Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 06:55
Static task
static1
Behavioral task
behavioral1
Sample
62690e56f48ddb9fe0ef62afd5f7ec1f_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
62690e56f48ddb9fe0ef62afd5f7ec1f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
62690e56f48ddb9fe0ef62afd5f7ec1f_JaffaCakes118.html
-
Size
54KB
-
MD5
62690e56f48ddb9fe0ef62afd5f7ec1f
-
SHA1
cb264878873197044c4c04738167ba02c5e5473f
-
SHA256
f39a1edb30c77ee36fc1d131fa8e87c0739065e6dda8fe67f7051a89fd24ed32
-
SHA512
b522ccd428d43e353478c6d85a794c1b780eef45e7f89807884196b8bcc56f3c5d4e71034602765348688056a21fed824ae2eeddcb68afc0a4f2bf5fc065ed2e
-
SSDEEP
1536:LdVrOjosaj8haxpHjztxFIbQJDgyte8GkKZBexf:LdMjaYhaxpHjztxFIbQJDP
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2440 msedge.exe 2440 msedge.exe 1736 msedge.exe 1736 msedge.exe 1200 identity_helper.exe 1200 identity_helper.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1736 wrote to memory of 1480 1736 msedge.exe 83 PID 1736 wrote to memory of 1480 1736 msedge.exe 83 PID 1736 wrote to memory of 3400 1736 msedge.exe 84 PID 1736 wrote to memory of 3400 1736 msedge.exe 84 PID 1736 wrote to memory of 3400 1736 msedge.exe 84 PID 1736 wrote to memory of 3400 1736 msedge.exe 84 PID 1736 wrote to memory of 3400 1736 msedge.exe 84 PID 1736 wrote to memory of 3400 1736 msedge.exe 84 PID 1736 wrote to memory of 3400 1736 msedge.exe 84 PID 1736 wrote to memory of 3400 1736 msedge.exe 84 PID 1736 wrote to memory of 3400 1736 msedge.exe 84 PID 1736 wrote to memory of 3400 1736 msedge.exe 84 PID 1736 wrote to memory of 3400 1736 msedge.exe 84 PID 1736 wrote to memory of 3400 1736 msedge.exe 84 PID 1736 wrote to memory of 3400 1736 msedge.exe 84 PID 1736 wrote to memory of 3400 1736 msedge.exe 84 PID 1736 wrote to memory of 3400 1736 msedge.exe 84 PID 1736 wrote to memory of 3400 1736 msedge.exe 84 PID 1736 wrote to memory of 3400 1736 msedge.exe 84 PID 1736 wrote to memory of 3400 1736 msedge.exe 84 PID 1736 wrote to memory of 3400 1736 msedge.exe 84 PID 1736 wrote to memory of 3400 1736 msedge.exe 84 PID 1736 wrote to memory of 3400 1736 msedge.exe 84 PID 1736 wrote to memory of 3400 1736 msedge.exe 84 PID 1736 wrote to memory of 3400 1736 msedge.exe 84 PID 1736 wrote to memory of 3400 1736 msedge.exe 84 PID 1736 wrote to memory of 3400 1736 msedge.exe 84 PID 1736 wrote to memory of 3400 1736 msedge.exe 84 PID 1736 wrote to memory of 3400 1736 msedge.exe 84 PID 1736 wrote to memory of 3400 1736 msedge.exe 84 PID 1736 wrote to memory of 3400 1736 msedge.exe 84 PID 1736 wrote to memory of 3400 1736 msedge.exe 84 PID 1736 wrote to memory of 3400 1736 msedge.exe 84 PID 1736 wrote to memory of 3400 1736 msedge.exe 84 PID 1736 wrote to memory of 3400 1736 msedge.exe 84 PID 1736 wrote to memory of 3400 1736 msedge.exe 84 PID 1736 wrote to memory of 3400 1736 msedge.exe 84 PID 1736 wrote to memory of 3400 1736 msedge.exe 84 PID 1736 wrote to memory of 3400 1736 msedge.exe 84 PID 1736 wrote to memory of 3400 1736 msedge.exe 84 PID 1736 wrote to memory of 3400 1736 msedge.exe 84 PID 1736 wrote to memory of 3400 1736 msedge.exe 84 PID 1736 wrote to memory of 2440 1736 msedge.exe 85 PID 1736 wrote to memory of 2440 1736 msedge.exe 85 PID 1736 wrote to memory of 3084 1736 msedge.exe 86 PID 1736 wrote to memory of 3084 1736 msedge.exe 86 PID 1736 wrote to memory of 3084 1736 msedge.exe 86 PID 1736 wrote to memory of 3084 1736 msedge.exe 86 PID 1736 wrote to memory of 3084 1736 msedge.exe 86 PID 1736 wrote to memory of 3084 1736 msedge.exe 86 PID 1736 wrote to memory of 3084 1736 msedge.exe 86 PID 1736 wrote to memory of 3084 1736 msedge.exe 86 PID 1736 