Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 00:32
Static task
static1
Behavioral task
behavioral1
Sample
655aed1945291adcce1f2939ee818e61_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
655aed1945291adcce1f2939ee818e61_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
655aed1945291adcce1f2939ee818e61_JaffaCakes118.html
-
Size
8KB
-
MD5
655aed1945291adcce1f2939ee818e61
-
SHA1
db5342b7976468ae4976221f4c918e80d60ee320
-
SHA256
12295382134eeab3d51a101eb79bb67057de30679df847e3d9b2727da6db90ea
-
SHA512
bc61047adcf8486e335f5ad57c563b31280a2ffa209df7d8b253289b2dbae80461e7fdbc2447ad9a9099062db1351ab0e47cb891c6b3f394074e4dd888b3c5e4
-
SSDEEP
192:1Ly80VkZPSqN+NMoWiqLzxOL85blS0za7Au65XHKZeQ2jwasDmWiXCXrijLpNNLe:1LylVktvNgbWUL85blS0za7Au65XHKZ9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 2724 msedge.exe 2724 msedge.exe 116 msedge.exe 116 msedge.exe 4008 identity_helper.exe 4008 identity_helper.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 116 wrote to memory of 4888 116 msedge.exe msedge.exe PID 116 wrote to memory of 4888 116 msedge.exe msedge.exe PID 116 wrote to memory of 1408 116 msedge.exe msedge.exe PID 116 wrote to memory of 1408 116 msedge.exe msedge.exe PID 116 wrote to memory of 1408 116 msedge.exe msedge.exe PID 116 wrote to memory of 1408 116 msedge.exe msedge.exe PID 116 wrote to memory of 1408 116 msedge.exe msedge.exe PID 116 wrote to memory of 1408 116 msedge.exe msedge.exe PID 116 wrote to memory of 1408 116 msedge.exe msedge.exe PID 116 wrote to memory of 1408 116 msedge.exe msedge.exe PID 116 wrote to memory of 1408 116 msedge.exe msedge.exe PID 116 wrote to memory of 1408 116 msedge.exe msedge.exe PID 116 wrote to memory of 1408 116 msedge.exe msedge.exe PID 116 wrote to memory of 1408 116 msedge.exe msedge.exe PID 116 wrote to memory of 1408 116 msedge.exe msedge.exe PID 116 wrote to memory of 1408 116 msedge.exe msedge.exe PID 116 wrote to memory of 1408 116 msedge.exe msedge.exe PID 116 wrote to memory of 1408 116 msedge.exe msedge.exe PID 116 wrote to memory of 1408 116 msedge.exe msedge.exe PID 116 wrote to memory of 1408 116 msedge.exe msedge.exe PID 116 wrote to memory of 1408 116 msedge.exe msedge.exe PID 116 wrote to memory of 1408 116 msedge.exe msedge.exe PID 116 wrote to memory of 1408 116 msedge.exe msedge.exe PID 116 wrote to memory of 1408 116 msedge.exe msedge.exe PID 116 wrote to memory of 1408 116 msedge.exe msedge.exe PID 116 wrote to memory of 1408 116 msedge.exe msedge.exe PID 116 wrote to memory of 1408 116 msedge.exe msedge.exe PID 116 wrote to memory of 1408 116 msedge.exe msedge.exe PID 116 wrote to memory of 1408 116 msedge.exe msedge.exe PID 116 wrote to memory of 1408 116 msedge.exe msedge.exe PID 116 wrote to memory of 1408 116 msedge.exe msedge.exe PID 116 wrote to memory of 1408 116 msedge.exe msedge.exe PID 116 wrote to memory of 1408 116 msedge.exe msedge.exe PID 116 wrote to memory of 1408 116 msedge.exe msedge.exe PID 116 wrote to memory of 1408 116 msedge.exe msedge.exe PID 116 wrote to memory of 1408 116 msedge.exe msedge.exe PID 116 wrote to memory of 1408 116 msedge.exe msedge.exe PID 116 wrote to memory of 1408 116 msedge.exe msedge.exe PID 116 wrote to memory of 1408 116 msedge.exe msedge.exe PID 116 wrote to memory of 1408 116 msedge.exe msedge.exe PID 116 wrote to memory of 1408 116 msedge.exe msedge.exe PID 116 wrote to memory of 1408 116 msedge.exe msedge.exe PID 116 wrote to memory of 2724 116 msedge.exe msedge.exe PID 116 wrote to memory of 2724 116 msedge.exe msedge.exe PID 116 wrote to memory of 3520 116 msedge.exe msedge.exe PID 116 wrote to memory of 3520 116 msedge.exe msedge.exe PID 116 wrote to memory of 3520 116 msedge.exe msedge.exe PID 116 wrote to memory of 3520 116 msedge.exe msedge.exe PID 116 wrote to memory of 3520 116 msedge.exe msedge.exe PID 116 wrote to memory of 3520 116 msedge.exe msedge.exe PID 116 wrote to memory of 3520 116 msedge.exe msedge.exe PID 116 wrote to memory of 3520 116 msedge.exe msedge.exe PID 116 wrote to memory of 3520 116 msedge.exe msedge.exe PID 116 wrote to memory of 3520 116 msedge.exe msedge.exe PID 116 wrote to memory of 3520 116 msedge.exe msedge.exe PID 116 wrote to memory of 3520 116 msedge.exe msedge.exe PID 116 wrote to memory of 3520 116 msedge.exe msedge.exe PID 116 wrote to memory of 3520 116 msedge.exe msedge.exe PID 116 wrote to memory of 3520 116 msedge.exe msedge.exe PID 116 wrote to memory of 3520 116 msedge.exe msedge.exe PID 116 wrote to memory of 3520 116 msedge.exe msedge.exe PID 116 wrote to memory of 3520 116 msedge.exe msedge.exe PID 116 wrote to memory of 3520 116 msedge.exe msedge.exe PID 116 wrote to memory of 3520 116 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\655aed1945291adcce1f2939ee818e61_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe902246f8,0x7ffe90224708,0x7ffe902247182⤵PID:4888
