Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 21:19
Static task
static1
Behavioral task
behavioral1
Sample
64cd7aa28a2477fb76b13fc6fe733a38_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
64cd7aa28a2477fb76b13fc6fe733a38_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
64cd7aa28a2477fb76b13fc6fe733a38_JaffaCakes118.html
-
Size
101KB
-
MD5
64cd7aa28a2477fb76b13fc6fe733a38
-
SHA1
fd59fd67fefbdd653db26cc8703d23c887ad3206
-
SHA256
47f94c7446a9ea8c1daa55d8847bfa99c917c2bceb332919a3742c5666a18f0e
-
SHA512
4fb906870cbd6267a9a92f2814b269b6f2318776cdd2004945c3571953f22d9d3cb24d8de8f3148ce34138131dac4b0c22df9f748c9c47aee7d203c71c11b67a
-
SSDEEP
1536:nIHYM3QjrcmTTbbhh22OU7V/nb/9kE7Rc5NeZofhND/37bAXQiLK:IHYMCb/9kqRyKCr37bAXTLK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4936 msedge.exe 4936 msedge.exe 3160 msedge.exe 3160 msedge.exe 3408 identity_helper.exe 3408 identity_helper.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3160 wrote to memory of 548 3160 msedge.exe 82 PID 3160 wrote to memory of 548 3160 msedge.exe 82 PID 3160 wrote to memory of 412 3160 msedge.exe 83 PID 3160 wrote to memory of 412 3160 msedge.exe 83 PID 3160 wrote to memory of 412 3160 msedge.exe 83 PID 3160 wrote to memory of 412 3160 msedge.exe 83 PID 3160 wrote to memory of 412 3160 msedge.exe 83 PID 3160 wrote to memory of 412 3160 msedge.exe 83 PID 3160 wrote to memory of 412 3160 msedge.exe 83 PID 3160 wrote to memory of 412 3160 msedge.exe 83 PID 3160 wrote to memory of 412 3160 msedge.exe 83 PID 3160 wrote to memory of 412 3160 msedge.exe 83 PID 3160 wrote to memory of 412 3160 msedge.exe 83 PID 3160 wrote to memory of 412 3160 msedge.exe 83 PID 3160 wrote to memory of 412 3160 msedge.exe 83 PID 3160 wrote to memory of 412 3160 msedge.exe 83 PID 3160 wrote to memory of 412 3160 msedge.exe 83 PID 3160 wrote to memory of 412 3160 msedge.exe 83 PID 3160 wrote to memory of 412 3160 msedge.exe 83 PID 3160 wrote to memory of 412 3160 msedge.exe 83 PID 3160 wrote to memory of 412 3160 msedge.exe 83 PID 3160 wrote to memory of 412 3160 msedge.exe 83 PID 3160 wrote to memory of 412 3160 msedge.exe 83 PID 3160 wrote to memory of 412 3160 msedge.exe 83 PID 3160 wrote to memory of 412 3160 msedge.exe 83 PID 3160 wrote to memory of 412 3160 msedge.exe 83 PID 3160 wrote to memory of 412 3160 msedge.exe 83 PID 3160 wrote to memory of 412 3160 msedge.exe 83 PID 3160 wrote to memory of 412 3160 msedge.exe 83 PID 3160 wrote to memory of 412 3160 msedge.exe 83 PID 3160 wrote to memory of 412 3160 msedge.exe 83 PID 3160 wrote to memory of 412 3160 msedge.exe 83 PID 3160 wrote to memory of 412 3160 msedge.exe 83 PID 3160 wrote to memory of 412 3160 msedge.exe 83 PID 3160 wrote to memory of 412 3160 msedge.exe 83 PID 3160 wrote to memory of 412 3160 msedge.exe 83 PID 3160 wrote to memory of 412 3160 msedge.exe 83 PID 3160 wrote to memory of 412 3160 msedge.exe 83 PID 3160 wrote to memory of 412 3160 msedge.exe 83 PID 3160 wrote to memory of 412 3160 msedge.exe 83 PID 3160 wrote to memory of 412 3160 msedge.exe 83 PID 3160 wrote to memory of 412 3160 msedge.exe 83 PID 3160 wrote to memory of 4936 3160 msedge.exe 84 PID 3160 wrote to memory of 4936 3160 msedge.exe 84 PID 3160 wrote to memory of 3448 3160 msedge.exe 85 PID 3160 wrote to memory of 3448 3160 msedge.exe 85 PID 3160 wrote to memory of 3448 3160 msedge.exe 85 PID 3160 wrote to memory of 3448 3160 msedge.exe 85 PID 3160 wrote to memory of 3448 3160 msedge.exe 85 PID 3160 wrote to memory of 3448 3160 msedge.exe 85 PID 3160 wrote to memory of 3448 3160 msedge.exe 85 PID 3160 wrote to memory of 3448 3160 msedge.exe 85 PID 3160 wrote to memory of 3448 3160 msedge.exe 85 PID 3160 wrote to memory of 3448 3160 msedge.exe 85 PID 3160 wrote to memory of 3448 3160 