Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 20:00
Static task
static1
Behavioral task
behavioral1
Sample
64944351ef9eb70e75960107f6242c25_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
64944351ef9eb70e75960107f6242c25_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
64944351ef9eb70e75960107f6242c25_JaffaCakes118.html
-
Size
460KB
-
MD5
64944351ef9eb70e75960107f6242c25
-
SHA1
7fc07cd2eaa403a9b96e2aa4b8eff17f10a8ea6d
-
SHA256
6f7ec1f0e23b6a2c91b811951bd59548a63648ccd10c1a91f64416aff082f01a
-
SHA512
514bac3442f2531dcb0309538cfc0b2523e3d8f9da3dc4132d152bec6c1dcda84a519f01dd43c5d98ca72afdf2e9abc3282d02348dc2540a684c54dcdbd4bbff
-
SSDEEP
6144:S+sMYod+X3oI+YdwsMYod+X3oI+YBsMYod+X3oI+YLsMYod+X3oI+YQ:j5d+X3u5d+X3X5d+X315d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3156 msedge.exe 3156 msedge.exe 4196 msedge.exe 4196 msedge.exe 3468 identity_helper.exe 3468 identity_helper.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4196 wrote to memory of 2752 4196 msedge.exe 82 PID 4196 wrote to memory of 2752 4196 msedge.exe 82 PID 4196 wrote to memory of 1488 4196 msedge.exe 83 PID 4196 wrote to memory of 1488 4196 msedge.exe 83 PID 4196 wrote to memory of 1488 4196 msedge.exe 83 PID 4196 wrote to memory of 1488 4196 msedge.exe 83 PID 4196 wrote to memory of 1488 4196 msedge.exe 83 PID 4196 wrote to memory of 1488 4196 msedge.exe 83 PID 4196 wrote to memory of 1488 4196 msedge.exe 83 PID 4196 wrote to memory of 1488 4196 msedge.exe 83 PID 4196 wrote to memory of 1488 4196 msedge.exe 83 PID 4196 wrote to memory of 1488 4196 msedge.exe 83 PID 4196 wrote to memory of 1488 4196 msedge.exe 83 PID 4196 wrote to memory of 1488 4196 msedge.exe 83 PID 4196 wrote to memory of 1488 4196 msedge.exe 83 PID 4196 wrote to memory of 1488 4196 msedge.exe 83 PID 4196 wrote to memory of 1488 4196 msedge.exe 83 PID 4196 wrote to memory of 1488 4196 msedge.exe 83 PID 4196 wrote to memory of 1488 4196 msedge.exe 83 PID 4196 wrote to memory of 1488 4196 msedge.exe 83 PID 4196 wrote to memory of 1488 4196 msedge.exe 83 PID 4196 wrote to memory of 1488 4196 msedge.exe 83 PID 4196 wrote to memory of 1488 4196 msedge.exe 83 PID 4196 wrote to memory of 1488 4196 msedge.exe 83 PID 4196 wrote to memory of 1488 4196 msedge.exe 83 PID 4196 wrote to memory of 1488 4196 msedge.exe 83 PID 4196 wrote to memory of 1488 4196 msedge.exe 83 PID 4196 wrote to memory of 1488 4196 msedge.exe 83 PID 4196 wrote to memory of 1488 4196 msedge.exe 83 PID 4196 wrote to memory of 1488 4196 msedge.exe 83 PID 4196 wrote to memory of 1488 4196 msedge.exe 83 PID 4196 wrote to memory of 1488 4196 msedge.exe 83 PID 4196 wrote to memory of 1488 4196 msedge.exe 83 PID 4196 wrote to memory of 1488 4196 msedge.exe 83 PID 4196 wrote to memory of 1488 4196 msedge.exe 83 PID 4196 wrote to memory of 1488 4196 msedge.exe 83 PID 4196 wrote to memory of 1488 4196 msedge.exe 83 PID 4196 wrote to memory of 1488 4196 msedge.exe 83 PID 4196 wrote to memory of 1488 4196 msedge.exe 83 PID 4196 wrote to memory of 1488 4196 msedge.exe 83 PID 4196 wrote to memory of 1488 4196 msedge.exe 83 PID 4196 wrote to memory of 1488 4196 msedge.exe 83 PID 4196 wrote to memory of 3156 4196 msedge.exe 84 PID 4196 wrote to memory of 3156 4196 msedge.exe 84 PID 4196 wrote to memory of 4060 4196 msedge.exe 85 PID 4196 wrote to memory of 4060 4196 msedge.exe 85 PID 4196 wrote to memory of 4060 4196 msedge.exe 85 PID 4196 wrote to memory of 4060 4196 msedge.exe 85 PID 4196 wrote to memory of 4060 4196 msedge.exe 85 PID 4196 wrote to memory of 4060 4196 msedge.exe 85 PID 4196 wrote to memory