Analysis
-
max time kernel
146s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 07:02
Behavioral task
behavioral1
Sample
eacfd104bb698e1d2376ed8d4cfc0eec_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
eacfd104bb698e1d2376ed8d4cfc0eec_JaffaCakes118.exe
-
Size
13KB
-
MD5
eacfd104bb698e1d2376ed8d4cfc0eec
-
SHA1
df09eb9bc2df4939154d278ef599fe3c8e04a635
-
SHA256
f665be05e0e685d52f6a4adfdf40181573b29df7dd5e17148136ef50f1f6cf41
-
SHA512
a5943b2005ea55f1240acba0e827ced466b3a2044b5e07ba86abc0c7effa7ebcb1cfa099b95bb87d2f6e3a11e6b18df7c3988ac5a2692cf2fcafd9aeab9d99b0
-
SSDEEP
192:OS4gbgkAN4SJj+bfrJsUwv7E6qT9gQPw9Kr9ZCspE+TMwrRmK+vhOrAK2:OS4uI44aJ+7NqyQPw9jeM4m7t
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4568-0-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4568-1-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eacfd104bb698e1d2376ed8d4cfc0eec_JaffaCakes118.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4104 msedge.exe 4104 msedge.exe 4440 msedge.exe 4440 msedge.exe 2912 identity_helper.exe 2912 identity_helper.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4568 eacfd104bb698e1d2376ed8d4cfc0eec_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4568 wrote to memory of 4440 4568 eacfd104bb698e1d2376ed8d4cfc0eec_JaffaCakes118.exe 85 PID 4568 wrote to memory of 4440 4568 eacfd104bb698e1d2376ed8d4cfc0eec_JaffaCakes118.exe 85 PID 4440 wrote to memory of 2300 4440 msedge.exe 86 PID 4440 wrote to memory of 2300 4440 msedge.exe 86 PID 4440 wrote to memory of 2256 4440 msedge.exe 87 PID 4440 wrote to memory of 2256 4440 msedge.exe 87 PID 4440 wrote to memory of 2256 4440 msedge.exe 87 PID 4440 wrote to memory of 2256 4440 msedge.exe 87 PID 4440 wrote to memory of 2256 4440 msedge.exe 87 PID 4440 wrote to memory of 2256 4440 msedge.exe 87 PID 4440 wrote to memory of 2256 4440 msedge.exe 87 PID 4440 wrote to memory of 2256 4440 msedge.exe 87 PID 4440 wrote to memory of 2256 4440 msedge.exe 87 PID 4440 wrote to memory of 2256 4440 msedge.exe 87 PID 4440 wrote to memory of 2256 4440 msedge.exe 87 PID 4440 wrote to memory of 2256 4440 msedge.exe 87 PID 4440 wrote to memory of 2256 4440 msedge.exe 87 PID 4440 wrote to memory of 2256 4440 msedge.exe 87 PID 4440 wrote to memory of 2256 4440 msedge.exe 87 PID 4440 wrote to memory of 2256 4440 msedge.exe 87 PID 4440 wrote to memory of 2256 4440 msedge.exe 87 PID 4440 wrote to memory of 2256 4440 msedge.exe 87 PID 4440 wrote to memory of 2256 4440 msedge.exe 87 PID 4440 wrote to memory of 2256 4440 msedge.exe 87 PID 4440 wrote to memory of 2256 4440 msedge.exe 87 PID 4440 wrote to memory of 2256 4440 msedge.exe 87 PID 4440 wrote to memory of 2256 4440 msedge.exe 87 PID 4440 wrote to memory of 2256 4440 msedge.exe 87 PID 4440 wrote to memory of 2256 4440 msedge.exe 87 PID 4440 wrote to memory of 2256 4440 msedge.exe 87 PID 4440 wrote to memory of 2256 4440 msedge.exe 87 PID 4440 wrote to memory of 2256 4440 msedge.exe 87 PID 4440 wrote to memory of 2256 4440 msedge.exe 87 PID 4440 wrote to memory of 2256 4440 msedge.exe 87 PID 4440 wrote to memory of 2256 4440 msedge.exe 87 PID 4440 wrote to memory of 2256 4440 msedge.exe 87 PID 4440 wrote to memory of 2256 4440 msedge.exe 87 PID 4440 wrote to memory of 2256 4440 msedge.exe 87 PID 4440 wrote to memory of 2256 4440 msedge.exe 87 PID 4440 wrote to memory of 2256 4440 msedge.exe 87 PID 4440 wrote to memory of 2256 4440 msedge.exe 87 PID 4440 wrote to memory of 2256 4440 msedge.exe 87 PID 4440 wrote to memory of 2256 4440 msedge.exe 87 PID 4440 wrote to memory of 2256 4440 msedge.exe 87 PID 4440 wrote to memory of 4104 4440 msedge.exe 88 PID 4440 wrote to memory of 4104 4440 msedge.exe 88 PID 4440 wrote to memory of 4992 4440 msedge.exe 89 PID 4440 wrote to memory of 4992 4440 msedge.exe 89 PID 4440 wrote to memory of 4992 4440 msedge.exe 89 PID 4440 wrote to memory of 4992 4440 msedge.exe 89 PID 4440 wrote to memory of 4992 4440 msedge.exe 89 PID 4440 wrote to memory of 4992 4440 msedge.exe 89 PID 4440 wrote to memory of 4992 4440 msedge.exe 89 PID 4440 wrote to memory of 4992 4440 msedge.exe 89 PID 4440 wrote to memory of 4992 4440 msedge.exe 89 PID 4440 wrote to memory of 4992 4440 msedge.exe 89 PID 4440 wrote to memory of 4992 4440 msedge.exe 89 PID 4440 wrote to memory of 4992 4440 msedge.exe 89 PID 4440 wrote to memory of 4992 4440 msedge.exe 89 PID 4440 wrote to memory of 4992 4440 msedge.exe 89 PID 4440 wrote to memory of 4992 4440 msedge.exe 89 PID 4440 wrote to memory of 4992 4440 msedge.exe 89 PID 4440 wrote to memory of 4992 4440 msedge.exe 89 PID 4440 wrote to memory of 4992 4440 msedge.