Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2024 08:04
Behavioral task
behavioral1
Sample
fbdad675229a8725b267a9e57c5a7b7b_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
fbdad675229a8725b267a9e57c5a7b7b_JaffaCakes118.exe
-
Size
13KB
-
MD5
fbdad675229a8725b267a9e57c5a7b7b
-
SHA1
17e632d510e2b8611fa224f91752ae25c70881b0
-
SHA256
9fa960230b97f89599ed06ab935fcb1d67bed7635a902498ef8a3fe5275b9bf1
-
SHA512
9bef40dcc4d6f11d2f28af7a029bbeafcd2747dce3459486ebe4500c702473e51070d1217cfc491e3ffa298ca018ccd57d17148e1f1aef66e7c5eff71e258253
-
SSDEEP
192:Lxy9dBH9j/sAac4aVSxjQen27LDyzbqjAr9ZCspE+TMwrRmK+vhOrP:2zac4aVSxkr7HyzGVeM4mK
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4792-0-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4792-2-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbdad675229a8725b267a9e57c5a7b7b_JaffaCakes118.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3968 msedge.exe 3968 msedge.exe 3908 msedge.exe 3908 msedge.exe 4632 identity_helper.exe 4632 identity_helper.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4792 fbdad675229a8725b267a9e57c5a7b7b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4792 wrote to memory of 3908 4792 fbdad675229a8725b267a9e57c5a7b7b_JaffaCakes118.exe 81 PID 4792 wrote to memory of 3908 4792 fbdad675229a8725b267a9e57c5a7b7b_JaffaCakes118.exe 81 PID 3908 wrote to memory of 4376 3908 msedge.exe 82 PID 3908 wrote to memory of 4376 3908 msedge.exe 82 PID 3908 wrote to memory of 4084 3908 msedge.exe 83 PID 3908 wrote to memory of 4084 3908 msedge.exe 83 PID 3908 wrote to memory of 4084 3908 msedge.exe 83 PID 3908 wrote to memory of 4084 3908 msedge.exe 83 PID 3908 wrote to memory of 4084 3908 msedge.exe 83 PID 3908 wrote to memory of 4084 3908 msedge.exe 83 PID 3908 wrote to memory of 4084 3908 msedge.exe 83 PID 3908 wrote to memory of 4084 3908 msedge.exe 83 PID 3908 wrote to memory of 4084 3908 msedge.exe 83 PID 3908 wrote to memory of 4084 3908 msedge.exe 83 PID 3908 wrote to memory of 4084 3908 msedge.exe 83 PID 3908 wrote to memory of 4084 3908 msedge.exe 83 PID 3908 wrote to memory of 4084 3908 msedge.exe 83 PID 3908 wrote to memory of 4084 3908 msedge.exe 83 PID 3908 wrote to memory of 4084 3908 msedge.exe 83 PID 3908 wrote to memory of 4084 3908 msedge.exe 83 PID 3908 wrote to memory of 4084 3908 msedge.exe 83 PID 3908 wrote to memory of 4084 3908 msedge.exe 83 PID 3908 wrote to memory of 4084 3908 msedge.exe 83 PID 3908 wrote to memory of 4084 3908 msedge.exe 83 PID 3908 wrote to memory of 4084 3908 msedge.exe 83 PID 3908 wrote to memory of 4084 3908 msedge.exe 83 PID 3908 wrote to memory of 4084 3908 msedge.exe 83 PID 3908 wrote to memory of 4084 3908 msedge.exe 83 PID 3908 wrote to memory of 4084 3908 msedge.exe 83 PID 3908 wrote to memory of 4084 3908 msedge.exe 83 PID 3908 wrote to memory of 4084 3908 msedge.exe 83 PID 3908 wrote to memory of 4084 3908 msedge.exe 83 PID 3908 wrote to memory of 4084 3908 msedge.exe 83 PID 3908 wrote to memory of 4084 3908 msedge.exe 83 PID 3908 wrote to memory of 4084 3908 msedge.exe 83 PID 3908 wrote to memory of 4084 3908 msedge.exe 83 PID 3908 wrote to memory of 4084 3908 msedge.exe 83 PID 3908 wrote to memory of 4084 3908 msedge.exe 83 PID 3908 wrote to memory of 4084 3908 msedge.exe 83 PID 3908 wrote to memory of 4084 3908 msedge.exe 83 PID 3908 wrote to memory of 4084 3908 msedge.exe 83 PID 3908 wrote to memory of 4084 3908 msedge.exe 83 PID 3908 wrote to memory of 4084 3908 msedge.exe 83 PID 3908 wrote to memory of 4084 3908 msedge.exe 83 PID 3908 wrote to memory of 3968 3908 msedge.exe 84 PID 3908 wrote to memory of 3968 3908 msedge.exe 84 PID 3908 wrote to memory of 3556 3908 msedge.exe 85 PID 3908 wrote to memory of 3556 3908 msedge.exe 85 PID 3908 wrote to memory of 3556 3908 msedge.exe 85 PID 3908 wrote to memory of 3556 3908 msedge.exe 85 PID 3908 wrote to memory of 3556 3908 msedge.exe 85 PID 3908 wrote to memory of 3556 3908 msedge.exe 85 PID 3908 wrote to memory of 3556 3908 msedge.exe 85 PID 3908 wrote to memory of 3556 3908 msedge.exe 85 PID 3908 wrote to memory of 3556 3908 msedge.exe 85 PID 3908 wrote to memory of 3556 3908 msedge.exe 85 PID 3908 wrote to memory of 3556 3908 msedge.exe 85 PID 3908 wrote to memory of 3556 3908 msedge.exe 85 PID 3908 wrote to memory of 3556 3908 msedge.exe 85 PID 3908 wrote to memory of 3556 3908 msedge.exe 85 PID 3908 wrote to memory of 3556 3908 msedge.exe 85 PID 3908 wrote to memory of 3556 3908 msedge.exe 85 PID 3908 wrote to memory of 3556 3908 msedge.exe 85 PID 3908 wrote to memory of 3556 3908 msedge.