Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 21:51
Static task
static1
Behavioral task
behavioral1
Sample
68c1644e37c8d99246ed378338d2beac_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
68c1644e37c8d99246ed378338d2beac_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68c1644e37c8d99246ed378338d2beac_JaffaCakes118.html
-
Size
198KB
-
MD5
68c1644e37c8d99246ed378338d2beac
-
SHA1
e76ea6b65315e124f61dbce266ecff5954f6bafe
-
SHA256
28ac34dcc1d73e916293b4be42682bbaa047d55137c38878d013d921adba9ff0
-
SHA512
b8a6ce42ac602e112de2ca642e9ee6cfde4bedef7176b6489d6d20f8af4e3c3ed59e21b81b079b4c3d1dd19a48a3a12191615e157075bf3fd8c6c8b60351b0c9
-
SSDEEP
6144:o5jbcKFtPykViMbxjzgmbzbI0bQJX0XZXlXYXTXbX2XLX6X+Xd8fQcdcN6UXd9I:4bcKFtPykViMbxjzgmbzbI0bQY8fQcdr
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
msedge.exemsedge.exemsedge.exepid process 4220 msedge.exe 4220 msedge.exe 644 msedge.exe 644 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
msedge.exepid process 644 msedge.exe 644 msedge.exe 644 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 644 wrote to memory of 1320 644 msedge.exe msedge.exe PID 644 wrote to memory of 1320 644 msedge.exe msedge.exe PID 644 wrote to memory of 2992 644 msedge.exe msedge.exe PID 644 wrote to memory of 2992 644 msedge.exe msedge.exe PID 644 wrote to memory of 2992 644 msedge.exe msedge.exe PID 644 wrote to memory of 2992 644 msedge.exe msedge.exe PID 644 wrote to memory of 2992 644 msedge.exe msedge.exe PID 644 wrote to memory of 2992 644 msedge.exe msedge.exe PID 644 wrote to memory of 2992 644 msedge.exe msedge.exe PID 644 wrote to memory of 2992 644 msedge.exe msedge.exe PID 644 wrote to memory of 2992 644 msedge.exe msedge.exe PID 644 wrote to memory of 2992 644 msedge.exe msedge.exe PID 644 wrote to memory of 2992 644 msedge.exe msedge.exe PID 644 wrote to memory of 2992 644 msedge.exe msedge.exe PID 644 wrote to memory of 2992 644 msedge.exe msedge.exe PID 644 wrote to memory of 2992 644 msedge.exe msedge.exe PID 644 wrote to memory of 2992 644 msedge.exe msedge.exe PID 644 wrote to memory of 2992 644 msedge.exe msedge.exe PID 644 wrote to memory of 2992 644 msedge.exe msedge.exe PID 644 wrote to memory of 2992 644 msedge.exe msedge.exe PID 644 wrote to memory of 2992 644 msedge.exe msedge.exe PID 644 wrote to memory of 2992 644 msedge.exe msedge.exe PID 644 wrote to memory of 2992 644 msedge.exe msedge.exe PID 644 wrote to memory of 2992 644 msedge.exe msedge.exe PID 644 wrote to memory of 2992 644 msedge.exe msedge.exe PID 644 wrote to memory of 2992 644 msedge.exe msedge.exe PID 644 wrote to memory of 2992 644 msedge.exe msedge.exe PID 644 wrote to memory of 2992 644 msedge.exe msedge.exe PID 644 wrote to memory of 2992 644 msedge.exe msedge.exe PID 644 wrote to memory of 2992 644 msedge.exe msedge.exe PID 644 wrote to memory of 2992 644 msedge.exe msedge.exe PID 644 wrote to memory of 2992 644 msedge.exe msedge.exe PID 644 wrote to memory of 2992 644 msedge.exe msedge.exe PID 644 wrote to memory of 2992 644 msedge.exe msedge.exe PID 644 wrote to memory of 2992 644 msedge.exe msedge.exe PID 644 wrote to memory of 2992 644 msedge.exe msedge.exe PID 644 wrote to memory of 2992 644 msedge.exe msedge.exe PID 644 wrote to memory of 2992 644 msedge.exe msedge.exe PID 644 wrote to memory of 2992 644 msedge.exe msedge.exe PID 644 wrote to memory of 2992 644 msedge.exe msedge.exe PID 644 wrote to memory of 2992 644 msedge.exe msedge.exe PID 644 wrote to memory of 2992 644 msedge.exe msedge.exe PID 644 wrote to memory of 4220 644 msedge.exe msedge.exe PID 644 wrote to memory of 4220 644 msedge.exe msedge.exe PID 644 wrote to memory of 3692 644 msedge.exe msedge.exe PID 644 wrote to memory of 3692 644 msedge.exe msedge.exe PID 644 wrote to memory of 3692 644 