Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 16:43
Static task
static1
Behavioral task
behavioral1
Sample
640221be00d5503acfea6c5ffd070cbe_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
640221be00d5503acfea6c5ffd070cbe_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
640221be00d5503acfea6c5ffd070cbe_JaffaCakes118.html
-
Size
35KB
-
MD5
640221be00d5503acfea6c5ffd070cbe
-
SHA1
fd792310439280f4c8e67b1efc96c7d171397660
-
SHA256
0847d63300b05d35249167146bf58fa339a8095240751dd5803a74ea6e913878
-
SHA512
311761d8c6f5046e31382096a9556225550f58da0533bbf97dd97f95b3216568032622f9ba72576dacb786c542bffa00a36e93c0ee68e03424e78a2d4043b4f8
-
SSDEEP
192:uWzLqb5nB2nnQjxn5Q/VnQieYNnQnQOkEntH7nQTbnhnQmiXCPlACeJNt5CCKtzC:yQ/oQl1CjbXJqyWWsNkUF5Y
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 4024 msedge.exe 4024 msedge.exe 4556 msedge.exe 4556 msedge.exe 2616 identity_helper.exe 2616 identity_helper.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4556 wrote to memory of 1628 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 1628 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 4368 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 4368 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 4368 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 4368 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 4368 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 4368 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 4368 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 4368 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 4368 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 4368 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 4368 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 4368 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 4368 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 4368 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 4368 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 4368 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 4368 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 4368 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 4368 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 4368 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 4368 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 4368 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 4368 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 4368 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 4368 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 4368 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 4368 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 4368 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 4368 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 4368 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 4368 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 4368 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 4368 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 4368 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 4368 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 4368 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 4368 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 4368 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 4368 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 4368 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 4024 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 4024 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 1200 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 1200 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 1200 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 1200 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 1200 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 1200 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 1200 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 1200 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 1200 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 1200 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 1200 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 1200 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 1200 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 1200 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 1200 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 1200 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 1200 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 1200 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 1200 4556 msedge.exe msedge.exe PID 4556 wrote to memory of 1200 4556 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\640221be00d5503acfea6c5ffd070cbe_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9fad346f8,0x7ff9fad34708,0x7ff9fad347182⤵PID:1628
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,6335375296496948801,12661276693362935488,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2220 /prefetch:22⤵PID:4368
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2208,6335375296496948801,12661276693362935488,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4024 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2208,6335375296496948801,12661276693362935488,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2948 /prefetch:82⤵PID:1200
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,6335375296496948801,12661276693362935488,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4476
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,6335375296496948801,12661276693362935488,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:3724
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,6335375296496948801,12661276693362935488,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 /prefetch:82⤵PID:3500
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,6335375296496948801,12661276693362935488,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2616 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,6335375296496948801,12661276693362935488,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:2972
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,6335375296496948801,12661276693362935488,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:1620
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,6335375296496948801,12661276693362935488,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5724 /prefetch:12⤵PID:4212
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,6335375296496948801,12661276693362935488,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:12⤵PID:936
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,6335375296496948801,12661276693362935488,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4868 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4232
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3240
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
5KB
MD502d4c40f3b00b2d61a135e85574d45e5
SHA15b58b3d5bc3674e52ee5368ef691a48679607805
SHA2560d7cca0111701e2898e70e6d09763084b1330a40ab18b0059e33d9b90a5c0970
SHA512ad2bda89f27a8632976e8c369afcb18713b3dca0f1dfd1a3a265363d92e810a191359bd15a9314abfb87fd51ff8fe9c7525cb7ce607941ca628084bcded047fb
-
Filesize
6KB
MD55086ae51fcb33ab0d68bbbc4ae4998b9
SHA163318e3bbd922890b15b53127e238cd922ee654d
SHA25667762048e602599c1c91a0464da415a3390bbfabf78489d648dca700c4fab4af
SHA512d89ac4cc678b75ca5396176cea6af33c8b045f4a5c16c2eb47440ba90165fd361ee420461860b234cfd9fd803fba4ab3262cde01ce479a05b0c61f4a29590b6f
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5b92330d10d882748d77411894b8bac44
SHA1d2e6e93bc7f664d155b13d7b07e8253b3b69f623
SHA256f1b9879fa41adcfa6766ea9ffaa2cabb379237971a2f1fb42e3014902c72679a
SHA512d3b09a09b126bad54a4294eb7789a6234d19f61b3182047fdc37e9352a401546056e733d9c42288935a981c89eb1a5f3faa2fbe56ec67d6e0ddd56e4c7712b41
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e