Analysis
-
max time kernel
146s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 07:56
Static task
static1
Behavioral task
behavioral1
Sample
f58b6ca819e35763ebe9f04280b5823f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f58b6ca819e35763ebe9f04280b5823f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f58b6ca819e35763ebe9f04280b5823f_JaffaCakes118.exe
-
Size
16KB
-
MD5
f58b6ca819e35763ebe9f04280b5823f
-
SHA1
0da9c56c894cf0a5b4699153f3bcaee581d17d59
-
SHA256
3f85cd28cd8c795c59ad594a98b7a000780837e8dcd8445af17e375b16429fbd
-
SHA512
cb2b70b05a15bf6291e1696688112c6233d9613ff24d605a2533ec00e0d5d350271f12296b05590e1e4fea5d6fe92a78a3f9dc8e0457d5c5b9d7e229a9c79063
-
SSDEEP
96:/lx54DI63uPPsh0ohC0yzf908yVsCR72h:/TWDImu8Thi3osw7e
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f58b6ca819e35763ebe9f04280b5823f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4932 msedge.exe 4932 msedge.exe 1388 msedge.exe 1388 msedge.exe 5116 identity_helper.exe 5116 identity_helper.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1948 f58b6ca819e35763ebe9f04280b5823f_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1948 wrote to memory of 1284 1948 f58b6ca819e35763ebe9f04280b5823f_JaffaCakes118.exe 82 PID 1948 wrote to memory of 1284 1948 f58b6ca819e35763ebe9f04280b5823f_JaffaCakes118.exe 82 PID 1948 wrote to memory of 1284 1948 f58b6ca819e35763ebe9f04280b5823f_JaffaCakes118.exe 82 PID 3184 wrote to memory of 1388 3184 explorer.exe 84 PID 3184 wrote to memory of 1388 3184 explorer.exe 84 PID 1388 wrote to memory of 1412 1388 msedge.exe 86 PID 1388 wrote to memory of 1412 1388 msedge.exe 86 PID 1388 wrote to memory of 4856 1388 msedge.exe 87 PID 1388 wrote to memory of 4856 1388 msedge.exe 87 PID 1388 wrote to memory of 4856 1388 msedge.exe 87 PID 1388 wrote to memory of 4856 1388 msedge.exe 87 PID 1388 wrote to memory of 4856 1388 msedge.exe 87 PID 1388 wrote to memory of 4856 1388 msedge.exe 87 PID 1388 wrote to memory of 4856 1388 msedge.exe 87 PID 1388 wrote to memory of 4856 1388 msedge.exe 87 PID 1388 wrote to memory of 4856 1388 msedge.exe 87 PID 1388 wrote to memory of 4856 1388 msedge.exe 87 PID 1388 wrote to memory of 4856 1388 msedge.exe 87 PID 1388 wrote to memory of 4856 1388 msedge.exe 87 PID 1388 wrote to memory of 4856 1388 msedge.exe 87 PID 1388 wrote to memory of 4856 1388 msedge.exe 87 PID 1388 wrote to memory of 4856 1388 msedge.exe 87 PID 1388 wrote to memory of 4856 1388 msedge.exe 87 PID 1388 wrote to memory of 4856 1388 msedge.exe 87 PID 1388 wrote to memory of 4856 1388 msedge.exe 87 PID 1388 wrote to memory of 4856 1388 msedge.exe 87 PID 1388 wrote to memory of 4856 1388 msedge.exe 87 PID 1388 wrote to memory of 4856 1388 msedge.exe 87 PID 1388 wrote to memory of 4856 1388 msedge.exe 87 PID 1388 wrote to memory of 4856 1388 msedge.exe 87 PID 1388 wrote to memory of 4856 1388 msedge.exe 87 PID 1388 wrote to memory of 4856 1388 msedge.exe 87 PID 1388 wrote to memory of 4856 1388 msedge.exe 87 PID 1388 wrote to memory of 4856 1388 msedge.exe 87 PID 1388 wrote to memory of 4856 1388 msedge.exe 87 PID 1388 wrote to memory of 4856 1388 msedge.exe 87 PID 1388 wrote to memory of 4856 1388 msedge.exe 87 PID 1388 wrote to memory of 4856 1388 msedge.exe 87 PID 1388 wrote to memory of 4856 1388 msedge.exe 87 PID 1388 wrote to memory of 4856 1388 msedge.exe 87 PID 1388 wrote to memory of 4856 1388 msedge.exe 87 PID 1388 wrote to memory of 4856 1388 msedge.exe 87 PID 1388 wrote to memory of 4856 1388 msedge.exe 87 PID 1388 wrote to memory of 4856 1388 msedge.exe 87 PID 1388 wrote to memory of 4856 1388 msedge.exe 87 PID 1388 wrote to memory of 4856 1388 msedge.exe 87 PID 1388 wrote to memory of 4856 1388 msedge.exe 87 PID 1388 wrote to memory of 4932 1388 msedge.exe 88 PID 1388 wrote to memory of 4932 1388 msedge.exe 88 PID 1388 wrote to memory of 2180 1388 msedge.exe 89 PID 1388 wrote to memory of 2180 1388 msedge.exe 89 PID 1388 wrote to memory of 2180 1388 msedge.exe 89 PID 1388 wrote to memory of 2180 1388 msedge.exe 89 PID 1388 wrote to memory of 2180 1388 msedge.exe 89 PID 1388 wrote to memory of 2180 1388 msedge.exe 89 PID 1388 wrote to memory of 2180 1388 msedge.exe 89 PID 1388 wrote to memory of 2180 1388 msedge.exe 89 PID 1388 wrote to memory of 2180 1388 msedge.exe 89 PID 1388 wrote to memory of 2180 1388 msedge.exe 89 PID 1388 wrote to memory of 2180 1388 msedge.exe 89 PID 1388 wrote to memory of 2180 1388 msedge.exe 89 PID 1388 wrote to memory of 2180 1388 msedge.exe 89 PID 1388 wrote to memory of 2180 1388 msedge.exe 89 PID 1388 wrote to memory of 2180 1388 msedge.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\f58b6ca819e35763ebe9f04280b5823f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f58b6ca819e35763ebe9f04280b5823f_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe "http://www.netgy.com/cpm/10102/10194.jsp?s=11054&dm=2"2⤵
