Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 23:42
Static task
static1
Behavioral task
behavioral1
Sample
69081fd057c643d1db8a70b6eb89c270_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
69081fd057c643d1db8a70b6eb89c270_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
69081fd057c643d1db8a70b6eb89c270_JaffaCakes118.html
-
Size
213KB
-
MD5
69081fd057c643d1db8a70b6eb89c270
-
SHA1
df7415b764b7cdf783b4ee57527c270e8ff0acd2
-
SHA256
dc6c646f727227b463348bd714341b3f281650fdd3271041e330450a1bf5f054
-
SHA512
b45816a40bbac44ab693c928675eb0ebeb87aee92d90ac66b2fac41fc864ef2a00c9dd3d8cb453cac04ea0ffbb7ba96e5af1ed921b3f6a9284d0a49f163a7beb
-
SSDEEP
3072:SOytHtdmzzZk4WlHsn98z+yfkMY+BES09JXAnyrZalI+YQ:S5OknsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
msedge.exemsedge.exemsedge.exepid process 4168 msedge.exe 4168 msedge.exe 4820 msedge.exe 4820 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
msedge.exepid process 4820 msedge.exe 4820 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4820 wrote to memory of 2508 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 2508 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 4648 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 4648 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 4648 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 4648 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 4648 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 4648 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 4648 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 4648 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 4648 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 4648 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 4648 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 4648 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 4648 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 4648 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 4648 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 4648 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 4648 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 4648 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 4648 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 4648 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 4648 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 4648 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 4648 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 4648 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 4648 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 4648 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 4648 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 4648 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 4648 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 4648 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 4648 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 4648 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 4648 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 4648 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 4648 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 4648 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 4648 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 4648 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 4648 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 4648 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 4168 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 4168 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 3188 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 3188 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 3188 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 3188 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 3188 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 3188 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 3188 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 3188 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 3188 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 3188 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 3188 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 3188 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 3188 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 3188 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 3188 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 3188 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 3188 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 3188 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 3188 4820 msedge.exe msedge.exe PID 4820 wrote to memory of 3188 4820 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\69081fd057c643d1db8a70b6eb89c270_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdf58f46f8,0x7ffdf58f4708,0x7ffdf58f47182⤵PID:2508
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,3754208304122143367,470526164864875681,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:4648
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,3754208304122143367,470526164864875681,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4168 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,3754208304122143367,470526164864875681,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:82⤵PID:3188
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3754208304122143367,470526164864875681,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:2908
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3754208304122143367,470526164864875681,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:2620
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,3754208304122143367,470526164864875681,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3080 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2280
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:812
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD58e97e508b1f9b2bab877e8a6418dfce8
SHA143da950af0fc6e0d87c0169c7db07ab7f3fbdefc
SHA256ff0a60c769f7a7432cebfc4ec2eca6f8677444d64d19d49e77a7837428477d84
SHA5120f5d61c8990f996536ded0a3f699caa4e1be5598c60adadd0f687d1ceac15907b3f1dbe03d82e97164832dc27708430e0b0489fe370270bafbf8da47f281a8a3
-
Filesize
6KB
MD561efb67e5916e216bf71c66b61d4637c
SHA1a9e8cf9181bb94fe0b33855b5efba8219897f7ce
SHA256f46de3454baed43dfc72f04c05a8ba2361a65c409198d6d89fe3e45494aeef13
SHA5127c83bc71b4252ea143f8f906f18ee8bb11c3939a36992d73a32ee03e191ea82868a4a32f140156e36de13a2ed9000833f16f09691e8ebc94ff8d42e7c63ee2a7
-
Filesize
11KB
MD57de0e13cc03e2fcb3616f7e687513d62
SHA1bade7d64aa18d0c4f80d740b50fd26e6be8c19ec
SHA256907bf15228ea6595daf004a2d32b646330d79d9eefddf9ddadfdd4c4afdfaf07
SHA51264e08d8f078895b746ef04a4e97a3047db7cd4a8a234abf1e18caecd3e483b1e3458665745a6f98a2542b4024bd6bc42625ab924c0cc3aed34cd9078aacae3cd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e