of 4060 4196 msedge.exe 85 PID 4196 wrote to memory of 4060 4196 msedge.exe 85 PID 4196 wrote to memory of 4060 4196 msedge.exe 85 PID 4196 wrote to memory of 4060 4196 msedge.exe 85 PID 4196 wrote to memory of 4060 4196 msedge.exe 85 PID 4196 wrote to memory of 4060 4196 msedge.exe 85 PID 4196 wrote to memory of 4060 4196 msedge.exe 85 PID 4196 wrote to memory of 4060 4196 msedge.exe 85 PID 4196 wrote to memory of 4060 4196 msedge.exe 85 PID 4196 wrote to memory of 4060 4196 msedge.exe 85 PID 4196 wrote to memory of 4060 4196 msedge.exe 85 PID 4196 wrote to memory of 4060 4196 msedge.exe 85 PID 4196 wrote to memory of 4060 4196 msedge.exe 85 PID 4196 wrote to memory of 4060 4196 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\64944351ef9eb70e75960107f6242c25_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffceba246f8,0x7ffceba24708,0x7ffceba247182⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1516,13114214637893728583,10373794547617265240,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1516,13114214637893728583,10373794547617265240,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2500 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1516,13114214637893728583,10373794547617265240,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:82⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1516,13114214637893728583,10373794547617265240,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1516,13114214637893728583,10373794547617265240,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1516,13114214637893728583,10373794547617265240,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 /prefetch:82⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1516,13114214637893728583,10373794547617265240,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1516,13114214637893728583,10373794547617265240,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1516,13114214637893728583,10373794547617265240,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1516,13114214637893728583,10373794547617265240,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:12⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1516,13114214637893728583,10373794547617265240,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:12⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1516,13114214637893728583,10373794547617265240,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1856 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1484
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4028
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3664
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
5KB
MD58c06a662703c38fcf23dfd5ac8ca1cf4
SHA1afb1724203a09b8fe3c4a07863ea1d76d0aaa9cc
SHA256986003b3aa1e250e6089005c8a1f70755e7f36da04708812e97091a867c4c5b9
SHA512e59a0b939b3d56895c88afc2458d6cec6e952258b251ba9ef559186f2f46f24ed8f1d837c5c618f37ff63f1313e6de08603252f147faaf81efafeca430e25c62
-
Filesize
6KB
MD5645e83e5898b33a2bb58a8378bf10adb
SHA1f78dc256a039d668f242b6c23147bc713131238b
SHA2560af71013f6d2419d6312988dc8b9d5d2e909f02522be953b1efd9d4ded9b028c
SHA512299d252873aec08d05000a47dd3cb8b1fee73838286b07a5d7d66a8d1c8ba462eb8b75bbc1352313e99ad62c0e12719c1a9b7b284b51cbd09d61565d2c97067f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD53cb36c00deb81f301f3b25dd70d5fd2e
SHA11ed96fca803720f9e2fa8370d1a63c97620c05b3
SHA25641d16be72301a4da1d53f40d198890a88cf78b8bd6da9a213d1973f4a5656d26
SHA512fadd03c2c61f4d9c1050080b3537fda56a6fdea27ffe1fd13f9f5612bff063da60669a46913beef97e0b81b0fe9f7b47db615d69341eff09b578deac44e783c3