Resubmissions
04-10-2024 12:49
241004-p2mr1svcrp 1004-10-2024 12:48
241004-p1xwlavcnp 304-10-2024 12:36
241004-ptefnsthqn 10Analysis
-
max time kernel
30s -
max time network
31s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2024 12:48
Static task
static1
Behavioral task
behavioral1
Sample
1363011ce43fdadbff9360a2e2716731_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
1363011ce43fdadbff9360a2e2716731_JaffaCakes118.exe
Resource
win11-20240802-en
General
-
Target
1363011ce43fdadbff9360a2e2716731_JaffaCakes118.exe
-
Size
342KB
-
MD5
1363011ce43fdadbff9360a2e2716731
-
SHA1
d980ddf282aa7170c38caaa4fe73d05cf04d9fe6
-
SHA256
5f5b2501b23fd3efceffa161bb51b9721a10f583e85e10a287faa170d847e1cc
-
SHA512
355c654a7226f6c68367f0ede1f294d84f5f2d8b70757c9c0b20546589971b5534d67b0a99360acca7d5a0251aca0339b55226e859d5d53637a5491533072feb
-
SSDEEP
6144:wlOK1RBZgYK6aOtAOv49cXWF8eM0jF47fodLQdq71wsMrMYNVnL:wT16YKitccXWjTvLQdu1nMrvnL
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2800 2304 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1363011ce43fdadbff9360a2e2716731_JaffaCakes118.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1363011ce43fdadbff9360a2e2716731_JaffaCakes118.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133725197256612494" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid Process 804 chrome.exe 804 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
chrome.exepid Process 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
Processes:
chrome.exedescription pid Process Token: SeShutdownPrivilege 804 chrome.exe Token: SeCreatePagefilePrivilege 804 chrome.exe Token: SeShutdownPrivilege 804 chrome.exe Token: SeCreatePagefilePrivilege 804 chrome.exe Token: SeShutdownPrivilege 804 chrome.exe Token: SeCreatePagefilePrivilege 804 chrome.exe Token: SeShutdownPrivilege 804 chrome.exe Token: SeCreatePagefilePrivilege 804 chrome.exe Token: SeShutdownPrivilege 804 chrome.exe Token: SeCreatePagefilePrivilege 804 chrome.exe Token: SeShutdownPrivilege 804 chrome.exe Token: SeCreatePagefilePrivilege 804 chrome.exe Token: SeShutdownPrivilege 804 chrome.exe Token: SeCreatePagefilePrivilege 804 chrome.exe Token: SeShutdownPrivilege 804 chrome.exe Token: SeCreatePagefilePrivilege 804 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
Processes:
chrome.exepid Process 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid Process 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid Process procid_target PID 804 wrote to memory of 3304 804 chrome.exe 87 PID 804 wrote to memory of 3304 804 chrome.exe 87 PID 804 wrote to memory of 3144 804 chrome.exe 88 PID 804 wrote to memory of 3144 804 chrome.exe 88 PID 804 wrote to memory of 3144 804 chrome.exe 88 PID 804 wrote to memory of 3144 804 chrome.exe 88 PID 804 wrote to memory of 3144 804 chrome.exe 88 PID 804 wrote to memory of 3144 804 chrome.exe 88 PID 804 wrote to memory of 3144 804 chrome.exe 88 PID 804 wrote to memory of 3144 804 chrome.exe 88 PID 804 wrote to memory of 3144 804 chrome.exe 88 PID 804 wrote to memory of 3144 804 chrome.exe 88 PID 804 wrote to memory of 3144 804 chrome.exe 88 PID 804 wrote to memory of 3144 804 chrome.exe 88 PID 804 wrote to memory of 3144 804 chrome.exe 88 PID 804 wrote to memory of 3144 804 chrome.exe 88 PID 804 wrote to memory of 3144 804 chrome.exe 88 PID 804 wrote to memory of 3144 804 chrome.exe 88 PID 804 wrote to memory of 3144 804 chrome.exe 88 PID 804 wrote to memory of 3144 804 chrome.exe 88 PID 804 wrote to memory of 3144 804 chrome.exe 88 PID 804 wrote to memory of 3144 804 chrome.exe 88 PID 804 wrote to memory of 3144 804 chrome.exe 88 PID 804 wrote to memory of 3144 804 chrome.exe 88 PID 804 wrote to memory of 3144 804 chrome.exe 88 PID 804 wrote to memory of 3144 804 chrome.exe 88 PID 804 wrote to memory of 3144 804 chrome.exe 88 PID 804 wrote to memory of 3144 804 chrome.exe 88 PID 804 wrote to memory of 3144 804 chrome.exe 88 PID 804 wrote to memory of 3144 804 chrome.exe 88 PID 804 wrote to memory of 3144 804 chrome.exe 88 PID 804 wrote to memory of 3144 804 chrome.exe 88 PID 804 wrote to memory of 5076 804 chrome.exe 89 PID 804 wrote to memory of 5076 804 chrome.exe 89 PID 804 wrote to memory of 2604 804 chrome.exe 90 PID 804 wrote to memory of 2604 804 chrome.exe 90 PID 804 wrote to memory of 2604 804 chrome.exe 90 PID 804 wrote to memory of 2604 804 chrome.exe 90 PID 804 wrote to memory of 2604 804 chrome.exe 90 PID 804 wrote to memory of 2604 804 