Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 16:48
Static task
static1
Behavioral task
behavioral1
Sample
64068a7812c1c291247c31c3ef8287d6_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
64068a7812c1c291247c31c3ef8287d6_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
64068a7812c1c291247c31c3ef8287d6_JaffaCakes118.html
-
Size
399KB
-
MD5
64068a7812c1c291247c31c3ef8287d6
-
SHA1
8c18eae7e795d58d6b23cc432a6e1b2e04b39168
-
SHA256
078906e8035efe1b3dbeaa1fd2413e79d9874b52da8b7d935163507372bd8c30
-
SHA512
7e3850c962d9b6e6bb130ac3aaebf1cd703a6f1056b081207037d9b2876dc5bc314025b41529791003180edb16d1e9431ce7c8a913de2b8c61dc8939fd207882
-
SSDEEP
12288:sRCkAmkArL6RJRE7kAr3RJRE7kArLRJRR7kArVRCkAmkArL6RJRE7kAr3RJRE7kz:V9OVxE
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1320 msedge.exe 1320 msedge.exe 2552 msedge.exe 2552 msedge.exe 908 identity_helper.exe 908 identity_helper.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2552 wrote to memory of 3968 2552 msedge.exe 82 PID 2552 wrote to memory of 3968 2552 msedge.exe 82 PID 2552 wrote to memory of 4552 2552 msedge.exe 83 PID 2552 wrote to memory of 4552 2552 msedge.exe 83 PID 2552 wrote to memory of 4552 2552 msedge.exe 83 PID 2552 wrote to memory of 4552 2552 msedge.exe 83 PID 2552 wrote to memory of 4552 2552 msedge.exe 83 PID 2552 wrote to memory of 4552 2552 msedge.exe 83 PID 2552 wrote to memory of 4552 2552 msedge.exe 83 PID 2552 wrote to memory of 4552 2552 msedge.exe 83 PID 2552 wrote to memory of 4552 2552 msedge.exe 83 PID 2552 wrote to memory of 4552 2552 msedge.exe 83 PID 2552 wrote to memory of 4552 2552 msedge.exe 83 PID 2552 wrote to memory of 4552 2552 msedge.exe 83 PID 2552 wrote to memory of 4552 2552 msedge.exe 83 PID 2552 wrote to memory of 4552 2552 msedge.exe 83 PID 2552 wrote to memory of 4552 2552 msedge.exe 83 PID 2552 wrote to memory of 4552 2552 msedge.exe 83 PID 2552 wrote to memory of 4552 2552 msedge.exe 83 PID 2552 wrote to memory of 4552 2552 msedge.exe 83 PID 2552 wrote to memory of 4552 2552 msedge.exe 83 PID 2552 wrote to memory of 4552 2552 msedge.exe 83 PID 2552 wrote to memory of 4552 2552 msedge.exe 83 PID 2552 wrote to memory of 4552 2552 msedge.exe 83 PID 2552 wrote to memory of 4552 2552 msedge.exe 83 PID 2552 wrote to memory of 4552 2552 msedge.exe 83 PID 2552 wrote to memory of 4552 2552 msedge.exe 83 PID 2552 wrote to memory of 4552 2552 msedge.exe 83 PID 2552 wrote to memory of 4552 2552 msedge.exe 83 PID 2552 wrote to memory of 4552 2552 msedge.exe 83 PID 2552 wrote to memory of 4552 2552 msedge.exe 83 PID 2552 wrote to memory of 4552 2552 msedge.exe 83 PID 2552 wrote to memory of 4552 2552 msedge.exe 83 PID 2552 wrote to memory of 4552 2552 msedge.exe 83 PID 2552 wrote to memory of 4552 2552 msedge.exe 83 PID 2552 wrote to memory of 4552 2552 msedge.exe 83 PID 2552 wrote to memory of 4552 2552 msedge.exe 83 PID 2552 wrote to memory of 4552 2552 msedge.exe 83 PID 2552 wrote to memory of 4552 2552 msedge.exe 83 PID 2552 wrote to memory of 4552 2552 msedge.exe 83 PID 2552 wrote to memory of 4552 2552 msedge.exe 83 PID 2552 wrote to memory of 4552 2552 msedge.exe 83 PID 2552 wrote to memory of 1320 2552 msedge.exe 84 PID 2552 wrote to memory of 1320 2552 msedge.exe 84 PID 2552 wrote to memory of 3580 2552 msedge.exe 85 PID 2552 wrote to memory of 3580 2552 msedge.exe 85 PID 2552 wrote to memory of 3580 2552 msedge.exe 85 PID 2552 wrote to memory of 3580 2552 msedge.exe 85 PID 2552 wrote to memory of 3580 2552 msedge.exe 85 PID 2552 wrote to memory of 3580 2552 msedge.exe 85 PID 2552 wrote to memory of 3580 2552 msedge.exe 85 PID 2552 wrote to memory of 3580 2552 msedge.exe 85 PID 2552 wrote to memory of 3580 2552 msedge.exe 85 PID 2552 wrote to memory of 3580 2552 msedge.exe 85 PID 2552 wrote to memory of 3580 2552 msedge.exe 85 PID 2552 wrote to memory of 3580 2552 msedge.exe 85 PID 2552 wrote to memory of 3580 2552 msedge.exe 85 PID 2552 wrote to memory of 3580 2552 msedge.exe 85 PID 2552 wrote to memory of 3580 2552 msedge.exe 85 PID 2552 wrote to memory of 3580 2552 msedge.exe 85 PID 2552 wrote to memory of 3580 2552 msedge.exe 85 PID 2552 wrote to memory of 3580 2552 msedge.exe 85 PID 2552 wrote to memory of 3580 2552 msedge.exe 85 PID 2552 wrote to memory of 3580 2552 