Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 19:25
Static task
static1
Behavioral task
behavioral1
Sample
647a73d40031c1e45228d7dfa782454a_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
647a73d40031c1e45228d7dfa782454a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
647a73d40031c1e45228d7dfa782454a_JaffaCakes118.html
-
Size
4KB
-
MD5
647a73d40031c1e45228d7dfa782454a
-
SHA1
35727c87594a78074b72ea0ef71ea440ecbcf505
-
SHA256
f2ea927011b870bf852cf6ff550b6da9967376813a6e6762a9f0b6d964aa8d86
-
SHA512
50378501acaaf06cb9ae64abd141ed5b00c5262e3e529e24d15ea02c94d609df87548ccd657b0e918df2d3b9c62e265f8700f4d510bd7de84af1814ab29d2659
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8otqYd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDe
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 1436 msedge.exe 1436 msedge.exe 2776 msedge.exe 2776 msedge.exe 1052 identity_helper.exe 1052 identity_helper.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 2776 wrote to memory of 2004 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 2004 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1528 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1528 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1528 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1528 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1528 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1528 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1528 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1528 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1528 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1528 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1528 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1528 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1528 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1528 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1528 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1528 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1528 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1528 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1528 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1528 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1528 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1528 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1528 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1528 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1528 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1528 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1528 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1528 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1528 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1528 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1528 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1528 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1528 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1528 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1528 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1528 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1528 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1528 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1528 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1528 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1436 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1436 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1404 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1404 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1404 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1404 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1404 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1404 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1404 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1404 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1404 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1404 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1404 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1404 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1404 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1404 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1404 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1404 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1404 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1404 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1404 2776 msedge.exe msedge.exe PID 2776 wrote to memory of 1404 2776 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\647a73d40031c1e45228d7dfa782454a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc19cc46f8,0x7ffc19cc4708,0x7ffc19cc47182⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,17965794238890973977,17449058990038960909,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,17965794238890973977,17449058990038960909,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,17965794238890973977,17449058990038960909,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2524 /prefetch:82⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17965794238890973977,17449058990038960909,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17965794238890973977,17449058990038960909,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,17965794238890973977,17449058990038960909,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5236 /prefetch:82⤵PID:3768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,17965794238890973977,17449058990038960909,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5236 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17965794238890973977,17449058990038960909,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:2744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17965794238890973977,17449058990038960909,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17965794238890973977,17449058990038960909,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17965794238890973977,17449058990038960909,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:2128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,17965794238890973977,17449058990038960909,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1940 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:820
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1256
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4500
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
292B
MD5466ddffaa44ac44567d137894cb3bd3a
SHA1ee75b555a6ff0f010792e73ecd78bebe310f3bdf
SHA2564048f4b39df0d5158a5a2d51fa21e123a9d8bdb5388e7a04d51fb5450cb025e1
SHA51227e6a86c0781ea9ceacf050a6410cba0b2ffb2005d7f04962fdd1cb050e530c7326e2139c70dd48cfa6a042db439d22bcffb63d43caf503913866f6e5568677a
-
Filesize
5KB
MD5d949aacf201c210b446f61db47c6e92e
SHA1084d3aafc40c72ab18196e0290d1bc583e1579a0
SHA256fb7c77a34cc703e4d7c9117b462c5ab0a19a43f2e480ec6e077291f0c25c97cc
SHA5123e135ef60ccea331ccec3ba20f231755ed26853b082ba1257ee0a45fe3aa41f09d11df3066cc3c5e5ff29cec3e9336d0c2942d631bfc0389e17d702e5063bf1f
-
Filesize
6KB
MD5ad32dbd46b2a5d216d8552481ba8ca84
SHA13b956732382203fc99b0647003a906e50d18d15b
SHA2567913395148a439c7b60ca99b03a82c78978abf2c151e171698e6f521334bbc7e
SHA512a0b83ae51ea47cfc26c7741ea4535e9844ef5607ba4d0e1379589f0752c6dcf0dadba47e201f26f81a247deda2aafe3494ba5297717e103f4ecc5801cf30a493
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b9f7034fd7b629e56b175cb40691aa67
SHA1d2d45253192930c105f9d74394abe7bc953e9e84
SHA256de9afcc2d2d33ab815c564739b4a857ae197f5133db9d5f1e792208fdf315031
SHA512fcb7570f4c52962c5e49de91caf9b3139b933855f80eb58abc44629531280080c2aa8a117114ec43f7562a743ebd64ffeaf07bff16c4993e72d71c37e5b93c75
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e