Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 21:59
Static task
static1
Behavioral task
behavioral1
Sample
68c6528b85467bef2a6f63bc77cac4fb_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
68c6528b85467bef2a6f63bc77cac4fb_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
68c6528b85467bef2a6f63bc77cac4fb_JaffaCakes118.html
-
Size
688KB
-
MD5
68c6528b85467bef2a6f63bc77cac4fb
-
SHA1
b9703f0a123731dc427ccde138e2684aec232775
-
SHA256
6a13dcf77e9565ed6dfb8883d75e0ece549b2d65dccff755216ea985f41ec159
-
SHA512
11a031c1ffeb24349813937df92adb7ef91a0dff33d3b3221d122f9a34aaead57aca6b79923dfe5779986f2a48619a7a3bd03c51146232da06537d88a6048fc5
-
SSDEEP
6144:S4sMYod+X3oI+YBltNosMYod+X3oI+YBltNosMYod+X3oI+YBltN9sMYod+X3oIp:75d+X33A5d+X33k5d+X33X5d+X33p
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
msedge.exemsedge.exemsedge.exepid process 228 msedge.exe 228 msedge.exe 3532 msedge.exe 3532 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
msedge.exepid process 3532 msedge.exe 3532 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3532 wrote to memory of 1292 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 1292 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 3560 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 3560 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 3560 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 3560 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 3560 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 3560 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 3560 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 3560 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 3560 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 3560 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 3560 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 3560 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 3560 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 3560 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 3560 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 3560 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 3560 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 3560 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 3560 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 3560 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 3560 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 3560 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 3560 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 3560 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 3560 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 3560 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 3560 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 3560 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 3560 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 3560 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 3560 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 3560 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 3560 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 3560 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 3560 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 3560 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 3560 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 3560 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 3560 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 3560 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 228 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 228 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 4364 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 4364 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 4364 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 4364 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 4364 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 4364 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 4364 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 4364 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 4364 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 4364 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 4364 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 4364 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 4364 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 4364 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 4364 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 4364 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 4364 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 4364 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 4364 3532 msedge.exe msedge.exe PID 3532 wrote to memory of 4364 3532 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\68c6528b85467bef2a6f63bc77cac4fb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcfc0446f8,0x7ffcfc044708,0x7ffcfc0447182⤵PID:1292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,17061783685672747118,2587342465771931820,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,17061783685672747118,2587342465771931820,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,17061783685672747118,2587342465771931820,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17061783685672747118,2587342465771931820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17061783685672747118,2587342465771931820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,17061783685672747118,2587342465771931820,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4792 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2236
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4340
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
5KB
MD5208405b50a5be9ae32ddf9f2f0c9e6a8
SHA10f423500f9cb4c01240fdc3265ce8c1556772eff
SHA2569e807a15bc54410d0646889056e83a0396eebb3062058ff44228aa3e49ab0eed
SHA512305d1f2f4a2f97d3966567fc578bf264374479736233b6a3be8b501ea65a54e251a8d6e253ec7b7c6cb9faf8e9a63478d2647b68b502dedb6ccaa47cbea33b13
-
Filesize
6KB
MD5c086dd1abc21ede67e9a133fec952e3a
SHA146ea4aab991668a76955193e532dd18117eec21e
SHA256a50ef7f7a908dbb3a7d984f4368889079e537edfcff200833d1a48fff0c29f38
SHA51239ee6a39e1cdecf2aa208b9ec3d748417a43d4bf2eed4e18b25023e1e356e1ef48c27407129978ffc12036a6623fbe9ece5d35093b5c7d79feb43367dfd9d24e
-
Filesize
6KB
MD5ce2c115010170c30702bcd964719f359
SHA106009de6cd442d6f02e44e991290e05de7fb1303
SHA25656cb977f57fd85b9e743f6b75fcf3d4a7bb5a58b74c743c3130e10378c2be5db
SHA512a6e10f532c923eb9b3759e8e985de5b6f40b0f9afbe94a07bc67981627ba2ae5e196d33ae17e3af6e7fe81ec04ed6fa4644b1de4210e5c35f3092dfdcf7b700e
-
Filesize
11KB
MD5bec4fd8085efc5423b4fccc8e6055f06
SHA1dfaaf5fea96c3a95cbe9df88fa23a19306ad41d7
SHA256184ee6ad7c35488dc258fb7fb9e4915b9594af3cb41211e77c40e00d108e981e
SHA51290a9bd4e1a8c09859fb63c6f1980756b4778b054f4e47d7781f22a2cdf10eb0a343169f5dfc75be1667a842a524ad7275da08b118ab88f1322723cfa11621800
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e