Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 23:30
Static task
static1
Behavioral task
behavioral1
Sample
614c6e9e8dc6c5c85313a73029d690e4_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
614c6e9e8dc6c5c85313a73029d690e4_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
614c6e9e8dc6c5c85313a73029d690e4_JaffaCakes118.html
-
Size
27KB
-
MD5
614c6e9e8dc6c5c85313a73029d690e4
-
SHA1
d1decd38672d4125caf1fa27a822f28aaf262e65
-
SHA256
3252ba4814ba03cc5639d8beda3155cea9ba57f2939eac060313cdef0edd5e95
-
SHA512
740e369f38b47f6849a07758a0fbb1e9647b2b2f8a032e33c35e375f05040997448d2d64beb5959fdb9279682b21e63c9fe6e4a088d9073088a395ec805ae57e
-
SSDEEP
768:3whY2korDcBhXhZfuW102APBMOVl/dGSdMEN:ghY2korDcBhXhZfuW10wOX/dGSdMO
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2952 msedge.exe 2952 msedge.exe 5000 msedge.exe 5000 msedge.exe 1608 identity_helper.exe 1608 identity_helper.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5000 wrote to memory of 1700 5000 msedge.exe 83 PID 5000 wrote to memory of 1700 5000 msedge.exe 83 PID 5000 wrote to memory of 4272 5000 msedge.exe 84 PID 5000 wrote to memory of 4272 5000 msedge.exe 84 PID 5000 wrote to memory of 4272 5000 msedge.exe 84 PID 5000 wrote to memory of 4272 5000 msedge.exe 84 PID 5000 wrote to memory of 4272 5000 msedge.exe 84 PID 5000 wrote to memory of 4272 5000 msedge.exe 84 PID 5000 wrote to memory of 4272 5000 msedge.exe 84 PID 5000 wrote to memory of 4272 5000 msedge.exe 84 PID 5000 wrote to memory of 4272 5000 msedge.exe 84 PID 5000 wrote to memory of 4272 5000 msedge.exe 84 PID 5000 wrote to memory of 4272 5000 msedge.exe 84 PID 5000 wrote to memory of 4272 5000 msedge.exe 84 PID 5000 wrote to memory of 4272 5000 msedge.exe 84 PID 5000 wrote to memory of 4272 5000 msedge.exe 84 PID 5000 wrote to memory of 4272 5000 msedge.exe 84 PID 5000 wrote to memory of 4272 5000 msedge.exe 84 PID 5000 wrote to memory of 4272 5000 msedge.exe 84 PID 5000 wrote to memory of 4272 5000 msedge.exe 84 PID 5000 wrote to memory of 4272 5000 msedge.exe 84 PID 5000 wrote to memory of 4272 5000 msedge.exe 84 PID 5000 wrote to memory of 4272 5000 msedge.exe 84 PID 5000 wrote to memory of 4272 5000 msedge.exe 84 PID 5000 wrote to memory of 4272 5000 msedge.exe 84 PID 5000 wrote to memory of 4272 5000 msedge.exe 84 PID 5000 wrote to memory of 4272 5000 msedge.exe 84 PID 5000 wrote to memory of 4272 5000 msedge.exe 84 PID 5000 wrote to memory of 4272 5000 msedge.exe 84 PID 5000 wrote to memory of 4272 5000 msedge.exe 84 PID 5000 wrote to memory of 4272 5000 msedge.exe 84 PID 5000 wrote to memory of 4272 5000 msedge.exe 84 PID 5000 wrote to memory of 4272 5000 msedge.exe 84 PID 5000 wrote to memory of 4272 5000 msedge.exe 84 PID 5000 wrote to memory of 4272 5000 msedge.exe 84 PID 5000 wrote to memory of 4272 5000 msedge.exe 84 PID 5000 wrote to memory of 4272 5000 msedge.exe 84 PID 5000 wrote to memory of 4272 5000 msedge.exe 84 PID 5000 wrote to memory of 4272 5000 msedge.exe 84 PID 5000 wrote to memory of 4272 5000 msedge.exe 84 PID 5000 wrote to memory of 4272 5000 msedge.exe 84 PID 5000 wrote to memory of 4272 5000 msedge.exe 84 PID 5000 wrote to memory of 2952 5000 msedge.exe 85 PID 5000 wrote to memory of 2952 5000 msedge.exe 85 PID 5000 wrote to memory of 3952 5000 msedge.exe 86 PID 5000 wrote to memory of 3952 5000 msedge.exe 86 PID 5000 wrote to memory of 3952 5000 msedge.exe 86 PID 5000 wrote to memory of 3952 5000 msedge.exe 86 PID 5000 wrote to memory of 3952 5000 msedge.exe 86 PID 5000 wrote to memory of 3952 5000 msedge.exe 86 PID 5000 wrote to memory of 3952 5000 msedge.exe 86 PID 5000 wrote to memory of 3952 5000 msedge.exe 86 PID 5000 wrote to memory of 3952 5000 msedge.exe 86 PID 5000 wrote to memory of 3952 5000 msedge.exe 86 PID 5000 wrote to memory of 3952 5000 msedge.exe 86 PID 5000 wrote to memory of 3952 5000 msedge.exe 86 PID 5000 wrote to memory of 3952 5000 msedge.exe 86 PID 5000 wrote to memory of 3952 5000 msedge.exe 86 PID 5000 wrote to memory of 3952 