Resubmissions
04-10-2024 12:49
241004-p2mr1svcrp 1004-10-2024 12:48
241004-p1xwlavcnp 304-10-2024 12:36
241004-ptefnsthqn 10Analysis
-
max time kernel
135s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2024 12:49
Static task
static1
Behavioral task
behavioral1
Sample
1363011ce43fdadbff9360a2e2716731_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1363011ce43fdadbff9360a2e2716731_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
1363011ce43fdadbff9360a2e2716731_JaffaCakes118.exe
-
Size
342KB
-
MD5
1363011ce43fdadbff9360a2e2716731
-
SHA1
d980ddf282aa7170c38caaa4fe73d05cf04d9fe6
-
SHA256
5f5b2501b23fd3efceffa161bb51b9721a10f583e85e10a287faa170d847e1cc
-
SHA512
355c654a7226f6c68367f0ede1f294d84f5f2d8b70757c9c0b20546589971b5534d67b0a99360acca7d5a0251aca0339b55226e859d5d53637a5491533072feb
-
SSDEEP
6144:wlOK1RBZgYK6aOtAOv49cXWF8eM0jF47fodLQdq71wsMrMYNVnL:wT16YKitccXWjTvLQdu1nMrvnL
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2320 4316 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1363011ce43fdadbff9360a2e2716731_JaffaCakes118.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133725199097669046" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4536 chrome.exe 4536 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeShutdownPrivilege 4536 chrome.exe Token: SeCreatePagefilePrivilege 4536 chrome.exe Token: SeShutdownPrivilege 4536 chrome.exe Token: SeCreatePagefilePrivilege 4536 chrome.exe Token: SeShutdownPrivilege 4536 chrome.exe Token: SeCreatePagefilePrivilege 4536 chrome.exe Token: SeShutdownPrivilege 4536 chrome.exe Token: SeCreatePagefilePrivilege 4536 chrome.exe Token: SeShutdownPrivilege 4536 chrome.exe Token: SeCreatePagefilePrivilege 4536 chrome.exe Token: SeShutdownPrivilege 4536 chrome.exe Token: SeCreatePagefilePrivilege 4536 chrome.exe Token: SeShutdownPrivilege 4536 chrome.exe Token: SeCreatePagefilePrivilege 4536 chrome.exe Token: SeShutdownPrivilege 4536 chrome.exe Token: SeCreatePagefilePrivilege 4536 chrome.exe Token: SeShutdownPrivilege 4536 chrome.exe Token: SeCreatePagefilePrivilege 4536 chrome.exe Token: SeShutdownPrivilege 4536 chrome.exe Token: SeCreatePagefilePrivilege 4536 chrome.exe Token: SeShutdownPrivilege 4536 chrome.exe Token: SeCreatePagefilePrivilege 4536 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4536 wrote to memory of 3740 4536 chrome.exe 96 PID 4536 wrote to memory of 3740 4536 chrome.exe 96 PID 4536 wrote to memory of 4036 4536 chrome.exe 97 PID 4536 wrote to memory of 4036 4536 chrome.exe 97 PID 4536 wrote to memory of 4036 4536 chrome.exe 97 PID 4536 wrote to memory of 4036 4536 chrome.exe 97 PID 4536 wrote to memory of 4036 4536 chrome.exe 97 PID 4536 wrote to memory of 4036 4536 chrome.exe 97 PID 4536 wrote to memory of 4036 4536 chrome.exe 97 PID 4536 wrote to memory of 4036 4536 chrome.exe 97 PID 4536 wrote to memory of 4036 4536 chrome.exe 97 PID 4536 wrote to memory of 4036 4536 chrome.exe 97 PID 4536 wrote to memory of 4036 4536 chrome.exe 97 PID 4536 wrote to memory of 4036 4536 chrome.exe 97 PID 4536 wrote to memory of 4036 4536 chrome.exe 97 PID 4536 wrote to memory of 4036 4536 chrome.exe 97 PID 4536 wrote to memory of 4036 4536 chrome.exe 97 PID 4536 wrote to memory of 4036 4536 chrome.exe 97 PID 4536 wrote to memory of 4036 4536 chrome.exe 97 PID 4536 wrote to memory of 4036 4536 chrome.exe 97 PID 4536 wrote to memory of 4036 4536 chrome.exe 97 PID 4536 wrote to memory of 4036 4536 chrome.exe 97 PID 4536 wrote to memory of 4036 4536 chrome.exe 97 PID 4536 wrote to memory of 4036 4536 chrome.exe 97 PID 4536 wrote to memory