Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 19:20
Static task
static1
Behavioral task
behavioral1
Sample
6477567e3535cfaa7d22416b0c3e23d2_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
6477567e3535cfaa7d22416b0c3e23d2_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6477567e3535cfaa7d22416b0c3e23d2_JaffaCakes118.html
-
Size
461KB
-
MD5
6477567e3535cfaa7d22416b0c3e23d2
-
SHA1
2013bb730bf1ec10236cf4e975b5b127f9cb7586
-
SHA256
4420027109d8ba4d3755ffff561247dec668ea82f4453a5400293ddc39c935bf
-
SHA512
0aef56350fff2d51b99f5735f4f1fd2ba91701d1840a04cd4f087846d5c7811780878ba0d0376796a55b93eaa5f7000fcf3dcbf7198c9728e9a01f2ac92ac743
-
SSDEEP
6144:SRsMYod+X3oI+YXsMYod+X3oI+YSsMYod+X3oI+YLsMYod+X3oI+YQ:e5d+X3V5d+X3i5d+X315d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 4400 msedge.exe 4400 msedge.exe 2988 msedge.exe 2988 msedge.exe 4240 identity_helper.exe 4240 identity_helper.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 2988 wrote to memory of 4840 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4840 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4592 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4592 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4592 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4592 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4592 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4592 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4592 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4592 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4592 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4592 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4592 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4592 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4592 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4592 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4592 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4592 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4592 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4592 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4592 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4592 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4592 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4592 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4592 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4592 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4592 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4592 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4592 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4592 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4592 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4592 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4592 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4592 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4592 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4592 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4592 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4592 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4592 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4592 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4592 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4592 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4400 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4400 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4660 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4660 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4660 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4660 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4660 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4660 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4660 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4660 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4660 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4660 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4660 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4660 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4660 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4660 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4660 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4660 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4660 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4660 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4660 2988 msedge.exe msedge.exe PID 2988 wrote to memory of 4660 2988 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6477567e3535cfaa7d22416b0c3e23d2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc840f46f8,0x7ffc840f4708,0x7ffc840f47182⤵PID:4840
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,16044083837203021506,13820641362064369675,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:4592
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,16044083837203021506,13820641362064369675,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2400 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4400 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,16044083837203021506,13820641362064369675,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:4660
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16044083837203021506,13820641362064369675,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:5080
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16044083837203021506,13820641362064369675,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3000
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,16044083837203021506,13820641362064369675,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵PID:1388
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,16044083837203021506,13820641362064369675,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4240 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16044083837203021506,13820641362064369675,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:2144
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16044083837203021506,13820641362064369675,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:760
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16044083837203021506,13820641362064369675,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3496 /prefetch:12⤵PID:3872
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16044083837203021506,13820641362064369675,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3488 /prefetch:12⤵PID:2336
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,16044083837203021506,13820641362064369675,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4924 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3996
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5084
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
6KB
MD5cf7020bb9aed1776a885ee0a60c1b68e
SHA1a492ad98a6dfadac3c6f8494b7dcf8eee093f3b7
SHA256f8a0ef596ada1800530ddaee4ebb5bf5c57ecb791e5fbdf1aebb06eeebba2ed5
SHA512b7cfe214881e41e32055748cc71cf583ef4e74e00a749f339efe4b28d33c852f03ff767b4e67d16218faeee5254b8b39e8d74448668b2cec1b34a638e2ff2a10
-
Filesize
5KB
MD5df6aff08acb939802c75691ca267c788
SHA133035de073c686cbce6d8f113c144af000baea75
SHA256065dd82dc38c1bca1f61a6c618465f3e66b4a752e68f53b71ccdf019aeaeb7b0
SHA51235c08e80cbac6f1ef0ed16b4bc0e9d7f840c82dd9be640202bc0faff8b06f147ad6b6d65bc776db33ad29ead905ef1f0242af55bb680af1f72f60205e0ee158b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d9ea699402405c902ccacbd986c85805
SHA13c670cdecec7a4b518038ed0d958a45aaf20b89e
SHA25684e06d87edb95a4370f4598858910ee5e52c5d303d2ff979026ce64305adab10
SHA512f3f704d505b4f90963446ef63364ff1eee497f7614b62a3c1a900f2921d83d79e7d0ef3adffde9d8824193422fa919189e176b294804167ab2af216694074148
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e