Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 22:02
Static task
static1
Behavioral task
behavioral1
Sample
68c8e779a78bc9e43d8778127bbaf4ff_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
68c8e779a78bc9e43d8778127bbaf4ff_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
68c8e779a78bc9e43d8778127bbaf4ff_JaffaCakes118.html
-
Size
23KB
-
MD5
68c8e779a78bc9e43d8778127bbaf4ff
-
SHA1
aa3aa2f115328db24db75c91a4d086936b7a1b38
-
SHA256
cce132461845e05d921f103359c675b12bc7d7379c79b5b245ed553554eefbaf
-
SHA512
ec4468361c1f7df497b23e2eb669068e40efbda874da7fd9ba5d41f44a6d19e3b412bd347fcd7f6d9c7d66099f29f5fe5ba42b1e6f667a70bbfe7087785fc1c9
-
SSDEEP
192:uWTIb5nrlWnQjxn5Q/snQiefNnjnQOkEnt4KnQTbnZnQJCnQt/wMB/qnYnQ7tng6:sQ/hx6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 1048 msedge.exe 1048 msedge.exe 1248 msedge.exe 1248 msedge.exe 4760 identity_helper.exe 4760 identity_helper.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1248 wrote to memory of 1276 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 1276 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2888 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2888 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2888 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2888 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2888 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2888 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2888 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2888 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2888 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2888 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2888 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2888 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2888 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2888 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2888 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2888 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2888 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2888 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2888 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2888 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2888 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2888 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2888 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2888 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2888 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2888 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2888 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2888 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2888 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2888 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2888 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2888 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2888 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2888 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2888 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2888 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2888 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2888 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2888 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2888 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 1048 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 1048 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2176 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2176 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2176 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2176 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2176 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2176 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2176 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2176 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2176 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2176 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2176 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2176 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2176 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2176 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2176 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2176 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2176 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2176 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2176 1248 msedge.exe msedge.exe PID 1248 wrote to memory of 2176 1248 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\68c8e779a78bc9e43d8778127bbaf4ff_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffec5df46f8,0x7ffec5df4708,0x7ffec5df47182⤵PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1964,11002775959691708767,2358272984374389536,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1964,11002775959691708767,2358272984374389536,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1964,11002775959691708767,2358272984374389536,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2572 /prefetch:82⤵PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,11002775959691708767,2358272984374389536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,11002775959691708767,2358272984374389536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1964,11002775959691708767,2358272984374389536,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 /prefetch:82⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1964,11002775959691708767,2358272984374389536,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,11002775959691708767,2358272984374389536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,11002775959691708767,2358272984374389536,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,11002775959691708767,2358272984374389536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,11002775959691708767,2358272984374389536,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1964,11002775959691708767,2358272984374389536,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3936 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3504
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4020
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
6KB
MD5e230583e4a9fb8e7fbd863688156a501
SHA16d23a170a4e5dd8680a037242149566b281d1456
SHA256487b480c8582e6124e9590830ad821c37486db7153b135c43ac9627f0287bd3d
SHA512dfc1dd104efbfb102ebfba2856b35364650a6b7e0d179158135a23eae46883e4c4dd3eeee4203cd6a7c183f85b8de7e03786cf1ee0fedf03545b21dc33f889a1
-
Filesize
5KB
MD5c4edf44b77d7076e6bf8764be65155d4
SHA1999b5f82d0b862be7bdab3a22321bb792f34dae9
SHA256a62986e674e2dc7a613b7693e07c84475de5b2349bcd9ac5195c5d597c83fb65
SHA5123a9740404ed1124eb01d2246e9bed114ac2e51c1640e08cf854e9f5d72d7c1bce72765b99e65925768e20513663f8ab2a3d9fa8009040a1bfc8bc4223b2494f5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59351243a792fcb991793c117a6537f1a
SHA1da97a15008904b745bbad7fe7ec24da0c2eb9c76
SHA2563f6be6eaad8588267b825171324b4e8d7f450f7c8a9b6b50bf5bc717e17794a6
SHA5122767c1fe9fd9be37ce5e3f18dfd77f4960876266a9dbe2c2396a14180f724a6a9d22808e5ee466f9df763a5b7693c5737cd0fb697a2b63564c7517d5cce8922c
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e