chrome.exe 90 PID 804 wrote to memory of 2604 804 chrome.exe 90 PID 804 wrote to memory of 2604 804 chrome.exe 90 PID 804 wrote to memory of 2604 804 chrome.exe 90 PID 804 wrote to memory of 2604 804 chrome.exe 90 PID 804 wrote to memory of 2604 804 chrome.exe 90 PID 804 wrote to memory of 2604 804 chrome.exe 90 PID 804 wrote to memory of 2604 804 chrome.exe 90 PID 804 wrote to memory of 2604 804 chrome.exe 90 PID 804 wrote to memory of 2604 804 chrome.exe 90 PID 804 wrote to memory of 2604 804 chrome.exe 90 PID 804 wrote to memory of 2604 804 chrome.exe 90 PID 804 wrote to memory of 2604 804 chrome.exe 90 PID 804 wrote to memory of 2604 804 chrome.exe 90 PID 804 wrote to memory of 2604 804 chrome.exe 90 PID 804 wrote to memory of 2604 804 chrome.exe 90 PID 804 wrote to memory of 2604 804 chrome.exe 90 PID 804 wrote to memory of 2604 804 chrome.exe 90 PID 804 wrote to memory of 2604 804 chrome.exe 90 PID 804 wrote to memory of 2604 804 chrome.exe 90 PID 804 wrote to memory of 2604 804 chrome.exe 90 PID 804 wrote to memory of 2604 804 chrome.exe 90 PID 804 wrote to memory of 2604 804 chrome.exe 90 PID 804 wrote to memory of 2604 804 chrome.exe 90 PID 804 wrote to memory of 2604 804 chrome.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\1363011ce43fdadbff9360a2e2716731_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1363011ce43fdadbff9360a2e2716731_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2304 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2304 -s 5242⤵
- Program crash
PID:2800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2304 -ip 23041⤵PID:4172
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ff882decc40,0x7ff882decc4c,0x7ff882decc582⤵PID:3304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2144,i,1300449913656866318,7090647754816366048,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:3144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1972,i,1300449913656866318,7090647754816366048,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2168 /prefetch:32⤵PID:5076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2296,i,1300449913656866318,7090647754816366048,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2280 /prefetch:82⤵PID:2604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3148,i,1300449913656866318,7090647754816366048,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:2008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3216,i,1300449913656866318,7090647754816366048,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:2932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4496,i,1300449913656866318,7090647754816366048,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4576 /prefetch:12⤵PID:3904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4780,i,1300449913656866318,7090647754816366048,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4792 /prefetch:82⤵PID:2548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4064,i,1300449913656866318,7090647754816366048,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:3200
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4368
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5b4d39af4ee8c99e31794a48bd5c10c2e
SHA1efcf27f2dcd6adaf5fba578dec6e5753fd8e2a21
SHA2561473a872747ea17412ec9dff0bdb532949877681c168fe9a21370e9575dd9fd7
SHA512821ceec44b4a8f3abcd949001334092188bd968d623c858d68c3189427b9dd9c116755aaacb0e8b367f4153e95332a4eea3a6edc95f1407894e68f71b5d908a4
-
Filesize
844B
MD56983cd55d2e617ef060fae19c11045aa
SHA1ac4510dc583fd3fdfc95d257cfd73b9de0f8482e
SHA2560157e2cedb84920ddedba432d3839ba18e92c1e1fba4729177469566cf40528f
SHA51273c951c552aa1344bf5c60a461b171a58551b64783ce5ad834b4da0779d1b43886845ace33b53644bf027238b27b8c479d2b906f94379cb19af4a4e5559bf275
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD52e222a6adf890c91dfef6ffc063b4071
SHA1e493b6a9bccf2577828369366a2611f3e3d1e7c7
SHA2569b428deb88650bb99417104a483132dfa4dccf3037a29ca04195b226449477c4
SHA51250c0c1f99082b3747adb1e329112e87586b207db156fd51b7df460234a789691c9636e442ba8a69f533a84a08440bfe3e7ec0f62502374cc0a7c8e635283220b
-
Filesize
99KB
MD51210cb6bf760c8d4b27d6257185f8517
SHA1fa7d33c1725a56a65556d2a569d0a11ec0a20673
SHA256df90b9b9a06e1642b4a3bd16d404ca40a1376cc3a87ec02549bdaa067b90db02
SHA512108d1f25cea868e72f12c80fdbaaef2d7fd779ce0731f62575926dd844ee1cce448e53ebe242ea59f7138219378a0bb0e57a32351a96af2bf8e94e1d8f6d902f
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e