Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 23:09
Static task
static1
Behavioral task
behavioral1
Sample
68f40c6bd709327397202322dd670e31_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
68f40c6bd709327397202322dd670e31_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68f40c6bd709327397202322dd670e31_JaffaCakes118.html
-
Size
168KB
-
MD5
68f40c6bd709327397202322dd670e31
-
SHA1
faff4fff5b5c98d837ce2cd55b381cf6c0c910af
-
SHA256
b5f4bc8275bee400032ec9d7564d9bd82fda80c73ae5815c3452997af655c19d
-
SHA512
0ba294d269f1cc4d508fad41cd580ad175049b19788a0db3facdb6ac3ce66e5758b1dbf65d27c173a88266b3e93becba672f24cae1b384896dda3ec0e746fe86
-
SSDEEP
1536:k8Ykmb9LjyhRN8fe6S/cmfd/Wbgf73S4D5XAGi8/4F/hkEdtRhaW0//0lgSqTefv:k8YRVOyNlZoMKmj1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 1268 msedge.exe 1268 msedge.exe 208 msedge.exe 208 msedge.exe 700 identity_helper.exe 700 identity_helper.exe 5492 msedge.exe 5492 msedge.exe 5492 msedge.exe 5492 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 208 wrote to memory of 1724 208 msedge.exe msedge.exe PID 208 wrote to memory of 1724 208 msedge.exe msedge.exe PID 208 wrote to memory of 1928 208 msedge.exe msedge.exe PID 208 wrote to memory of 1928 208 msedge.exe msedge.exe PID 208 wrote to memory of 1928 208 msedge.exe msedge.exe PID 208 wrote to memory of 1928 208 msedge.exe msedge.exe PID 208 wrote to memory of 1928 208 msedge.exe msedge.exe PID 208 wrote to memory of 1928 208 msedge.exe msedge.exe PID 208 wrote to memory of 1928 208 msedge.exe msedge.exe PID 208 wrote to memory of 1928 208 msedge.exe msedge.exe PID 208 wrote to memory of 1928 208 msedge.exe msedge.exe PID 208 wrote to memory of 1928 208 msedge.exe msedge.exe PID 208 wrote to memory of 1928 208 msedge.exe msedge.exe PID 208 wrote to memory of 1928 208 msedge.exe msedge.exe PID 208 wrote to memory of 1928 208 msedge.exe msedge.exe PID 208 wrote to memory of 1928 208 msedge.exe msedge.exe PID 208 wrote to memory of 1928 208 msedge.exe msedge.exe PID 208 wrote to memory of 1928 208 msedge.exe msedge.exe PID 208 wrote to memory of 1928 208 msedge.exe msedge.exe PID 208 wrote to memory of 1928 208 msedge.exe msedge.exe PID 208 wrote to memory of 1928 208 msedge.exe msedge.exe PID 208 wrote to memory of 1928 208 msedge.exe msedge.exe PID 208 wrote to memory of 1928 208 msedge.exe msedge.exe PID 208 wrote to memory of 1928 208 msedge.exe msedge.exe PID 208 wrote to memory of 1928 208 msedge.exe msedge.exe PID 208 wrote to memory of 1928 208 msedge.exe msedge.exe PID 208 wrote to memory of 1928 208 msedge.exe msedge.exe PID 208 wrote to memory of 1928 208 msedge.exe msedge.exe PID 208 wrote to memory of 1928 208 msedge.exe msedge.exe PID 208 wrote to memory of 1928 208 msedge.exe msedge.exe PID 208 wrote to memory of 1928 208 msedge.exe msedge.exe PID 208 wrote to memory of 1928 208 msedge.exe msedge.exe PID 208 wrote to memory of 1928 208 msedge.exe msedge.exe PID 208 wrote to memory of 1928 208 msedge.exe msedge.exe PID 208 wrote to memory of 1928 208 msedge.exe msedge.exe PID 208 wrote to memory of 1928 208 msedge.exe msedge.exe PID 208 wrote to memory of 1928 208 msedge.exe msedge.exe PID 208 wrote to memory of 1928 208 msedge.exe msedge.exe PID 208 wrote to memory of 1928 208 msedge.exe msedge.exe PID 208 wrote to memory of 1928 208 msedge.exe msedge.exe PID 208 wrote to memory of 1928 208 msedge.exe msedge.exe PID 208 wrote to memory of 1928 208 msedge.exe msedge.exe PID 208 wrote to memory of 1268 208 msedge.exe msedge.exe PID 208 wrote to memory of 1268 208 msedge.exe msedge.exe PID 208 wrote to memory of 1020 208 msedge.exe msedge.exe PID 208 wrote to memory of 1020 208 msedge.exe msedge.exe PID 208 wrote to memory of 1020 208 msedge.exe msedge.exe PID 208 wrote to memory of 1020 208 msedge.exe msedge.exe PID 208 wrote to memory of 1020 208 msedge.exe msedge.exe PID 208 wrote to memory of 1020 208 msedge.exe msedge.exe PID 208 wrote to memory of 1020 208 msedge.exe msedge.exe PID 208 wrote to memory of 1020 208 msedge.exe msedge.exe PID 208 wrote to memory of 1020 208 msedge.exe msedge.exe PID 208 wrote to memory of 1020 208 msedge.exe msedge.exe PID 208 wrote to memory of 1020 208 msedge.exe msedge.exe PID 208 wrote to memory of 1020 208 msedge.exe msedge.exe PID 208 wrote to memory of 1020 208 msedge.exe msedge.exe PID 208 wrote to memory of 1020 208 msedge.exe msedge.exe PID 208 wrote to memory of 1020 208 msedge.exe msedge.exe PID 208 wrote to memory of 1020 208 msedge.exe msedge.exe PID 208 wrote to memory of 1020 208 msedge.exe msedge.exe PID 208 wrote to memory of 1020 208 msedge.exe msedge.exe PID 208 wrote to memory of 1020 208 msedge.exe msedge.exe PID 208 wrote to memory of 1020 208 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\68f40c6bd709327397202322dd670e31_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb611046f8,0x7ffb61104708,0x7ffb611047182⤵PID:1724
