Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 22:16
Static task
static1
Behavioral task
behavioral1
Sample
68d3369d735c3417fc3de00a232ad4f8_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
68d3369d735c3417fc3de00a232ad4f8_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68d3369d735c3417fc3de00a232ad4f8_JaffaCakes118.html
-
Size
218KB
-
MD5
68d3369d735c3417fc3de00a232ad4f8
-
SHA1
1fd76a1cbf6beccbb6557b2f2b2bd0ecebcc33be
-
SHA256
84d207d0379e09a3cd6924ee5ab9e4c101b4e78e6ce763ecb74bac57a12fc9e9
-
SHA512
9ea7c92af5ad82ccb51d490023aa0f21e0f1da9e2873e77a62fc019d457d1ef9513860b943f302d0ef664f2e39ddf09db31caaca5bee79ca76c6ee9dab8ef0a5
-
SSDEEP
3072:SwHoBcXH+wZHoyfkMY+BES09JXAnyrZalI+YQ:SwHoWXH+0HlsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
msedge.exemsedge.exemsedge.exepid process 1272 msedge.exe 1272 msedge.exe 3496 msedge.exe 3496 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
msedge.exepid process 3496 msedge.exe 3496 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3496 wrote to memory of 2552 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 2552 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 2128 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 2128 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 2128 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 2128 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 2128 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 2128 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 2128 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 2128 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 2128 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 2128 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 2128 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 2128 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 2128 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 2128 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 2128 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 2128 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 2128 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 2128 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 2128 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 2128 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 2128 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 2128 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 2128 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 2128 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 2128 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 2128 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 2128 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 2128 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 2128 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 2128 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 2128 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 2128 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 2128 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 2128 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 2128 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 2128 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 2128 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 2128 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 2128 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 2128 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 1272 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 1272 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 4484 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 4484 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 4484 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 4484 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 4484 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 4484 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 4484 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 4484 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 4484 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 4484 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 4484 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 4484 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 4484 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 4484 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 4484 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 4484 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 4484 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 4484 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 4484 3496 msedge.exe msedge.exe PID 3496 wrote to memory of 4484 3496 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\68d3369d735c3417fc3de00a232ad4f8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcaaf146f8,0x7ffcaaf14708,0x7ffcaaf147182⤵PID:2552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,4377599616128978950,3500848408451864705,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:2128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,4377599616128978950,3500848408451864705,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,4377599616128978950,3500848408451864705,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,4377599616128978950,3500848408451864705,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,4377599616128978950,3500848408451864705,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:1620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,4377599616128978950,3500848408451864705,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3068 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2416
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2484
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
5KB
MD59545e8f05ff2068858ff66c44c169fc2
SHA1fc25a4e6a4ab343ac95a9422834ac9eb78240301
SHA256abb2e000fe77c24c18c751a7157c70af888ded40e93329c61c84bea061e2d5d6
SHA5124866b7c1b95d2fd7b9641ef2db956b234b3b4dab3e49c3f5113e97cd00b5afa024fcb83d536802958bb0779c91c9c1ea2ae59f94e1038fccc3c8640e1f7322a2
-
Filesize
6KB
MD5ef6d17d5300a30a8fa2b39773bc78ad7
SHA1910db6f66e07a32ea96d52f0dac7fa6e14b153e0
SHA25637d16e7d20c09b57b36f4bbad45d2bac310556f4e74e95e25b7a6a6b942b1851
SHA5129140fe7ffa9bf8e823824c0586fbc12e9697c9d537117e71746d5cdbf25238eed73368e542268ea1e3e5ac74974c9cbcee3fb41501a7be508b29f95ac51df25a
-
Filesize
11KB
MD5f7e8fb2c1be886c0f294b0322c0c61b9
SHA18bb95f7d9614e49caf0855699f07ccd66733fb56
SHA256abd407f4bd1ffe1835fa2460c45a24b467c8d4f87a7ac6a62809410df5e0981c
SHA512d2520b807fb4a4552d633bdbb82f9dc160aabe1bd1e8a8165bd6f5d872cfdb002bf6067e2f387201c89a82f81212acbc924bd498363bd51d9de968dcc540ec96
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e