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbdad675229a8725b267a9e57c5a7b7b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fbdad675229a8725b267a9e57c5a7b7b_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://ads.alpha00001.com/cgi-bin/advert/getads?did=4332⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9115346f8,0x7ff911534708,0x7ff9115347183⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,15766846837018114078,11654151155091458246,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:23⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2184,15766846837018114078,11654151155091458246,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2184,15766846837018114078,11654151155091458246,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:83⤵PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,15766846837018114078,11654151155091458246,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:13⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,15766846837018114078,11654151155091458246,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:13⤵PID:752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,15766846837018114078,11654151155091458246,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4024 /prefetch:13⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,15766846837018114078,11654151155091458246,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3488 /prefetch:13⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,15766846837018114078,11654151155091458246,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3576 /prefetch:83⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,15766846837018114078,11654151155091458246,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3576 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,15766846837018114078,11654151155091458246,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4276 /prefetch:13⤵PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,15766846837018114078,11654151155091458246,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4024 /prefetch:13⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,15766846837018114078,11654151155091458246,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:13⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,15766846837018114078,11654151155091458246,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5724 /prefetch:13⤵PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,15766846837018114078,11654151155091458246,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3100 /prefetch:13⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,15766846837018114078,11654151155091458246,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1124 /prefetch:13⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,15766846837018114078,11654151155091458246,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5432 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2228
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4644
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
5KB
MD5ef4198153a3c2a6ecc1a32c5c7e6a918
SHA1947af3779911878ae660b48ce7b8b9bd331e283e
SHA25634b28a8bf9a8d224e6d8afc594d476905c0385d8fec98c8a6b74698dedcd9f65
SHA512e2feb2864296244b0db4eaa392b02a282ff21dc9b690c1ef359f97a07e495ae6db7bfe0b27a9da2bac1d10323e07a5a8b837a48b8419013fd0cd92a49f291a1c
-
Filesize
6KB
MD5dbfe49d70f089dd38fa981e981c26e47
SHA1c5890a052c8348c15901a4741fe3d346002301db
SHA256a1413a44f5453a4e0a679d6c4a4bb2efb843401a3b35fe44cf1179160f3c97f6
SHA5121fa18730c84fd0ac136ad32cff7207f7c9166a73eb58825a317195bd758ef9782e5542a02bdeb97d7d45077f8b604fbacae06d265a08fd9ec93febd95ad3c2d7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD54fa7afc552695caed9c99ada6696176f
SHA1385e157c0d928614fdf29b815fc6d5f0c6115ee5
SHA256c39bd0cd7aa2c284246fda16256f8c85b57872f85196eede168e531ef443e6fe
SHA512d5c923743366d8aecc9968ce13d3cc56c4511f1c639b66b538d4b2542598085eecdefe90446794ef6b20f079c59b89ed20279932bebdf41dcfc877d687a60215