Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 23:15
Static task
static1
Behavioral task
behavioral1
Sample
65236d11839912d36a62dbe9f20660cb_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
65236d11839912d36a62dbe9f20660cb_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65236d11839912d36a62dbe9f20660cb_JaffaCakes118.html
-
Size
220KB
-
MD5
65236d11839912d36a62dbe9f20660cb
-
SHA1
2b2d243f53775baf5905fac16ab45b0cf587dcfa
-
SHA256
2a9e4cf58de4b5f59618f333b02830b2eb254ec7d7a8cd9fbbe08723dea2c948
-
SHA512
2978fccbcf200cededb123110b19dba6d01e546e96f4a608b44ec09164e59a157ad456f7b2b65f6e81176fca6e6153d1b0186a742e9cf2705b1fb89b9f12baab
-
SSDEEP
3072:SHsTAUY04CaltyfkMY+BES09JXAnyrZalI+YQ:SHI58esMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2140 msedge.exe 2140 msedge.exe 4436 msedge.exe 4436 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4436 msedge.exe 4436 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4436 wrote to memory of 2472 4436 msedge.exe 83 PID 4436 wrote to memory of 2472 4436 msedge.exe 83 PID 4436 wrote to memory of 3024 4436 msedge.exe 84 PID 4436 wrote to memory of 3024 4436 msedge.exe 84 PID 4436 wrote to memory of 3024 4436 msedge.exe 84 PID 4436 wrote to memory of 3024 4436 msedge.exe 84 PID 4436 wrote to memory of 3024 4436 msedge.exe 84 PID 4436 wrote to memory of 3024 4436 msedge.exe 84 PID 4436 wrote to memory of 3024 4436 msedge.exe 84 PID 4436 wrote to memory of 3024 4436 msedge.exe 84 PID 4436 wrote to memory of 3024 4436 msedge.exe 84 PID 4436 wrote to memory of 3024 4436 msedge.exe 84 PID 4436 wrote to memory of 3024 4436 msedge.exe 84 PID 4436 wrote to memory of 3024 4436 msedge.exe 84 PID 4436 wrote to memory of 3024 4436 msedge.exe 84 PID 4436 wrote to memory of 3024 4436 msedge.exe 84 PID 4436 wrote to memory of 3024 4436 msedge.exe 84 PID 4436 wrote to memory of 3024 4436 msedge.exe 84 PID 4436 wrote to memory of 3024 4436 msedge.exe 84 PID 4436 wrote to memory of 3024 4436 msedge.exe 84 PID 4436 wrote to memory of 3024 4436 msedge.exe 84 PID 4436 wrote to memory of 3024 4436 msedge.exe 84 PID 4436 wrote to memory of 3024 4436 msedge.exe 84 PID 4436 wrote to memory of 3024 4436 msedge.exe 84 PID 4436 wrote to memory of 3024 4436 msedge.exe 84 PID 4436 wrote to memory of 3024 4436 msedge.exe 84 PID 4436 wrote to memory of 3024 4436 msedge.exe 84 PID 4436 wrote to memory of 3024 4436 msedge.exe 84 PID 4436 wrote to memory of 3024 4436 msedge.exe 84 PID 4436 wrote to memory of 3024 4436 msedge.exe 84 PID 4436 wrote to memory of 3024 4436 msedge.exe 84 PID 4436 wrote to memory of 3024 4436 msedge.exe 84 PID 4436 wrote to memory of 3024 4436 msedge.exe 84 PID 4436 wrote to memory of 3024 4436 msedge.exe 84 PID 4436 wrote to memory of 3024 4436 msedge.exe 84 PID 4436 wrote to memory of 3024 4436 msedge.exe 84 PID 4436 wrote to memory of 3024 4436 msedge.exe 84 PID 4436 wrote to memory of 3024 4436 msedge.exe 84 PID 4436 wrote to memory of 3024 4436 msedge.exe 84 PID 4436 wrote to memory of 3024 4436 msedge.exe 84 PID 4436 wrote to memory of 3024 4436 msedge.exe 84 PID 4436 wrote to memory of 3024 4436 msedge.exe 84 PID 4436 wrote to memory of 2140 4436 