Analysis
-
max time kernel
145s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 23:34
Static task
static1
Behavioral task
behavioral1
Sample
69039821a1257c39be2efa5c6438a4ca_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
69039821a1257c39be2efa5c6438a4ca_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
69039821a1257c39be2efa5c6438a4ca_JaffaCakes118.html
-
Size
460KB
-
MD5
69039821a1257c39be2efa5c6438a4ca
-
SHA1
b1ace45ba19e8fbb97bee3b177e12e1938f286ad
-
SHA256
0db384eb1324b09580cb81b9db756cdd50cc20c3b8bd57c80ebd3ab69d6c08b1
-
SHA512
49d26783af38fd63d98c952dbd642c67621a2404e38598ebd68612bef376bfde1e27eec1b151010e63c3daa6a3cd7519f5afdb2785b8f4f92e59cbde74d2107e
-
SSDEEP
6144:SisMYod+X3oI+YzsMYod+X3oI+YvsMYod+X3oI+YLsMYod+X3oI+YQ:l5d+X3l5d+X355d+X315d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 4020 msedge.exe 4020 msedge.exe 2724 msedge.exe 2724 msedge.exe 3896 identity_helper.exe 3896 identity_helper.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 2724 wrote to memory of 852 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 852 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1340 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1340 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1340 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1340 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1340 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1340 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1340 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1340 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1340 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1340 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1340 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1340 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1340 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1340 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1340 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1340 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1340 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1340 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1340 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1340 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1340 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1340 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1340 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1340 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1340 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1340 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1340 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1340 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1340 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1340 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1340 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1340 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1340 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1340 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1340 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1340 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1340 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1340 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1340 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1340 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 4020 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 4020 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 3132 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 3132 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 3132 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 3132 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 3132 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 3132 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 3132 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 3132 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 3132 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 3132 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 3132 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 3132 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 3132 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 3132 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 3132 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 3132 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 3132 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 3132 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 3132 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 3132 2724 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\69039821a1257c39be2efa5c6438a4ca_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe8a7246f8,0x7ffe8a724708,0x7ffe8a7247182⤵PID:852
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,4348449498266995198,17874223603576167135,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:1340
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,4348449498266995198,17874223603576167135,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4020 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,4348449498266995198,17874223603576167135,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:3132
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,4348449498266995198,17874223603576167135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2760
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,4348449498266995198,17874223603576167135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:1608
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,4348449498266995198,17874223603576167135,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4116 /prefetch:82⤵PID:4864
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,4348449498266995198,17874223603576167135,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4116 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3896 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,4348449498266995198,17874223603576167135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4132 /prefetch:12⤵PID:3588
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,4348449498266995198,17874223603576167135,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:4504
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,4348449498266995198,17874223603576167135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4308 /prefetch:12⤵PID:1684
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,4348449498266995198,17874223603576167135,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3952 /prefetch:12⤵PID:5004
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,4348449498266995198,17874223603576167135,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1576
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2112
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD5bd5cf260a6fd83445195f0dffe9e279e
SHA17c6f45704e32611705a43f4ebf5f47addeaf4d56
SHA256fb5e2cc68c88c82fe82a47c912cd06dec7c81006da7be5cadd508c37d889742d
SHA51252452b66dfff2351b73950a690c4b25ffae956808f98106a30d04216905987d376cc5251884126090c3da87292d73537af3cb1835e67443d472005690f2ccc65
-
Filesize
6KB
MD56895fbe23c1c6dc3b58b1fc285e661be
SHA1b781e450936cf685c15f3ff11d2b8aac14ea68e9
SHA25649f2166f727fabb408e7ef5795a30cfcae79b48ac18bc40f54537b25fb275d23
SHA512424976942cc1a5c016dc57fe175eff54cd97c168daf5b48a0f416a7eb54aaee1a0e27869323975b24531f605f4f5f9da1ff2f5a0298766d9ef467e08d0b7a20c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD553cc455161e953eb8b5d16f16babd819
SHA14bb2b388aa72f00c0582e30aa0de83dd25072ccb
SHA256f2422b14884a8b6704fdcf4c030ce706a6f69af23beeac56ef3fa7ca94fed016
SHA5123ba1193fe3b85d823a51b30a6021a2f20a8c509b6d27e5659abab73bb66e521c7de54b94e951ea864c87b1be4d9766cd8bf5ca0d03d2dd5e43a22f9bf4b8a585
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e