Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 22:25
Static task
static1
Behavioral task
behavioral1
Sample
68d815956439a26cf006d05668cc7bee_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
68d815956439a26cf006d05668cc7bee_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68d815956439a26cf006d05668cc7bee_JaffaCakes118.html
-
Size
213KB
-
MD5
68d815956439a26cf006d05668cc7bee
-
SHA1
b9e26aad27107ffd744a746bed5282928ce3699d
-
SHA256
bc31e4bf269d4bda5f6d5f996d3b9a8a5bd849288c65d7613457ca3873c0aaae
-
SHA512
ec1b4740737eaafa6e1965d7dc935b086fb1ff759f8b512f25cda745a858061ddb48c804a6018067b235cd7ef01713fa282a9ed38e3d958ff096b10cc47ce654
-
SSDEEP
3072:S3Rzgas/k+ehyfkMY+BES09JXAnyrZalI+YQ:S36AksMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
msedge.exemsedge.exemsedge.exepid process 4116 msedge.exe 4116 msedge.exe 4504 msedge.exe 4504 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
msedge.exepid process 4504 msedge.exe 4504 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4504 wrote to memory of 544 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 544 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 3540 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 3540 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 3540 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 3540 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 3540 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 3540 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 3540 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 3540 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 3540 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 3540 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 3540 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 3540 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 3540 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 3540 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 3540 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 3540 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 3540 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 3540 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 3540 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 3540 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 3540 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 3540 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 3540 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 3540 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 3540 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 3540 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 3540 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 3540 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 3540 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 3540 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 3540 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 3540 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 3540 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 3540 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 3540 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 3540 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 3540 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 3540 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 3540 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 3540 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 4116 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 4116 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 2064 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 2064 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 2064 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 2064 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 2064 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 2064 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 2064 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 2064 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 2064 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 2064 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 2064 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 2064 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 2064 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 2064 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 2064 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 2064 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 2064 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 2064 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 2064 4504 msedge.exe msedge.exe PID 4504 wrote to memory of 2064 4504 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\68d815956439a26cf006d05668cc7bee_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9903a46f8,0x7ff9903a4708,0x7ff9903a47182⤵PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,17075445759479235952,16908058960335922235,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,17075445759479235952,16908058960335922235,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2468 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,17075445759479235952,16908058960335922235,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,17075445759479235952,16908058960335922235,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,17075445759479235952,16908058960335922235,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,17075445759479235952,16908058960335922235,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1748 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3856
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4008
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
5KB
MD50955c5e00123071e5f859c62ae57b93d
SHA106d5aa2f25e6368aec774e9f5a68f0a9ee2a7179
SHA256896685861e228e679ceabd1a8439259cd40c2b2fa3a00b84c164cbb6c928e6c0
SHA5128841d6212b3e13013b3aab1ec4e57e181d4682dfc645257c99b4fd942725b136ac1723f633cf7d829a952e90746196cb28452a55d1301c79c5b0aebcac61e047
-
Filesize
6KB
MD5a22b50787da385aad70ccdb1a1b4d918
SHA1981b4a2aa1a406fb0380afb82d9ef5b6bb8e0be8
SHA256397d397e032d215775e3d1da152ad7e882d1c9060643d11177597cb5b0d6ade7
SHA512b52ed96299d904eba21d7b6bd70da5537dc56b7aa37763dfb9856303a6b0a39b105758dff1574e6d4c97ac9aa5e8fd938c2c2092bdebe1649aacb1d404f9e005
-
Filesize
11KB
MD5f6cdf0009d6e6aa0fe19f47fa72715d3
SHA19d2997d4bb4aaf948b1c530584d6c4bb2b1d2923
SHA25652730145a9c3e390baebbb6ced16cb7f79a49635de1de5d071c6e9d9cf1ae8b9
SHA5122f6e4edd87699ea4a89708740d00f8f4ab299d89724016f900b6328d9b337bfe5c0e31fce1b8940bd74ed93afcc7f4e0622a8d0c37a5d9c78e0ddc38fa40df16
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e