- System Location Discovery: System Language Discovery
PID:1284
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.netgy.com/cpm/10102/10194.jsp?s=11054&dm=22⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc103f46f8,0x7ffc103f4708,0x7ffc103f47183⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,4640663336014241635,10604339577930043118,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:23⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,4640663336014241635,10604339577930043118,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,4640663336014241635,10604339577930043118,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:83⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4640663336014241635,10604339577930043118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:13⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4640663336014241635,10604339577930043118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:13⤵PID:2512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,4640663336014241635,10604339577930043118,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5284 /prefetch:83⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,4640663336014241635,10604339577930043118,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5284 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4640663336014241635,10604339577930043118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:13⤵PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4640663336014241635,10604339577930043118,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:13⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4640663336014241635,10604339577930043118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:13⤵PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4640663336014241635,10604339577930043118,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:13⤵PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4640663336014241635,10604339577930043118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:13⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4640663336014241635,10604339577930043118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3932 /prefetch:13⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4640663336014241635,10604339577930043118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4112 /prefetch:13⤵PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4640663336014241635,10604339577930043118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2008 /prefetch:13⤵PID:2860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,4640663336014241635,10604339577930043118,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3936 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2120
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2540
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2316
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
5KB
MD56bffd17568bd5c00b5a1adb112901b8e
SHA1d5bf0dbb7242054bb7802e72dd093ca80c97f91b
SHA2560680a40dcacfaf026fe21015b64373fc57a147bdb3d8475122bc02472dd73420
SHA51274a68110b9059603d8f053e27ca518604e8f58779b6de022358114aa987fb0ff48aeb587276ee90b7f71921a5ac2f021e4a0dd40ce7a970d24b9224bd60920a8
-
Filesize
6KB
MD589a46496764929f31cac8b2a07d9a8fd
SHA12335feb01b12691ebaeb438292654acc749817de
SHA2566bca0f2d0cc6dceaf202f1f26e0baa119f90ee7a5356a57a5167910db7740e90
SHA51283651703ea5577617aab95b4827e6cb8b96e4628ed4eb14d79093df9a30284eb25e0a573f3dd42db44f5218b72b05e0e96b2ec85b807e43c5cea988c153f2e69
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD566fe4787d9d2c8e18b411b31870c5634
SHA145471faa3a4ae3794a6a26ac2039cfaf7d3c5b33
SHA256b267db6d75747597db59181ece445a1af0d02c4484ca9900cf4ae35b38eea08e
SHA512b8cfd271272c6745454b9aeda749ef878f99f07cb829f6269d42cf7ee5a5ce4ede4f93ed2e210c6059a80b0208738d6f1e7c9c4528009743577263797f9d42a5