Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 21:52
Static task
static1
Behavioral task
behavioral1
Sample
68c210f0f404a9a3bfa321bf21ad9610_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
68c210f0f404a9a3bfa321bf21ad9610_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68c210f0f404a9a3bfa321bf21ad9610_JaffaCakes118.html
-
Size
139KB
-
MD5
68c210f0f404a9a3bfa321bf21ad9610
-
SHA1
79fde739f3c2a5fefe5e67721442cdbd7f97050e
-
SHA256
c50e386e81f3e75c0e35197135372282027b298a864a59e24936d91f33f9ebe6
-
SHA512
3234f24a216c099ea3e5af4d2b3dac78f1f96c461b2a28b0919a0cdbe08ec1c20b641e785ad12a4e11a90cae3d82c3eee8556d36602ed6cb20b9f7acbccc03ce
-
SSDEEP
3072:SWfKta8r1yfkMY+BES09JXAnyrZalI+YQ:SWuUsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
msedge.exemsedge.exemsedge.exepid process 1404 msedge.exe 1404 msedge.exe 1396 msedge.exe 1396 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
msedge.exepid process 1396 msedge.exe 1396 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1396 wrote to memory of 3964 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 3964 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 1312 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 1312 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 1312 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 1312 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 1312 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 1312 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 1312 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 1312 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 1312 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 1312 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 1312 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 1312 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 1312 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 1312 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 1312 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 1312 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 1312 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 1312 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 1312 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 1312 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 1312 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 1312 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 1312 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 1312 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 1312 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 1312 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 1312 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 1312 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 1312 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 1312 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 1312 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 1312 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 1312 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 1312 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 1312 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 1312 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 1312 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 1312 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 1312 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 1312 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 1404 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 1404 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 4888 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 4888 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 4888 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 4888 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 4888 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 4888 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 4888 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 4888 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 4888 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 4888 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 4888 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 4888 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 4888 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 4888 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 4888 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 4888 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 4888 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 4888 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 4888 1396 msedge.exe msedge.exe PID 1396 wrote to memory of 4888 1396 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\68c210f0f404a9a3bfa321bf21ad9610_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff810c046f8,0x7ff810c04708,0x7ff810c047182⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,1329373827270278991,5340022629237834744,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:1312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,1329373827270278991,5340022629237834744,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,1329373827270278991,5340022629237834744,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:82⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1329373827270278991,5340022629237834744,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1329373827270278991,5340022629237834744,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,1329373827270278991,5340022629237834744,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2756 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5044
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3304
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3492
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
6KB
MD5e3c12400a67b96185b8abaae5a56b6d5
SHA12ed6fa45fbd0af7d03cf1331d79f1b6f51b4bb24
SHA2562e8af2018e105f0dae9a6c11c143668edd83dc584dad29ebc1a8fc948447bda7
SHA512ea6a1930bd3146c2d8f3eb79adc96c6aa2b7fc120e30e398515b94c62aa66068d2539e4a1f224937666c38f9cbc9016b9113314242482b0ee9fbeb8b19d4649e
-
Filesize
5KB
MD515993facbe03031704d2a4dd680f7357
SHA1fa5ceff636894120946fe42c9a82017d7b023b25
SHA2563695d867141dba6c40be0113481aa0e015a532f41d45b6fe878b5c02ae519f89
SHA5121317f6971cd48cc881340f1ef1963532f6b528a1e0ef15a51a6ed6c92e5b12db1eee9afa20a5daba6f03f2eadf7d69f018c9be7885281346f1801d47f405d508
-
Filesize
11KB
MD53d6864411b7fb4e8ba00eef0f560d2e9
SHA160f7b4e78cec2b2fd84e9df19503826e5ad9ded3
SHA2568b36db11dccffb63711678bc7bc5f8faaebdf24a99cf133c5f9efc409567c2dd
SHA5122ae6fa0c75cfb07a9d0a6e1700126a3ffd978b49627cfbae299c51c06a7faa27a793a1bf848f416095e46b381feaa5f33d68f46c622f401c3540fe8f4b43c7b6
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e