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\64068a7812c1c291247c31c3ef8287d6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9903a46f8,0x7ff9903a4708,0x7ff9903a47182⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,11930448207178588129,15933655198373303796,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:22⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2200,11930448207178588129,15933655198373303796,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2428 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2200,11930448207178588129,15933655198373303796,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,11930448207178588129,15933655198373303796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,11930448207178588129,15933655198373303796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,11930448207178588129,15933655198373303796,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1360 /prefetch:82⤵PID:1804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,11930448207178588129,15933655198373303796,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1360 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,11930448207178588129,15933655198373303796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,11930448207178588129,15933655198373303796,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:12⤵PID:2816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,11930448207178588129,15933655198373303796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4188 /prefetch:12⤵PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,11930448207178588129,15933655198373303796,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,11930448207178588129,15933655198373303796,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5316 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3764
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1052
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize330B
MD530043418b514f90d9a235b84cc9e641a
SHA1258762b8638854a0a75add3c2e00131bde880d3c
SHA2567018928606c8af99037aa834df1b6a88442f591fd99c7e6f4617e6c4506c0b24
SHA512274170ccf654a700123f14e043f5284f9c01a0550e5ff64ad1747ea12411eb4c091c84cd5f33b63c4dd6d4519f039dc10e2c0395aa929f90afc7f5a4e51a13b1
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
2KB
MD57067e00602c16a42736e2da548306917
SHA17c8f4e5baaa2003ad2dc03687a2ed23ccfee85a0
SHA25660dd4b31677ca84bfa50d12488902a2efd24129f175d9ea0608b8c87bc9126b9
SHA512949a13075f2300d2a0c78b378e6a32fe749b94f317a90f993ca4e9aa8ec57ea4965cda438aff1e59b1ad7e4def91105177136303f8e5b4e33fa3f80cd890438d
-
Filesize
5KB
MD5a446a3ab0f6e82b0ca5cca4be217b243
SHA15c8287c2e630027a4ff8020ce6aeb093fdd809a5
SHA2565e9275976fd2ec37dc350b28d7cd30d23ef818f5ec98fb15e748d27912d00007
SHA512ae77b1e9f6ba80f2dc3b186564fd81b802b572505c61d7cfe7cbb8a86070307f87bce1294decee3ad58cd1a06bd63c9b476135d0684981b15b2d7e2d6bad6e35
-
Filesize
6KB
MD5aeca04cf2b397eab67791c511d49f2e3
SHA16fa4a15e034b41e95e7bb07c849757ccd5393e59
SHA25623e3e3a23991e1a61ff01433379e7ba5981bd3642d9d5cb0db39c35b6dbe8460
SHA51288242ee9c631aee5e50c420c6c9641f33de2c15971aef916a6551e1591073ea58dbe0b7c0e4b14741267682617138623c63d9588906b516704657fd3727c293a
-
Filesize
6KB
MD5a06e78fb487554e776b1000a1634c19b
SHA16b6fb2e440d23a61fe62a795bad6fcc0f6ae2133
SHA256909b80ec293eb66f1ab8140aea5c334781a7b845d578c3f7ecd194ccbc8fd3f4
SHA512de60a14653593a35f1e04fcc1e5c4d46290f86da8d939aa2c5be27ce05447f3010de339867bc6c773dceeb2a6c4c6f9b6d3f2d0754203609c2b9091b60fb7ec8
-
Filesize
6KB
MD5184583e22cf09d3202a032ba70366c2c
SHA106c50bd341c9417e90d54f4ff7d74965da4fd6e9
SHA25634f2706a8a62323192da244800f0fd29da23300eca7862b283b8a5c305533ed3
SHA512b0b1bffdc7e4baa0f0308b4eb6f4c1e7b779430fe3a3b393722f11e29df21fba0301900524427f7a67c96743f2ba3993f6995ddf6bdae6dd7a9724fca8efddd3
-
Filesize
370B
MD5c7fb795d632aa9bf90633205ea3ef867
SHA1cf7cbdab9006a7817c2bc5ec0efc3e74badc9641
SHA256b3db32c0185305e738cc3a47ce96e9f250b0f47a7b95a60221ef30f40338d9d7
SHA51201964ee4537c74df02ac626f73bb3421eedde9b560b738edc2a636ed28b807138419b2045ed71393c0f266ec3a1a0586a9611ee293b6c38e1bfe2a5aee7be1bc
-
Filesize
203B
MD50396a7b451eefc3a38d7cdfd9de6934f
SHA17199144c1f123d71f860a045ec1ae17c49f09b82
SHA25653d8e2d8f877e1390c2d4eee565b9aa399dfe6b233b930ee881fcdfb61da1959
SHA512c78630fffb923e643f7d1cb948d7e64002b7933f8eafdfc0517fe0b3c6e5129687c91914698323564c23635dd1b0e47ef399cef02e2ebb478657fbd3d6c3b4b8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f6acf96f0cfeb03ac30cfbd84fbac2eb
SHA195690099ac6c74fc4c515cd08a04c97631cf51cf
SHA256e8a7d07ed006af7bc9dee7fa42860e49d1747eb9539cbbc29478a469a14c069e
SHA512db703469e5096403486796623cb4fb9911732005ff7d58e1c2aafb5e7b38b11219e58db5169969dbefbabecf0726d0561687bcb15aff667cad3ecca3711fad19