of 4036 4536 chrome.exe 97 PID 4536 wrote to memory of 4036 4536 chrome.exe 97 PID 4536 wrote to memory of 4036 4536 chrome.exe 97 PID 4536 wrote to memory of 4036 4536 chrome.exe 97 PID 4536 wrote to memory of 4036 4536 chrome.exe 97 PID 4536 wrote to memory of 4036 4536 chrome.exe 97 PID 4536 wrote to memory of 4036 4536 chrome.exe 97 PID 4536 wrote to memory of 4036 4536 chrome.exe 97 PID 4536 wrote to memory of 1144 4536 chrome.exe 98 PID 4536 wrote to memory of 1144 4536 chrome.exe 98 PID 4536 wrote to memory of 4284 4536 chrome.exe 99 PID 4536 wrote to memory of 4284 4536 chrome.exe 99 PID 4536 wrote to memory of 4284 4536 chrome.exe 99 PID 4536 wrote to memory of 4284 4536 chrome.exe 99 PID 4536 wrote to memory of 4284 4536 chrome.exe 99 PID 4536 wrote to memory of 4284 4536 chrome.exe 99 PID 4536 wrote to memory of 4284 4536 chrome.exe 99 PID 4536 wrote to memory of 4284 4536 chrome.exe 99 PID 4536 wrote to memory of 4284 4536 chrome.exe 99 PID 4536 wrote to memory of 4284 4536 chrome.exe 99 PID 4536 wrote to memory of 4284 4536 chrome.exe 99 PID 4536 wrote to memory of 4284 4536 chrome.exe 99 PID 4536 wrote to memory of 4284 4536 chrome.exe 99 PID 4536 wrote to memory of 4284 4536 chrome.exe 99 PID 4536 wrote to memory of 4284 4536 chrome.exe 99 PID 4536 wrote to memory of 4284 4536 chrome.exe 99 PID 4536 wrote to memory of 4284 4536 chrome.exe 99 PID 4536 wrote to memory of 4284 4536 chrome.exe 99 PID 4536 wrote to memory of 4284 4536 chrome.exe 99 PID 4536 wrote to memory of 4284 4536 chrome.exe 99 PID 4536 wrote to memory of 4284 4536 chrome.exe 99 PID 4536 wrote to memory of 4284 4536 chrome.exe 99 PID 4536 wrote to memory of 4284 4536 chrome.exe 99 PID 4536 wrote to memory of 4284 4536 chrome.exe 99 PID 4536 wrote to memory of 4284 4536 chrome.exe 99 PID 4536 wrote to memory of 4284 4536 chrome.exe 99 PID 4536 wrote to memory of 4284 4536 chrome.exe 99 PID 4536 wrote to memory of 4284 4536 chrome.exe 99 PID 4536 wrote to memory of 4284 4536 chrome.exe 99 PID 4536 wrote to memory of 4284 4536 chrome.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\1363011ce43fdadbff9360a2e2716731_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1363011ce43fdadbff9360a2e2716731_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
PID:4316 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4316 -s 5202⤵
- Program crash
PID:2320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 4316 -ip 43161⤵PID:4532
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ff95a0fcc40,0x7ff95a0fcc4c,0x7ff95a0fcc582⤵PID:3740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1792,i,15757904129524245255,1816024195279005172,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1756 /prefetch:22⤵PID:4036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2032,i,15757904129524245255,1816024195279005172,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2084 /prefetch:32⤵PID:1144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2296,i,15757904129524245255,1816024195279005172,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2472 /prefetch:82⤵PID:4284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3140,i,15757904129524245255,1816024195279005172,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:3336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3168,i,15757904129524245255,1816024195279005172,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:3980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4032,i,15757904129524245255,1816024195279005172,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3668 /prefetch:12⤵PID:2472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3708,i,15757904129524245255,1816024195279005172,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4676 /prefetch:82⤵PID:3732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4684,i,15757904129524245255,1816024195279005172,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4820 /prefetch:82⤵PID:4436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4864,i,15757904129524245255,1816024195279005172,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4948 /prefetch:82⤵PID:5096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5084,i,15757904129524245255,1816024195279005172,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5012 /prefetch:82⤵PID:2660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=4680,i,15757904129524245255,1816024195279005172,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4820 /prefetch:12⤵PID:1528
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3840
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1164
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD53fe614bea8e99603b06dd604524acd8b
SHA12d87095c80cc111e25861a40e6433771af41bfa8
SHA256895ea9dc6748f9f02e254c69f67feee205651b3f213473e61f89e89c794185f4
SHA512829b39a90f732fe3fd202eefabcd0f79aa9edf9de9e5a362986c13fc61f193fa5adae6c77a1d7b7b3fe23b0083f769cc75bba5da353c1b71e49efa117c1bf789
-
Filesize
216B
MD55b8339942dba4820d88054107b6d6f7b
SHA1def850454fa6cbd32a1b68a9eb99c8278cabc73c
SHA256737bedd30226b0ee041e98343f35d5a789677ed8fc2dddd5219e82422ca2b484
SHA51200f6df48c9ed3da36dc9c4f67ebfeba31f54c93337d43c98ba260d8134c4ac1d9a99cfa6df10b1134bbbb5b67a6bc9673623fcecc33d53045144c1783c7afe0d
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
2KB
MD5f0a9db2e6c6fd2b80641f621833baef9
SHA10b00fa03737a023d091b4da084e211fb4050d1c8
SHA2566225b9722c181237f166f3f52ec3e7c5933c39c254fe534f0a2c3c90fe4d1055
SHA5128963dda8aa1fbe68a3053b6fb9f390c8b02aeb372ec145d8aa3ec7054cdb87f57ee4681916843e31c1d7d2de1dd121a576eb5e7545b82321df6e9c677fc47648
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD5c313c44c4fac331f4c2918b0992257fc
SHA1231ff8819064d754a5c257b428e353c930b9ca37
SHA25655555a304c23d94970243ed5356b20c56f9057655d5ce38beb46779cb7b07cb0
SHA5127d0c37367e44ff5174168f4de9844e0d69f069e1f0c6857d4cf2dde618bec618271fbd5348b4fcb748d3176cb2d469406e96530212881862a1452ce7defb6c65
-
Filesize
9KB
MD5499cd1f09593e7e14dc3bfa815a9e2f6
SHA137b7d0ae4ff3c451a52f597d053785d33ce387a7
SHA25669c840e791c75b1eb6648b79639493a449909afe96d9b09923f06385810f3c57
SHA512e562e3defb9d543909d23dd23edc5d88dab862cdc6d3cfe49529962404b00ec1badf33c70ad6074541134398449fcb2394f513b0aa86801223bafe0ed7447365
-
Filesize
15KB
MD5bb2b6aa4de0e24c3a49c8b7b0b7119a4
SHA105abd0095d3a7c159ced8de9285c9a6e23177828
SHA256dffa1515f290a7f84a341c8e70f185b9ba9308a904dbde2f451ad5c52726d7dd
SHA512ee1c0679aa4de541e4300af0a2e2ed8569687547ee482e1c8a2c2ad15b8cde13b21469373ba3a53edcfce92dfa1d7f015025c9761a750c21097b48dcce4afb5b
-
Filesize
211KB
MD5bd3feeae3e1f68efee6a2fea609cbf46
SHA1356e5edf2fb5dfcd5918ac1a49fef0d628f4f4e6
SHA2567bc82a6c8b44a7a63378002244ba27e40327b3a970a9c3410d80275dca3d9773
SHA512ff8f9a27e0913ef68d4d69f0d91645adfdc31ae838da55d7f8c49ce4809516c7d5f3b7a11add9b7256bfc38fb6034690658b3e876fefa5cceffaa6f5a36307cd
-
Filesize
211KB
MD5ef52f36f2e01a9d943486da9854ce30c
SHA17e55b12531e30f8328f6e2bb0a3f38a4ddaf4b07
SHA2561acdc16aa8863a6caa0ca496793577b636b4fcd87d003b9d61bf442e5e81ea37
SHA5120a37235d3255134c3bea6459cc067d028b7ed324de181c3fa48ebd08b3476088f3583b8e88c0a5dbf4aad9fe9cce1dab2104997ce3d198df4f7fac9a860c6b20