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\eacfd104bb698e1d2376ed8d4cfc0eec_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eacfd104bb698e1d2376ed8d4cfc0eec_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://ads.eorezo.com/cgi-bin/advert/getads?did=432⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb97a046f8,0x7ffb97a04708,0x7ffb97a047183⤵PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,2012631753721316837,15547928987504691573,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:23⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,2012631753721316837,15547928987504691573,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2444 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,2012631753721316837,15547928987504691573,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:83⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2012631753721316837,15547928987504691573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:13⤵PID:1156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2012631753721316837,15547928987504691573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:13⤵PID:1284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2012631753721316837,15547928987504691573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4040 /prefetch:13⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2012631753721316837,15547928987504691573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3688 /prefetch:13⤵PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,2012631753721316837,15547928987504691573,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 /prefetch:83⤵PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,2012631753721316837,15547928987504691573,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2012631753721316837,15547928987504691573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4172 /prefetch:13⤵PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2012631753721316837,15547928987504691573,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:13⤵PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2012631753721316837,15547928987504691573,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:13⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2012631753721316837,15547928987504691573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:13⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2012631753721316837,15547928987504691573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1824 /prefetch:13⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2012631753721316837,15547928987504691573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2224 /prefetch:13⤵PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,2012631753721316837,15547928987504691573,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4092 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1744
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4672
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4148
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
6KB
MD59bf5436b1e0c91039fb028c6256a44dc
SHA16c8e9aaeceeeb1216f5c08a66004c7005fd65f2b
SHA2564816f69a39095022f132e789d71802aff843b659c70bdafcaca59f5505f1bffb
SHA512e40cd7e69616ec994c15a70320a968af71d7a5edf566d5f8c1d38ebac308959085897c2b5e616b517c6193d980418af18916fbf8d7e8b45642f7009bf29645d0
-
Filesize
6KB
MD55f774715b4a28db72b5119c7e49a65a5
SHA142c3a5f99bfe262df713a3589790c3b8d1bc4178
SHA25690146958fe563b19e533cf095386f4328ea932c955a278c63d43fcda793bfdf7
SHA51235313c4f0efc3d18809f60563c3c30796f0c82baa1f36fa9c970fb4a504fa3cfab2ef367e2bdcd25afbd32c77d66b5b953ee6aa5961891b69674bedd7a7b736d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c289b0ddcb0598378e857fe11fa40794
SHA188bb967c8f93efaec58a1728483a5a7888cae40f
SHA25680d7def23223e367ecc5a23aa4c985d5f77d632257561b7400d843b6c1cd4810
SHA51291da1f6f4de03fa9109b4bf51d5a0cb118084e3a4415dfffb07241e4a8a8497fb324053affde502f91996f5035b1895e368bd323e8f6786069d3ad4ef1c15660