5000 msedge.exe 86 PID 5000 wrote to memory of 3952 5000 msedge.exe 86 PID 5000 wrote to memory of 3952 5000 msedge.exe 86 PID 5000 wrote to memory of 3952 5000 msedge.exe 86 PID 5000 wrote to memory of 3952 5000 msedge.exe 86 PID 5000 wrote to memory of 3952 5000 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\614c6e9e8dc6c5c85313a73029d690e4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8bed246f8,0x7ff8bed24708,0x7ff8bed247182⤵PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,15126466532622825853,17049312054993251294,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,15126466532622825853,17049312054993251294,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,15126466532622825853,17049312054993251294,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2644 /prefetch:82⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,15126466532622825853,17049312054993251294,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,15126466532622825853,17049312054993251294,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,15126466532622825853,17049312054993251294,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,15126466532622825853,17049312054993251294,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,15126466532622825853,17049312054993251294,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5708 /prefetch:82⤵PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,15126466532622825853,17049312054993251294,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5708 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,15126466532622825853,17049312054993251294,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3568 /prefetch:12⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,15126466532622825853,17049312054993251294,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:12⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,15126466532622825853,17049312054993251294,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4572
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2980
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3816
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
368B
MD574af36ed7917bf0c78e3d5eadbd041ae
SHA1601f7d012ea7cb9c187faf5bf1908e51b83dd1b9
SHA256ef75d236ad1899ba7df0ff8381a0e004de23e8f78f4aedaaaead2699248926b2
SHA512051d3807d54c6da07d33c639520b4cd305151ed6115cc5507054b15ad9cef1178a7b9e8b16babdf5573013af427ca6f88b4ed4f2c6201ce2c78c052f45633a2b
-
Filesize
399B
MD52fdee138b56560c78a126205bdc94baf
SHA18918bfa25ce38e1e554e56f43aa863d4385d012c
SHA25697b67d849fa98ad5c4ada83c90e49dc7aabbe666ccf1f16a44b9f1f7ba62a91a
SHA512a74693c364005360a93e01c8526a7927b35efb7761fb8a479ea4325da729418972ad580fe91aaeb263c15a9afac57d326ee9da1b19eefe7ca72e898556a0be9d
-
Filesize
5KB
MD52da66499679d8e01732daad2c39ec6c8
SHA1009f51919ac3c59b36ec331702c2a7a32a18c544
SHA2563ec57a76a31fa10de72cfaba7f18de1352d1c09fef256ba7a7020f444f69f5fb
SHA512c082815d610fff91900a0ade0004a3b62d0e817440254957f33c05fe9fb6c27801dc82b99159ee28b8274d08599ae7249fa1f37b241c09d625f3becb784c5e8e
-
Filesize
6KB
MD58aaa67549f126c6f4dc85e256af9157b
SHA129422d6f2426f6aad35020b7bc4df58ada9b0e19
SHA25636737be92c9a1b0ce42dd1bc2761feddff3e53fde27f9c9f9643d523d674f95e
SHA51233b40cd4a7750bb1e1d37a17baf746bf3445b4a59040760aea94decc4bf9f89f308ee16781906551b25d7d2905aed83421b2a0f9db2cb6e152f7a020d6657ec4
-
Filesize
6KB
MD5cde542f076b367857b2dc1ef561176bc
SHA100f35314c7d878340a4e3f9303342131289fa9f3
SHA2560e8abf0bd4a3afc40eb96f0f7567cf18fe36e3992fa0eca55757802e697da11c
SHA51296cda55765034c5a040a1bd67350185a2159fb69f06513eac05cba956721c4d729d421bc08df92257eba0c03ba7bd944dd94c4e90ad277d2cf162089335ae3e2
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5fef2444ccf7da412af815629995df770
SHA14c2e0ceccebe36053d146b48de36b78120927918
SHA2568b04571895f02932becefd9811485971d0eba4400f26287000db693dc72f9efe
SHA51233041c0c8490353de6fe8d76897de1a9658fcf7d87f35e0cd0ee7bd3e2df402bce43349cd1987c7a9025f3001edfc5550ed4431a7c44ef99cc38efa244e87cc2