Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 23:44
Static task
static1
Behavioral task
behavioral1
Sample
690936c1b233778782fd9b4d9d010a6c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
690936c1b233778782fd9b4d9d010a6c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
690936c1b233778782fd9b4d9d010a6c_JaffaCakes118.html
-
Size
78KB
-
MD5
690936c1b233778782fd9b4d9d010a6c
-
SHA1
1ce9736c63a799f8cd273e78beb93481dcc402bc
-
SHA256
eb49a57ec9ad3a6349fa9859bc50160bebbbba4b19231cb6ea29bd08acc3f73a
-
SHA512
8be93200826ad84c65a709e41dd0e6f2f2725bbcde887f298c3f711588104a567bde2f37f97fa62464af9fd3d0748586c1cc7a5a7787bb9f61625729655a1298
-
SSDEEP
768:m2chuPvLO+8NXmr3QxlqBzwQlCCD5x8LxGdLLxfhteKSpM:whuPRgmr3QxlqBzwQIsLVfhQKSS
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 4716 msedge.exe 4716 msedge.exe 2944 msedge.exe 2944 msedge.exe 2220 identity_helper.exe 2220 identity_helper.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 2944 wrote to memory of 1432 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 1432 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3236 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3236 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3236 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3236 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3236 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3236 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3236 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3236 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3236 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3236 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3236 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3236 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3236 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3236 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3236 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3236 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3236 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3236 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3236 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3236 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3236 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3236 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3236 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3236 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3236 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3236 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3236 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3236 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3236 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3236 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3236 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3236 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3236 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3236 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3236 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3236 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3236 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3236 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3236 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3236 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 4716 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 4716 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3488 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3488 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3488 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3488 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3488 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3488 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3488 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3488 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3488 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3488 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3488 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3488 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3488 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3488 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3488 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3488 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3488 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3488 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3488 2944 msedge.exe msedge.exe PID 2944 wrote to memory of 3488 2944 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\690936c1b233778782fd9b4d9d010a6c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f56546f8,0x7ff8f5654708,0x7ff8f56547182⤵PID:1432
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,136837927899763441,10111498903171081474,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2024 /prefetch:22⤵PID:3236
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2004,136837927899763441,10111498903171081474,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2472 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4716 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2004,136837927899763441,10111498903171081474,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:3488
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,136837927899763441,10111498903171081474,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3404
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,136837927899763441,10111498903171081474,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4220
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,136837927899763441,10111498903171081474,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4636 /prefetch:12⤵PID:2632
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,136837927899763441,10111498903171081474,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵PID:4504
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,136837927899763441,10111498903171081474,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2220 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,136837927899763441,10111498903171081474,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:2868
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,136837927899763441,10111498903171081474,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:4736
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,136837927899763441,10111498903171081474,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5944 /prefetch:12⤵PID:4772
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,136837927899763441,10111498903171081474,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5964 /prefetch:12⤵PID:1652
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,136837927899763441,10111498903171081474,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1256 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3192
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3740
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2344
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\6cea4d9e-2f7d-4206-bae9-0ef0648fb726.tmp
Filesize180B
MD5e75179806fdb60b3337e8cd5b04cd6cf
SHA1434a695c7607996cc4d1a0698d9214afe4d9fd38
SHA256a121c6f8b11a0682ab639049f50ef2a1b00b3a2a565d7686cc64f501056b7b19
SHA512e1e2f888005696fb33453f369efda963c71c15270338db02d812a1ad503c1dfd2a0f693c3f6a02ca2abb7cad631524b0481141646353c7b39adf44b09bf8464f
-
Filesize
5KB
MD560c1e19f93a35499e126265f406efaa1
SHA1f5324f8e88d9ed0c4e9e4cea071bb7089098e7a0
SHA2569e5650878aa21479d71f576c4645f97f46b6c305a03aadb2b0e8650ee5584edb
SHA5126dbdedbfd657a8aee2f61c843172f4e9e67fcac785acccfc0c3753a7aba481441062c8502cc6b7b6fd100e346f1d3166fa6755846191a7bf284c846c84742a76
-
Filesize
6KB
MD50f47bda8bef5479694ac09dfa49530b5
SHA120e8a75ec0517d123de2c38a1c160263d3a6e655
SHA2564a193312dc290f7c8aa33254b7e6477556f296f8d6b8d6a73bd05c46795793ac
SHA512317187bd831aaeadb928b43c0d681a321bd575e38187569b600e35f9002dc228760f55f40ba73b476d424551dc0c1188a5917d8e671e2736b15b808f183a3a38
-
Filesize
368B
MD5d84cc6d66b3d42840fe67ce43ee3a5f5
SHA1adc4574a3ea4849c51b5acedeb2091ea2bc9866e
SHA2560e9b9bd231d0838d91afcbe7059a797a9bca8614b83ba13384ad59fdc0d8bb16
SHA512548d57080dbe67340f9b376c0def33241d5f713940bbc7869b0e8dd227db573616e19d8e1352cc30cc320553418c73b05b5408af7e59da8dafa7cdadea467aa5
-
Filesize
368B
MD543321030b8b9accd803e3a75ed0320a5
SHA1c073260c4bf1031534a68ad2630fd0ef588d1ff0
SHA256e45a1532e2c51cd11e6440bbac865d931df53484109244b422b7877b2a245d7d
SHA512099e496d6352aaf8b74638ff7b854405b89ed029b9364abb69b0a25dd0761909d57701cd1fc43cdae30ba9e235c6b16a0cbc3c6cb003888e4d42957cde9a0b79
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c4c4df8382d1881f841a0916a5b45095
SHA1c5c0bf2cfba09f08194dc29a0bd211c3a0328e3f
SHA256b90df0320fbaadfbba5f7ec2ae7cd8e4fbc7fff5864aba600ae6cb8f0197b0c1
SHA5128c43b2c33981b493f98a2259f7b7fc848f296340bf52c11caaa372472d5871197aa036f9d75aec66bf76832111ed14cb09172af165c3a479a41465e19d119c06
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e