Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 22:16
Static task
static1
Behavioral task
behavioral1
Sample
68d2d7ee2eccdd1cdb8baa370a765c79_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
68d2d7ee2eccdd1cdb8baa370a765c79_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68d2d7ee2eccdd1cdb8baa370a765c79_JaffaCakes118.html
-
Size
100KB
-
MD5
68d2d7ee2eccdd1cdb8baa370a765c79
-
SHA1
787dd0c0de792b893e03c30e2f2220a96c891160
-
SHA256
6e971cbcf8245bbede48791b5f8c8853779db094d44727ae3c2d7b73aa0a4b8f
-
SHA512
7380f30a6dfa9b7090f9c3525ebd7dbd45a94b4167d3c643518864e3089f1ba4209ae4c2421e589a545d527c1e7a6a86351b2c6e013c64dc0d4b93f4eca61b14
-
SSDEEP
1536:XO+h+MmlgohqrVSzitBu0ir7FrkYcAgFqrfMS126sUHMA0oUIQy6ey/Klln/FUaH:pkVl7hQZLAhwyq7+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 4316 msedge.exe 4316 msedge.exe 5032 msedge.exe 5032 msedge.exe 2696 identity_helper.exe 2696 identity_helper.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 5032 wrote to memory of 876 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 876 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4580 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4580 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4580 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4580 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4580 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4580 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4580 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4580 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4580 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4580 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4580 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4580 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4580 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4580 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4580 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4580 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4580 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4580 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4580 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4580 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4580 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4580 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4580 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4580 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4580 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4580 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4580 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4580 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4580 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4580 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4580 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4580 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4580 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4580 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4580 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4580 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4580 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4580 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4580 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4580 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4316 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4316 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4296 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4296 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4296 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4296 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4296 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4296 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4296 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4296 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4296 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4296 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4296 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4296 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4296 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4296 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4296 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4296 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4296 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4296 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4296 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4296 5032 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\68d2d7ee2eccdd1cdb8baa370a765c79_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8ad3946f8,0x7ff8ad394708,0x7ff8ad3947182⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,12429645817577987693,805042237839676537,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,12429645817577987693,805042237839676537,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2332 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,12429645817577987693,805042237839676537,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:82⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,12429645817577987693,805042237839676537,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,12429645817577987693,805042237839676537,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,12429645817577987693,805042237839676537,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6016 /prefetch:82⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,12429645817577987693,805042237839676537,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6016 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,12429645817577987693,805042237839676537,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,12429645817577987693,805042237839676537,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:12⤵PID:2652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,12429645817577987693,805042237839676537,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4552 /prefetch:12⤵PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,12429645817577987693,805042237839676537,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3980 /prefetch:12⤵PID:364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,12429645817577987693,805042237839676537,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4884 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2112
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5076
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5db7d2fb6f49f105540281659345a16e2
SHA1d79498eb3efc2fa41ddfc107e6ff14342f14c2c8
SHA256a04a69a0945f7ab17d52f964e09f9117ab61360cdabdfd4b8572197aba3d3337
SHA51282b3a2a3ee60dd349ad4d0212e950b975dd31cf1607192651a2ed7c2c529a855a4c4a975183a2feaf0e375923754aa1bc2a791b4c385c30cc103bdde401d836b
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
180B
MD5e75179806fdb60b3337e8cd5b04cd6cf
SHA1434a695c7607996cc4d1a0698d9214afe4d9fd38
SHA256a121c6f8b11a0682ab639049f50ef2a1b00b3a2a565d7686cc64f501056b7b19
SHA512e1e2f888005696fb33453f369efda963c71c15270338db02d812a1ad503c1dfd2a0f693c3f6a02ca2abb7cad631524b0481141646353c7b39adf44b09bf8464f
-
Filesize
6KB
MD5c376f032b3ef89b6dd4d6fedd17512c5
SHA168892ccb963fb1666950e4fbc5a18cb9e0e34efc
SHA2562fd6f76f6c92e6dfff0185311225d022736d03203a028fd7c5d7bf0756baa654
SHA51221704f9035ffe72fab44e3c55547f537bba9b39ee103ca7733c429da3ab04b71d1189d11008bff8c9b47bc302a7faf84d5e8062cb8294214e190590e06a6ee24
-
Filesize
5KB
MD5a557c1c1c2984952c7b0c8e26346c1d3
SHA1c21866f9427115e0c62637bb762407ab09d10d80
SHA256f4e52ac0faa5d713fa73fb62c556434b7c111d82da25496410ad676df43d3bbd
SHA5126a8e67124e542c0a94452a243bc61afaeae672c3299bb15c4ea48d0ecbfffd34cae5b6f97d48c780f8de6abcfb935c55284b41174ef78e8c858b013e79bbdfe9
-
Filesize
372B
MD5fe9fb9d74d78c01963b9eb5c0fe4e07b
SHA143ddd3ee00c518527d278298179bb616ed29bd34
SHA256e1386fd7b58b038c7eb42b73bc37cfc8d9bda324b85ddc572f2efacd34d7c060
SHA51208930b0fe67879f3f7a7b6317a94a05c4476d243c9b1d13fb0f987ae3f917d46d97cb1ed512bfc6828c280ceaf281433532ce61f1fd968a8985f2db23fb0f9cb
-
Filesize
372B
MD5bac728a30aaeb574e21ff318a1a3ee53
SHA17e106b8166f62d8acd03da2f97d3bd72c69a1dbc
SHA256743e790d535d38533a1c56883434d6a4a3cebf0642a9b42cf787ce937dec5bfd
SHA512d502565b88f309ba8f27b6cb7879d1b3c274621bfd1b07a33d1cdfc2678f1c13067b2b715f6b1869b7166b9746ea5e7c80cad4f1836f5f138c7f8afc4a30cddd
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e