msedge.exe msedge.exe PID 644 wrote to memory of 3692 644 msedge.exe msedge.exe PID 644 wrote to memory of 3692 644 msedge.exe msedge.exe PID 644 wrote to memory of 3692 644 msedge.exe msedge.exe PID 644 wrote to memory of 3692 644 msedge.exe msedge.exe PID 644 wrote to memory of 3692 644 msedge.exe msedge.exe PID 644 wrote to memory of 3692 644 msedge.exe msedge.exe PID 644 wrote to memory of 3692 644 msedge.exe msedge.exe PID 644 wrote to memory of 3692 644 msedge.exe msedge.exe PID 644 wrote to memory of 3692 644 msedge.exe msedge.exe PID 644 wrote to memory of 3692 644 msedge.exe msedge.exe PID 644 wrote to memory of 3692 644 msedge.exe msedge.exe PID 644 wrote to memory of 3692 644 msedge.exe msedge.exe PID 644 wrote to memory of 3692 644 msedge.exe msedge.exe PID 644 wrote to memory of 3692 644 msedge.exe msedge.exe PID 644 wrote to memory of 3692 644 msedge.exe msedge.exe PID 644 wrote to memory of 3692 644 msedge.exe msedge.exe PID 644 wrote to memory of 3692 644 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\68c1644e37c8d99246ed378338d2beac_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd5eb246f8,0x7ffd5eb24708,0x7ffd5eb247182⤵PID:1320
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,1520839642172354607,2162700562498659347,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:2992
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,1520839642172354607,2162700562498659347,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4220 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,1520839642172354607,2162700562498659347,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:3692
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,1520839642172354607,2162700562498659347,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:2724
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,1520839642172354607,2162700562498659347,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:1384
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,1520839642172354607,2162700562498659347,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1984 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2928 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,1520839642172354607,2162700562498659347,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:12⤵PID:2508
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1872
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2796
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\8c1dcf49-5fbd-4ea3-8f8a-6099fc795d8f.tmp
Filesize5KB
MD5df576561c39cce9e9446857aa4748df2
SHA1cbde66b6c7a9230165de88713f3330fe4fc30528
SHA2560238f75c20d9681c694aadd25e254a487b817c24ffa3a13a090d6448503e20de
SHA512b46b9a25f0bdee4f2dc92e9105494907a6306d6e97ae44e20b2df87588f35d469534b71d04da8befd819b08a8d94c3bcc7cd139a70dea276c44836579f7ec0a6
-
Filesize
1KB
MD5d5e650a26e86071e2458294fc85a7be5
SHA144ddb8af8fe7b88eda769a341cad69b4abd9234f
SHA256a0882bc6ab7c739c5846d252203d9cd8a71858edfa0a96260da75c916d61386a
SHA51214d68a7259e652e5c1567b1aa0bcff0b0a04d017e182f270dbd4a358e9f833bf3237f6e93ab0485515f0b12d0dc237fe9d417c5039ab48bea053eb79502c331d
-
Filesize
6KB
MD560c1925a7d7914196f56cabe8af23642
SHA1f8643a45eddf3c2dfcb810be3c3b26affd207e78
SHA256d74c27e31044c1d3eebb5332fb1ddf90d7fc848536dec06a966464ac63e82392
SHA5129e6d0fa07b8230144f106862b04bd328c9da743a5f1266682c44b5efd552d3f5735ed6aaa0b266400d90423ad2c94f3bbc22cf91b54c2d0e0c08cd73cd519e2d
-
Filesize
11KB
MD5e61cabd4f534072c850ca2c643808706
SHA1985153b91754ee376aa50a716ce9b7d9115ff9af
SHA256d1cf33722977a908ad044060d77714ba7eec232a27e0abb7279a57f67857e135
SHA5124bea85274f7e0be08cd069891c616297d4f4338e55d910db8714b226fd8c42f1b33f134e364082811108cbd71a45bf83ce03162e45f8ac8e72389c6c27a35b4f
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e