Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 23:18
Static task
static1
Behavioral task
behavioral1
Sample
68f9c1a4dbdeeb754b25aa6376e4da2b_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
68f9c1a4dbdeeb754b25aa6376e4da2b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
68f9c1a4dbdeeb754b25aa6376e4da2b_JaffaCakes118.html
-
Size
67KB
-
MD5
68f9c1a4dbdeeb754b25aa6376e4da2b
-
SHA1
0acc174b48036773538d70671160281c5ced0663
-
SHA256
a2abab8981dd01c91405908a291abb84ef83ed06da8bdc510846ef7326f71b8b
-
SHA512
5230437a5acf3c97b20886afbadf3a28e427e0bd3a5a8008b03986427f94835259ea495cb4f461aa74d68a402eb453228b56673a947ad770b158e3cba677c2be
-
SSDEEP
1536:2vG8+HDtBGso+0KK+sj2lLV/MXtARVG2CQj6gwicB9H8HkrWrc:2vG8+HRu9cHkrWrc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 3152 msedge.exe 3152 msedge.exe 2016 msedge.exe 2016 msedge.exe 1688 identity_helper.exe 1688 identity_helper.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 2016 wrote to memory of 4856 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 4856 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 540 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 540 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 540 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 540 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 540 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 540 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 540 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 540 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 540 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 540 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 540 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 540 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 540 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 540 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 540 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 540 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 540 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 540 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 540 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 540 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 540 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 540 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 540 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 540 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 540 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 540 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 540 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 540 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 540 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 540 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 540 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 540 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 540 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 540 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 540 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 540 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 540 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 540 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 540 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 540 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 3152 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 3152 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 3392 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 3392 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 3392 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 3392 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 3392 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 3392 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 3392 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 3392 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 3392 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 3392 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 3392 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 3392 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 3392 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 3392 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 3392 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 3392 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 3392 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 3392 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 3392 2016 msedge.exe msedge.exe PID 2016 wrote to memory of 3392 2016 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\68f9c1a4dbdeeb754b25aa6376e4da2b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc8b8946f8,0x7ffc8b894708,0x7ffc8b8947182⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,5502610267932740456,7346563991066483340,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,5502610267932740456,7346563991066483340,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,5502610267932740456,7346563991066483340,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1964 /prefetch:82⤵PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,5502610267932740456,7346563991066483340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,5502610267932740456,7346563991066483340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,5502610267932740456,7346563991066483340,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4832 /prefetch:82⤵PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,5502610267932740456,7346563991066483340,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4832 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,5502610267932740456,7346563991066483340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:12⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,5502610267932740456,7346563991066483340,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:1004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,5502610267932740456,7346563991066483340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3984 /prefetch:12⤵PID:2728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,5502610267932740456,7346563991066483340,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,5502610267932740456,7346563991066483340,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4824 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4480
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1516
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
682B
MD50a7d84486203496305b08defb47d6e7a
SHA10a6a5f72c4de94e3199f3378d146fca6a1618c9a
SHA2564debde3a7831cac858243850d237c730cbe0f54dabfcfbc4aa2f493f9a38d8fa
SHA51243a2dfcf31be8959616b304cb0bc4c9e0d5e67832c870dd0de1c03ef4a6c5804a5532f39289fdc72df9c18c86795214ca705b3aca3c7051f42df34f612478d74
-
Filesize
5KB
MD5660c8179d161f462b11281393ab51204
SHA1fd9ba08003f3128a876b6c6a9da1ab426a024e9f
SHA25644a206b1a06f615ce983a4e5331a48505ad882136073379ef1a4cce400032ac7
SHA512a33166873a48c1a5e47914a422c6299646e9fc1ddcaa0ee805d3d90a513b77649198a73c0664e00a37d4ed5ec541dd21d44728e8244f6b8483166a73a94d6f74
-
Filesize
7KB
MD5fa0d45977cf6e703db253f2672f8de40
SHA1c96e71732476252b1c8412c98393d59a134f308b
SHA2565685449711abe6336c27cfa489b009cb0cc326c7767b1513c932ed09595c34d7
SHA512bcb40ed28e882dead8c1af868e5218005b72c06a80f9575ab9236957ff20a696b11171ea9779812f032d16d3f4409cee9c57e581ac9dcd742106fbb617b9e8d6
-
Filesize
1KB
MD5f41e8eaf9f088a78315f596191eb7b08
SHA102afb3daf4cc4f9750637a5854cb8856346d90ee
SHA2560b3b7d684640024bb8e022307b8b57781c58c3656c1c057cbd7c719f56f91204
SHA5121b99ff81959a7903925a48ce3312efb364146d8d8dc968f814298609b85f267b0898907cca4a2350a7a2e3c9484ddbde32613402f53c4dfd3bc961a5440891c4
-
Filesize
1KB
MD5eeec062084ba248d60db272749aa2f59
SHA1d8b91eeb11c882f273d87df301b1a0c137d9a46b
SHA256873d0ac49a563082e0deb69d0a29577b6b57efe9411385c7c675b2d34830c7a1
SHA51246e2885d38b16fb6a7eeaa8a0e9cd30787c1962afacd96d2ad7b385c0754e0a01d40b44b5a5b8d3cd05d563f8b7e55657b2708b04b4e5725f862817722ed3db1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD518a9b03ffee8c85d13c0f1a55d149474
SHA14240a066d72990c2dcc3034644b5f20ec60d9ff3
SHA256bc08536c9789f8c2ebb58b16516b0c339fc0a74457cd1e7406502fee26fa2fb6
SHA5129ab3cb793574871268da24c280227feeed7f753bbe4702bc6a172e3984010dfbaf6de204e3aa88f3e7b288dc8735a8d38325db65ffebada7733b94c3265c5c83