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,10726989776719091630,6539237040672435564,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:1928
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,10726989776719091630,6539237040672435564,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2392 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1268 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,10726989776719091630,6539237040672435564,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:1020
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10726989776719091630,6539237040672435564,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4152
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10726989776719091630,6539237040672435564,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2868
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10726989776719091630,6539237040672435564,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:12⤵PID:4804
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,10726989776719091630,6539237040672435564,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5760 /prefetch:82⤵PID:1900
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,10726989776719091630,6539237040672435564,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5760 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:700 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10726989776719091630,6539237040672435564,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:12⤵PID:2836
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10726989776719091630,6539237040672435564,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5824 /prefetch:12⤵PID:1804
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10726989776719091630,6539237040672435564,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:3172
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10726989776719091630,6539237040672435564,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6116 /prefetch:12⤵PID:4340
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,10726989776719091630,6539237040672435564,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2348 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5492
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2512
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5bde5688d405022ef8bda19d181a6dddf
SHA18b72e45191a7b97218741f6fc9bc3efb6295e408
SHA2565aa2e36cd6f40fa3724c9172909e47741cc9e38f1e22bde03b6f3a2c43f38a51
SHA512b134d53c77bd818b911a6065887c9ea5c0458c5acd2630e31ed2eb116f17b315ca1bf2274036650a294bc5b206965a9c298c1d8f87086f7d59a7793924acc70b
-
Filesize
407B
MD55575de0965f3cbde35c7dc79a6f5b1fa
SHA1f54b0445a16bb1206273a8ec42088e4cf4223674
SHA25628391a65c06e689d5828b63b89d8ab04e2be685d547d91a9d2bbf4dcf78d88a4
SHA5122306790035a1f9f23486048955896a5b34f357cf34d65f639da04ec2be13aa820fed87d11c9e7374e8fdd98199cb1bef313c87a232ef01415fcef39fa2a591a3
-
Filesize
5KB
MD57fb6a02b7fbdea5741e666011692c9ea
SHA1d606acb353f6f2e59e18745a2a9d129fe94b4227
SHA25601149b61653df3fd54835fa4f4de4530f081806ff0c486e70a8a3b0dd8de93fd
SHA5128af873cffb93f8bfb55b82bcbf29af76c6d28de3aea3a69ecd4cdf79a20f024985b2a69a076053d0bcce66fb53c95af4485d874b4657927782ffeaf024963800
-
Filesize
6KB
MD57d2c829d6855f974b7c8e3cee73d77e0
SHA168ae2caae139b09c0891ae98498cd0712cdb71ac
SHA256f2a580f2b150da2eee77cefe5509963ff9e6912f2aa87ed48ba37de0d9e3f55e
SHA512dac8218d16a40ca45a2853eeed61f4903a85afe0a42bb51ab3dfa9eedb28757e5443af16c205e3c7749d94941e73494a21af1f29a17d96ec3f4dc57debbd6300
-
Filesize
539B
MD5fc0ac30699eb3ea37a0e28a8a98a0d5f
SHA128730ee28f8b9a3e40a72bf782a7989bca550c6e
SHA2568a0b44f0b701926428fd2881ed36f4a9fd9527668c3c8c17e7c52d9a099679f9
SHA5125853f7365725f8420eea0582dd532d5e575045641f46e17f37fc6c545c5b7e5364a5022fe8b59e58126be3216ab4f42a293e12bd7d2bb581576030a59ba084b6
-
Filesize
539B
MD5bb6362587e02051428f0082faca480ba
SHA1056b4b03a235458041ecf3dc99f8268f78fd347b
SHA256184060795623a1a6148927cf37d348db67a3a46b6941d201f57bfffe1561c08d
SHA512e95f73e9934402a71928ea8f2022f6bb27ed3197381c820fc4b5116fa7e05c1b378f392312a7fdaf228d96794161b4812dd1d3ffced282b661508bb64183071e
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5894a2890095a72637bc39b3128ca4002
SHA1e0e4d3592cb3c34431f0876263fe02d98c9f4634
SHA2564f1640da7ddc46123a24285df570bb4e684e32ff3be065ef7081d9a4eb412057
SHA5127d9ad06951213d5c7bae93616d6579cc96bc57fcb112bb0f5107a7908210308eb31052c2a720b205e2bee370b5264d842f3ff2350cfc122a1067de260083c0a3
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e