Analysis
-
max time kernel
142s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 19:22
Static task
static1
Behavioral task
behavioral1
Sample
647820b8342ac8e803e9f8429c090b12_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
647820b8342ac8e803e9f8429c090b12_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
647820b8342ac8e803e9f8429c090b12_JaffaCakes118.html
-
Size
85KB
-
MD5
647820b8342ac8e803e9f8429c090b12
-
SHA1
89a635b18224e8ea45b22684b72a4af7175efb8b
-
SHA256
f7fbd329e0515e179ef0e8cb937211c7a9ee8d1d75eab64bc13997413a2752b2
-
SHA512
57afe5479690c818edbfcd0aa2dd789e60f66ebf396f8a2ee33097cba930ae0426067e87563c3c634077888a93cb454ccec6d5598e5e1334d05c935b5bd31a4a
-
SSDEEP
1536:mQcu0dyFR178/+TsQLCVcKpCp/BA30kCdQtpQ5FBE0K:mQcu0ibI/78C30kgQnQm0K
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exepid process 4780 msedge.exe 4780 msedge.exe 4708 msedge.exe 4708 msedge.exe 4624 identity_helper.exe 4624 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
Processes:
msedge.exepid process 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
msedge.exepid process 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4708 wrote to memory of 764 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 764 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 436 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 436 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 436 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 436 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 436 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 436 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 436 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 436 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 436 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 436 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 436 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 436 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 436 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 436 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 436 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 436 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 436 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 436 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 436 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 436 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 436 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 436 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 436 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 436 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 436 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 436 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 436 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 436 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 436 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 436 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 436 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 436 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 436 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 436 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 436 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 436 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 436 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 436 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 436 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 436 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 4780 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 4780 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 2112 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 2112 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 2112 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 2112 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 2112 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 2112 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 2112 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 2112 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 2112 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 2112 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 2112 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 2112 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 2112 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 2112 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 2112 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 2112 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 2112 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 2112 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 2112 4708 msedge.exe msedge.exe PID 4708 wrote to memory of 2112 4708 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\647820b8342ac8e803e9f8429c090b12_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff8c3c46f8,0x7fff8c3c4708,0x7fff8c3c47182⤵PID:764
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,11230098318508494904,11378399646519659445,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:436
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2192,11230098318508494904,11378399646519659445,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4780 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2192,11230098318508494904,11378399646519659445,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:2112
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,11230098318508494904,11378399646519659445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:3536
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,11230098318508494904,11378399646519659445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:4960
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,11230098318508494904,11378399646519659445,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 /prefetch:82⤵PID:4428
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,11230098318508494904,11378399646519659445,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4624 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,11230098318508494904,11378399646519659445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:700
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,11230098318508494904,11378399646519659445,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:4416
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,11230098318508494904,11378399646519659445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:2240
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,11230098318508494904,11378399646519659445,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4036 /prefetch:12⤵PID:2620
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,11230098318508494904,11378399646519659445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3824 /prefetch:12⤵PID:3304
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,11230098318508494904,11378399646519659445,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4904 /prefetch:12⤵PID:2644
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1136
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
264KB
MD52e251304a2f018f0d65ac54ce5d4e6f0
SHA180d1cb56f8d7ef59301a33d710c431364323313d
SHA25608b8f681946778875455b96f2a0e0267ef9160c6f3475e0bb7fed973b0440005
SHA512fb31549667eb5cde0e81680651d1f204013f6300cfc92e67b4dc293794754073901463e36c27ac9341dc6230a3583039c1f8a38acf4a87de682fb173516c7936
-
Filesize
5KB
MD58731de325d1f4339c2d6cddf0241cc9f
SHA1a9f6543607428fde4321d261b633ff1fd283cb1d
SHA256b27c4e82fcdc060534558249ba00444f44b2ef91f7b4fb52ad9394500ba15861
SHA5124e872f981b1691450eed631b4eca4ca39921fd1c6d476b6808f5485ce1f3cfec2eb99509decd03215a024fd141e56b22a45d868fab114a64640ed4d3ed54d00e
-
Filesize
6KB
MD5928ddf5b9215fa1a39c66d0966655869
SHA12a4d4ad3b5c4ede4804ecf1832359e4065b8857c
SHA2564569517231d58db97fdaaf58dae22b1e2f0f12cd06acd9dac5b71cdc2c557419
SHA512137b111a6ebe946bbb95be6e7a86b639adaabb5983bab942ddd3ba0c805a7bffbbf7f4383b1a1c1039d588c5231fcaa702bbedbecd7c5200e8984441fbea2fe1
-
Filesize
6KB
MD5985ca812b7fdfa7fde03cf1e1d1f38b2
SHA14cf7674592ad1ff6c848e60788e88f2c95896412
SHA25611cd461c33b1dcac4cef1a4a4e08557c4d9129ca497c008d08f658b88d3f172c
SHA51207b3629ea3b7d6f40443fc11e6629d5b914c6bb9ea5347f020fbaae3223c89aa787cb5ee57aff67c1f133c6753bde48b82f338aea77de0a1298ce9ed032d51d3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD5504680645559e15176772ebe864b4484
SHA18e85729e119c10c82b4609591158f691a03de5cd
SHA256f5e154faece41ba389bad9f0295e08bec856c84df7a3ee0edee3cf0d04be971c
SHA5129e6409a3a86484ff712051d3083ac28896fac54d2309a09e175dee6e9a24911c3591e170c376799194106905223638d5eaea452ae5b1a47527acf5a50be11153
-
Filesize
11KB
MD51ebe8ab69d26a59101a81aa720c4c65d
SHA1c979831344a367df39d36c84e9aec0a99d409713
SHA2563ce9b7481b7b8d97e6f6e598f997e5e239bddd6fa95b7f6367985ad4f26d130c
SHA512ce5d76fa436e20800f33515a203227f5227b4047cfab79c0de2a5904c1d3faa3b0a3956d76934fd169e478728c3c8607602874ed95b028ac8f3288165c6c1dcd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e