Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 20:56
Static task
static1
Behavioral task
behavioral1
Sample
64bddc45dfdb369ad85f851fa1ba53c8_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
64bddc45dfdb369ad85f851fa1ba53c8_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
64bddc45dfdb369ad85f851fa1ba53c8_JaffaCakes118.html
-
Size
4KB
-
MD5
64bddc45dfdb369ad85f851fa1ba53c8
-
SHA1
3e79c75e07832113fd8a8923dd9a6f87dc439c88
-
SHA256
1dc80f9899890885dfbe89bfb9c147e33c683609521a07a5af702f5ba4d401f1
-
SHA512
908909937f48edbf8065551fecb8f9a5a97fe10fe58e46fa3626c35d2eca32b53da9ab95271ea26ee72cc061b0e837bdb854913707fbd026056f3cf8d288018b
-
SSDEEP
96:CH0n6t7gVRf7gVi7gVD7gVc7gVB7gVO7gVCT5o2Db8FmFbK4l6ovYdR066:CH+a2Db8FmFnsWWy
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 4072 msedge.exe 4072 msedge.exe 2008 msedge.exe 2008 msedge.exe 1120 identity_helper.exe 1120 identity_helper.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 2008 wrote to memory of 1624 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 1624 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 1088 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 1088 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 1088 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 1088 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 1088 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 1088 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 1088 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 1088 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 1088 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 1088 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 1088 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 1088 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 1088 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 1088 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 1088 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 1088 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 1088 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 1088 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 1088 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 1088 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 1088 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 1088 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 1088 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 1088 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 1088 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 1088 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 1088 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 1088 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 1088 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 1088 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 1088 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 1088 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 1088 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 1088 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 1088 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 1088 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 1088 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 1088 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 1088 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 1088 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 4072 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 4072 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 4776 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 4776 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 4776 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 4776 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 4776 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 4776 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 4776 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 4776 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 4776 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 4776 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 4776 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 4776 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 4776 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 4776 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 4776 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 4776 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 4776 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 4776 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 4776 2008 msedge.exe msedge.exe PID 2008 wrote to memory of 4776 2008 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\64bddc45dfdb369ad85f851fa1ba53c8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe8e0146f8,0x7ffe8e014708,0x7ffe8e0147182⤵PID:1624
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,9122757016339786393,16209354994493688945,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1996 /prefetch:22⤵PID:1088
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1984,9122757016339786393,16209354994493688945,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4072 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1984,9122757016339786393,16209354994493688945,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:4776
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,9122757016339786393,16209354994493688945,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4828
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,9122757016339786393,16209354994493688945,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4524
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1984,9122757016339786393,16209354994493688945,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4568 /prefetch:82⤵PID:436
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1984,9122757016339786393,16209354994493688945,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4568 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1120 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,9122757016339786393,16209354994493688945,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:2992
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,9122757016339786393,16209354994493688945,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:4576
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,9122757016339786393,16209354994493688945,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:12⤵PID:4996
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,9122757016339786393,16209354994493688945,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:12⤵PID:1472
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,9122757016339786393,16209354994493688945,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3768
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4624
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
5KB
MD5a3f657b9ec987e425ac25b88d060f31e
SHA1ab71191eba28d4071e1cf18d60303d612d466f3f
SHA256b91d60ad2f9dfb6e01ef40a0905b8d5e198891f8a98b1fc7e92810c7ae0aa694
SHA51281ee9e600e5398ce474f7b64be2b7c2d4144b5db98dfbba003522c70a3a681b4f2823563b9502d0e9611fc8c719df1f594d3b6337ba627f73f1f526d3acd9747
-
Filesize
6KB
MD59c5702742c94a472688e43cb4ed8c5df
SHA1bcc208a4a245da0bab77283cc6366501c64f20e3
SHA256a016d4e67e7e02acc80f41ed1ce5eaa0d033df134d75771aa5ba0dd57f858112
SHA512104233d55dfd8fa0056b6d2840568f1fe72e6eab0bb141f3265a7a57bdac23160f068170d0d82054e8e2ef1c804cb456a81f23a633f1dd02f5bcf37e22d446cb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5dd0f5a9bfaa6985657626ef502eac8fd
SHA1f202fd84fa50e002a1e6712db3de238f5b0d3024
SHA256bdadf0814067625bcfd064aede2d790e5f600922816f4396d796da8c9e52499d
SHA51275ac8620c30d6d6bf9ca50df6dfe3f7eaa9f973bcf157aa31e1d3634e77fb07c3f091eacd1a045194409f2578a42a5201b6845fe9e695d712a9e6def4c5ffa6c
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e