msedge.exe 85 PID 4436 wrote to memory of 2140 4436 msedge.exe 85 PID 4436 wrote to memory of 1160 4436 msedge.exe 86 PID 4436 wrote to memory of 1160 4436 msedge.exe 86 PID 4436 wrote to memory of 1160 4436 msedge.exe 86 PID 4436 wrote to memory of 1160 4436 msedge.exe 86 PID 4436 wrote to memory of 1160 4436 msedge.exe 86 PID 4436 wrote to memory of 1160 4436 msedge.exe 86 PID 4436 wrote to memory of 1160 4436 msedge.exe 86 PID 4436 wrote to memory of 1160 4436 msedge.exe 86 PID 4436 wrote to memory of 1160 4436 msedge.exe 86 PID 4436 wrote to memory of 1160 4436 msedge.exe 86 PID 4436 wrote to memory of 1160 4436 msedge.exe 86 PID 4436 wrote to memory of 1160 4436 msedge.exe 86 PID 4436 wrote to memory of 1160 4436 msedge.exe 86 PID 4436 wrote to memory of 1160 4436 msedge.exe 86 PID 4436 wrote to memory of 1160 4436 msedge.exe 86 PID 4436 wrote to memory of 1160 4436 msedge.exe 86 PID 4436 wrote to memory of 1160 4436 msedge.exe 86 PID 4436 wrote to memory of 1160 4436 msedge.exe 86 PID 4436 wrote to memory of 1160 4436 msedge.exe 86 PID 4436 wrote to memory of 1160 4436 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\65236d11839912d36a62dbe9f20660cb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa996346f8,0x7ffa99634708,0x7ffa996347182⤵PID:2472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,15534407680107848198,11101015595404558978,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:22⤵PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2184,15534407680107848198,11101015595404558978,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2184,15534407680107848198,11101015595404558978,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2624 /prefetch:82⤵PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,15534407680107848198,11101015595404558978,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,15534407680107848198,11101015595404558978,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,15534407680107848198,11101015595404558978,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2992 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4588
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4632
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\8595e1af-9757-45ce-a1a2-0dfb2bd7fea7.tmp
Filesize5KB
MD587b58d9ff827ea5734846d194ea6d5e7
SHA16ae6aca01129acc0d3193bf00d626abc4f06479e
SHA256c4622ed56714f19f2974bd947807e4c81e34ee65932ac0ef7d6d6cff85f3f6d5
SHA5126a345600cf5c21684a3d0d45b4e86c8ac7819dd56d0ef42605956c9a23f625681fb6ccf53436f80fab05ef73eb173857ba9db30529331d4a6b0272559780e77e
-
Filesize
6KB
MD525666ef80d8ce3df1bffed211bb575b2
SHA182e44dae18d3b36e9b5e4f9c42fde07d28e35d84
SHA256ed83f3f19d785bb82d2198074b4a4a0b0804e757d8ddc76d506fde5fe0e3cc49
SHA512e34132211b4382c5861d9f50a2b98b7a0f960d99ebaebececfef89969dfe31366a0f5bc803966fbf0e16653a55b3ae384cd8b2c9dd5230b564a254441d120b55
-
Filesize
11KB
MD53f8b39937ceadaca026a880c54190be9
SHA1db632c999d16e53c48f21542fcb02d151f0f0501
SHA2560793cb849d9f3c2198b6699d2710b96cffbc5506bab060d07f0deb9696a003e8
SHA512c8d790aee11c8ea0b3628c95f3f47740e89042b5910f9f59218c4bb97dc5afeeac5c42c95ffdaefb3116fe889feb6a2b52823350905be24a8121de95d58cc41e