Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 21:50
Static task
static1
Behavioral task
behavioral1
Sample
68c0b8ceeb79cad87460354085d6ad43_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
68c0b8ceeb79cad87460354085d6ad43_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
68c0b8ceeb79cad87460354085d6ad43_JaffaCakes118.html
-
Size
52KB
-
MD5
68c0b8ceeb79cad87460354085d6ad43
-
SHA1
58bcb305e7b38daa8f66c544c7ecb7b47edec62d
-
SHA256
24fdb3a57f70526228fa1fd90261c19c3ff83472148bd01b5e70c583717fbffc
-
SHA512
2bc7243cf83c73eabbb4d6e4b0410e11461e3ab802b24ef97c99ab2baf731e821ff93162aca60dd47b7cbeb8b78510c7d168b230edf85a9a6174c91df299884b
-
SSDEEP
1536:bbCTuBEzvCv9UDvd6OfysxXW0FL2yZQs7RFTvb4nnyLOn:bbCTuBEzvCv9UDvd6OJ/FHRF7KnyC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
msedge.exemsedge.exemsedge.exepid process 1508 msedge.exe 1508 msedge.exe 5072 msedge.exe 5072 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
msedge.exepid process 5072 msedge.exe 5072 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 5072 wrote to memory of 1152 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 1152 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 4376 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 4376 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 4376 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 4376 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 4376 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 4376 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 4376 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 4376 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 4376 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 4376 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 4376 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 4376 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 4376 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 4376 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 4376 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 4376 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 4376 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 4376 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 4376 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 4376 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 4376 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 4376 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 4376 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 4376 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 4376 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 4376 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 4376 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 4376 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 4376 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 4376 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 4376 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 4376 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 4376 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 4376 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 4376 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 4376 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 4376 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 4376 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 4376 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 4376 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 1508 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 1508 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 3120 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 3120 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 3120 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 3120 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 3120 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 3120 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 3120 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 3120 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 3120 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 3120 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 3120 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 3120 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 3120 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 3120 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 3120 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 3120 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 3120 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 3120 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 3120 5072 msedge.exe msedge.exe PID 5072 wrote to memory of 3120 5072 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\68c0b8ceeb79cad87460354085d6ad43_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff427246f8,0x7fff42724708,0x7fff427247182⤵PID:1152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,15828296026169844920,14810899644698502131,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2016,15828296026169844920,14810899644698502131,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2508 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2016,15828296026169844920,14810899644698502131,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,15828296026169844920,14810899644698502131,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,15828296026169844920,14810899644698502131,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,15828296026169844920,14810899644698502131,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4872 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:712
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5288
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4900
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
474B
MD540d3a1aac24a43f7135a8d67d1eb3264
SHA19f1c325592f17aa14bbefcd82fa35227b86d89cf
SHA2561e846c8a33017e6d4fe4ab4ec4132fd6f382cb47cc7de79438fc87dcec5f5c92
SHA5126f415dab3c7e73d0c9282935cdfb90a47d9b9a6f2549f62aef6b9164959b19140762959998f9164ce67f8858a5c0046fd39ade6c8a9224af9716b36d0475873c
-
Filesize
6KB
MD559dd96f6896e632eec8a128449083bdb
SHA15eadb109049bdd45afcbcd86165a2ec9659de0e3
SHA256eb7f0e85b506bfca7c2b6e11954ec98167ef55618a2d35813585c268516f9077
SHA51207e890ea8e488a14d9cd5d795751ad2c6d842af7f8ff5dee935f2d3c96dd5af485c02a3cab88dac2d809d91c9a9c20ad84b2db8602792e51624f7d2b6bc46aa4
-
Filesize
5KB
MD565a97abdc794bb3e5f748ba316bc1c33
SHA1fb803e2b4ed8fe1f150b3addcf148bfb0b337c59
SHA256e6cd593e04828f627171025f414048f270a4448310df4694bfcfe4f6fcbdf709
SHA5129ed97f9f6430a09ba9d9057b1b5326fd60f60817f4a5e6cd46d02a3fdf1e8a68c8134d5f3558d4d7609d455b0acc0c3f96525fde07a54c62ae71f4b14cc73e2e
-
Filesize
6KB
MD5ea1d15bb6a94259a70ba8ecb0c200369
SHA199d075fa41c80f310f9cf17015233a89cec7a26a
SHA25676f24caf33990db619892c8996f22b8bc5bcdd3d659dc39b12ec9a16b0a3ca39
SHA512913c3dd640b4b5367a8217b00693cdf33005f2c57ca0f80210861a98115fd91baec3538ab17d51ba88beae6c22147a0e48d655efcf365d55322da12c0db74c8e
-
Filesize
11KB
MD505c34a4871583793660f911154dbdd48
SHA1dbefe1463b02045db692a9764c444e6ae088d38e
SHA2565713d864f11fccc00c6ce474f736c27c9629f9520c4f08040bdfa337f26e1e32
SHA512d0a627305f21c0e9d232b3152b5fcca523f8b9bfc7b735b538ee702663f836d2f17a83ac8abc019f28722608b3c4998ab3dc1496cf19c03369e79eb146dff424
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e