote to memory of 4412 880 msedge.exe 83 PID 880 wrote to memory of 4412 880 msedge.exe 83 PID 880 wrote to memory of 4412 880 msedge.exe 83 PID 880 wrote to memory of 4412 880 msedge.exe 83 PID 880 wrote to memory of 4412 880 msedge.exe 83 PID 880 wrote to memory of 4412 880 msedge.exe 83 PID 880 wrote to memory of 4412 880 msedge.exe 83 PID 880 wrote to memory of 4412 880 msedge.exe 83 PID 880 wrote to memory of 4412 880 msedge.exe 83 PID 880 wrote to memory of 4412 880 msedge.exe 83 PID 880 wrote to memory of 4412 880 msedge.exe 83 PID 880 wrote to memory of 4412 880 msedge.exe 83 PID 880 wrote to memory of 4412 880 msedge.exe 83 PID 880 wrote to memory of 4412 880 msedge.exe 83 PID 880 wrote to memory of 4412 880 msedge.exe 83 PID 880 wrote to memory of 4412 880 msedge.exe 83 PID 880 wrote to memory of 4412 880 msedge.exe 83 PID 880 wrote to memory of 4412 880 msedge.exe 83 PID 880 wrote to memory of 4412 880 msedge.exe 83 PID 880 wrote to memory of 4412 880 msedge.exe 83 PID 880 wrote to memory of 4412 880 msedge.exe 83 PID 880 wrote to memory of 4412 880 msedge.exe 83 PID 880 wrote to memory of 4412 880 msedge.exe 83 PID 880 wrote to memory of 4412 880 msedge.exe 83 PID 880 wrote to memory of 4412 880 msedge.exe 83 PID 880 wrote to memory of 4412 880 msedge.exe 83 PID 880 wrote to memory of 4412 880 msedge.exe 83 PID 880 wrote to memory of 4412 880 msedge.exe 83 PID 880 wrote to memory of 4412 880 msedge.exe 83 PID 880 wrote to memory of 4412 880 msedge.exe 83 PID 880 wrote to memory of 4412 880 msedge.exe 83 PID 880 wrote to memory of 3616 880 msedge.exe 84 PID 880 wrote to memory of 3616 880 msedge.exe 84 PID 880 wrote to memory of 3144 880 msedge.exe 85 PID 880 wrote to memory of 3144 880 msedge.exe 85 PID 880 wrote to memory of 3144 880 msedge.exe 85 PID 880 wrote to memory of 3144 880 msedge.exe 85 PID 880 wrote to memory of 3144 880 msedge.exe 85 PID 880 wrote to memory of 3144 880 msedge.exe 85 PID 880 wrote to memory of 3144 880 msedge.exe 85 PID 880 wrote to memory of 3144 880 msedge.exe 85 PID 880 wrote to memory of 3144 880 msedge.exe 85 PID 880 wrote to memory of 3144 880 msedge.exe 85 PID 880 wrote to memory of 3144 880 msedge.exe 85 PID 880 wrote to memory of 3144 880 msedge.exe 85 PID 880 wrote to memory of 3144 880 msedge.exe 85 PID 880 wrote to memory of 3144 880 msedge.exe 85 PID 880 wrote to memory of 3144 880 msedge.exe 85 PID 880 wrote to memory of 3144 880 msedge.exe 85 PID 880 wrote to memory of 3144 880 msedge.exe 85 PID 880 wrote to memory of 3144 880 msedge.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea9a862e48dd3ed5da25acb9bf7e955c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea9a862e48dd3ed5da25acb9bf7e955c_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.51.ac.cn/2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffbd65d46f8,0x7ffbd65d4708,0x7ffbd65d47183⤵PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2252,8719053406971291745,16524095484232087020,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2264 /prefetch:23⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2252,8719053406971291745,16524095484232087020,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2252,8719053406971291745,16524095484232087020,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:83⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,8719053406971291745,16524095484232087020,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:13⤵PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,8719053406971291745,16524095484232087020,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:13⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,8719053406971291745,16524095484232087020,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:13⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,8719053406971291745,16524095484232087020,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1528 /prefetch:13⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2252,8719053406971291745,16524095484232087020,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5368 /prefetch:83⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2252,8719053406971291745,16524095484232087020,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5368 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,8719053406971291745,16524095484232087020,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:13⤵PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,8719053406971291745,16524095484232087020,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:13⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,8719053406971291745,16524095484232087020,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:13⤵PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,8719053406971291745,16524095484232087020,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3976 /prefetch:13⤵PID:2860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,8719053406971291745,16524095484232087020,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2676 /prefetch:13⤵PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,8719053406971291745,16524095484232087020,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=640 /prefetch:13⤵PID:3192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2252,8719053406971291745,16524095484232087020,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:5108
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4300
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3128
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
Filesize
5KB
MD54c34f63ad9c9666e7d79f3c2ddb998af
SHA1d4866c2bf763f7a82b0d171eddb9a322be6342ce
SHA25606c05b8953a0a25c3483dcdb81ce495dd5c6e9d7d077fd12f24a23546725678e
SHA512d49d6b591efa27b4b149e3c5785ad6e24bfa8633b9a25edbac4e4694abba0e73fdbe74899c86ec0ed26494dd42d49fc5437a2ca6f8dcb62bdb652ccd7cb7ff0f
-
Filesize
6KB
MD57f53a1094ad0a4459de189ba6edf5e2f
SHA18efb5de748d0c99d39c81f847e263bb32bb9c5eb
SHA25641a174a20aa91fedacf4d705fff690c09d04889c8c44fdc98b3400aa78f88480
SHA5124b63c5e2b7264f99b3adee3d2edb3f7e5553eeba62d5811c24859e7022ca3375a26a6f4e6d84f70545fc205f731afb2ec6d2b059bbfecc3520fab4dd631fe3ff
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5315f99619050f6079e5e59fb17b03e81
SHA17ed7d50493ec6dd1b496d0d3aed8b61679fce4af
SHA25657380bc223891a508b0dd12b413c53e0132545ae0213f30cf5ae3f363b6bb17e
SHA5126ecb673a0c8b65e0a28a6eac3703113d657f14a3e556ee41f9fe23f66978c71150ca4807504d6487b392ffe1e35e900156e0aec17116bc87a5e869f2a5556269