msedge.exe 85 PID 3160 wrote to memory of 3448 3160 msedge.exe 85 PID 3160 wrote to memory of 3448 3160 msedge.exe 85 PID 3160 wrote to memory of 3448 3160 msedge.exe 85 PID 3160 wrote to memory of 3448 3160 msedge.exe 85 PID 3160 wrote to memory of 3448 3160 msedge.exe 85 PID 3160 wrote to memory of 3448 3160 msedge.exe 85 PID 3160 wrote to memory of 3448 3160 msedge.exe 85 PID 3160 wrote to memory of 3448 3160 msedge.exe 85 PID 3160 wrote to memory of 3448 3160 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\64cd7aa28a2477fb76b13fc6fe733a38_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffedb2d46f8,0x7ffedb2d4708,0x7ffedb2d47182⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,4908223394090924301,14272892032618075329,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,4908223394090924301,14272892032618075329,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,4908223394090924301,14272892032618075329,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4908223394090924301,14272892032618075329,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4908223394090924301,14272892032618075329,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:3860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4908223394090924301,14272892032618075329,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:12⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4908223394090924301,14272892032618075329,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,4908223394090924301,14272892032618075329,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5956 /prefetch:82⤵PID:1112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,4908223394090924301,14272892032618075329,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5956 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4908223394090924301,14272892032618075329,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5944 /prefetch:12⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4908223394090924301,14272892032618075329,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4908223394090924301,14272892032618075329,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4908223394090924301,14272892032618075329,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,4908223394090924301,14272892032618075329,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4916 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1792
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5088
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
384B
MD57a4c328b1003c49b9d49bd69a271380a
SHA1ee2b3c96f729a3025843e7240600c099c39ab01b
SHA25606b52fd6d789812bb09ba08a35c576cdbf22d2210e07a6556e5e693f10bd188e
SHA512117ccaeb0679addc0a271e4fae74224efcf0edc93cf0d1cf0377b8d18815072359e74f7ef3e30d1a1ec3ddc462c13fc2706ba5749da982e8e7bc1d4aae8ff0c0
-
Filesize
5KB
MD5b8087c6714deddc7731ac6d77053abdf
SHA1f54650eb8150e2e94a88b0ea892994d6bf9d3f13
SHA256712e11cfd5d311df9eb10ab8dc9c2686a860815debcd5620ab1f5906390f2d31
SHA5126f9754edfa81eefecfe85ec9e8be1a57e0062d5db7a8a33c15b5c04844980345dab42e817bb7fe5d60df39900b118ba2eabf067ee2729bf87a537fbbbaace3ae
-
Filesize
6KB
MD5ad03e479d113f0ed0f39102b3eeae7e8
SHA136b502e6249196f77b9bf7de9b0cc91e819571c2
SHA256d29c6e9f895928b467d5e756ad09b34ab1f744f629639a1aa2193baa71149a4a
SHA512ac4e3b8df051f555d3ba8e841438fce214f370d611369fbff06902102b64240108708c054479aa43eef00bbb7612e58fee3196f6bf6eb79beaa99f827c23a8c2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD595c3018a25ac5c85d961485bf2a33846
SHA176fd5ab03815a71657649800e0832e9dc369a50f
SHA25679d48f171b4f32c96c824f5e50a510b64a81d1dbc721be69b8ca2b46e3a908f5
SHA5120afbbbeef7aa6fb21b88bedab8c1bbbea1166a156ad1b254b5361f59b12d29b005a2e1ac76bb3d718c06161f2ed9afa22366252b34e03ac64de57f4253f075d1