wrote to memory of 3084 1736 msedge.exe 86 PID 1736 wrote to memory of 3084 1736 msedge.exe 86 PID 1736 wrote to memory of 3084 1736 msedge.exe 86 PID 1736 wrote to memory of 3084 1736 msedge.exe 86 PID 1736 wrote to memory of 3084 1736 msedge.exe 86 PID 1736 wrote to memory of 3084 1736 msedge.exe 86 PID 1736 wrote to memory of 3084 1736 msedge.exe 86 PID 1736 wrote to memory of 3084 1736 msedge.exe 86 PID 1736 wrote to memory of 3084 1736 msedge.exe 86 PID 1736 wrote to memory of 3084 1736 msedge.exe 86 PID 1736 wrote to memory of 3084 1736 msedge.exe 86 PID 1736 wrote to memory of 3084 1736 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\62690e56f48ddb9fe0ef62afd5f7ec1f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb0b4b46f8,0x7ffb0b4b4708,0x7ffb0b4b47182⤵PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,16483713852612671092,11892946190875675963,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,16483713852612671092,11892946190875675963,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,16483713852612671092,11892946190875675963,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2436 /prefetch:82⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,16483713852612671092,11892946190875675963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,16483713852612671092,11892946190875675963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,16483713852612671092,11892946190875675963,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4928 /prefetch:82⤵PID:1812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,16483713852612671092,11892946190875675963,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4928 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,16483713852612671092,11892946190875675963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵PID:3156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,16483713852612671092,11892946190875675963,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,16483713852612671092,11892946190875675963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,16483713852612671092,11892946190875675963,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,16483713852612671092,11892946190875675963,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1968 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1216
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2820
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
251B
MD5e0dc6202c089d418fb62fafd7425ee20
SHA1a99fa9f25292604e39ea0356e1f9027d8b6078b1
SHA2563622cc3363372383c3bf0c5e73c06510de321273674613909aa9380a4321eb22
SHA512cc3bd447862b212ba9fa69ef7f4b50dd489fce5ad3dca2f60c2fbcbb2b5763e0df3785c32e1b5c73229a31659c03e176b1cfda15e8c9b18f4372beb5dd50a15f
-
Filesize
5KB
MD56b82e4f375ff3de4ee4228538921c93a
SHA14c2f590057749a93f8a15851b06aa5ded335a6cb
SHA256d94e0606b00ba274fd844e025b8e2ffb300d4646c96ff76fd3b072c309fe8c07
SHA5123c2897aa29a4de55dbd6a0ee03372054f4a007490770c00648846cfdae745de348e6e50d58ce14c6b2c1c75a25fdaf78d17b80f400d14b5738bc527714dcecb8
-
Filesize
6KB
MD5b210595432abf4056ec35746634ea727
SHA17e349260743b5c3b8ec7b54995a4c91bf34b9726
SHA256208cc00dee4236d37dbbcc453fc8aac2f14210342781b64b186c1bb3fdb78a8e
SHA5120be41848571e5c1f8267a2beeecef992d5c7c77b906369079f2c03938b9da94e8bc7554a95dfae74a524510b448ca7d96d8b69f98eceba7da8410778559c423a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a2e5a4495bbdd2d7141ae454a5287164
SHA18d9281b579fdbd6e5eea59fa371a7d94e01cbe23
SHA256f2d43d975624e3c10f2e43f6e634d7e58443584e7b437f35288abd3c0259a0e2
SHA51298a7aa0edf4306884424eb8965bcc37926fef2567e3eb52767256280978a8288734f839a2be13c30ea8f83787240165f907151dbde66e6464d9906231e240772