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,2807715684578057480,12762705177399129007,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:22⤵PID:1408
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2208,2807715684578057480,12762705177399129007,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2724 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2208,2807715684578057480,12762705177399129007,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:3520
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,2807715684578057480,12762705177399129007,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:2588
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,2807715684578057480,12762705177399129007,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:4976
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,2807715684578057480,12762705177399129007,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2452 /prefetch:82⤵PID:3084
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,2807715684578057480,12762705177399129007,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2452 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4008 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,2807715684578057480,12762705177399129007,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:4432
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,2807715684578057480,12762705177399129007,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:3956
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,2807715684578057480,12762705177399129007,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3468 /prefetch:12⤵PID:4028
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,2807715684578057480,12762705177399129007,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3540 /prefetch:12⤵PID:4448
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,2807715684578057480,12762705177399129007,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2320 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3188
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4204
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
674B
MD5ecfad1f951a00b2925c2f04257256fd2
SHA1df167b7cc49af434e505a4cff47d45c387b058c2
SHA2563cd6eb30df0845a67665942f38449055dbb3b5dcbb158c70c37443ba96e0cb63
SHA5124da5164fb1086fda469f90f83d5db32ae6d325bce3a79f671e6fe671a0ea5a25ab1d39b6e132a6d8b0cdf7c5d950c47bc6419dd2098df2f49f613fdae4c916ae
-
Filesize
830B
MD56046a5d27cd50a6ca37e0199dfd893d9
SHA159ab0f32fd54785a6d0447e160dc1ced5126850c
SHA25672718f2d34b897d1dff29e6e5859fcfdc8db39d634c855119e2d2c6b6c874ada
SHA512c8dacc0b7d8d2a04b585f98bef1ed0f213f55a1412825af713df1c45b64f399ca529a9b65bd0e5aaf740b757b43a127cd1e50b05b8357aedad3c00a795b49d03
-
Filesize
5KB
MD5ae47bb5c321bfcf3eca504477d607f5b
SHA1586551813b700f5abb054d8e5c33a2ed40d39852
SHA2568c1820b7cf77ad4d1ee9c6816d965481dc8820aaea3db2be45b686ef7eed7380
SHA512eeeeb8c18d3294a2ad5a92da033320db2a271210c311bfbaf56a69cd6e544fb33f11fd46ee231ee3a4e9b4efb8121ba39c09727a87b3473c97971c450a96e9e4
-
Filesize
6KB
MD50f75e3eac2e610fffdec73f9d0770f8a
SHA1e5a26134d80a896c0b01a89046cda17855726854
SHA256c98daf4291bf12d579a144f940e07640583e14f24ce6712564401525f225154e
SHA51276b75f90db5b1a6072d60f27a1339918aabd4a0d9e1427b85b3b40a63ffd1fb1cbdc828f856c563283367ee65a0dafe7de37788c63d8de192bee63e90052667e
-
Filesize
538B
MD5dd6f478359a2939afac67e3225061c4b
SHA125815fabfc333ef96ac59e5b2bf535f4ae7f93c2
SHA25677795622dad1f45c3f32f5294c24c62598e64eb080d546fd86e8e1f7b7225ed9
SHA512c7f4f718897e628f70a83a3e1640003c305a30dd34307d6388e4b0521d574d3a0ecf72d6a8f6b1b95cdf277e087d339795d5f8252936998bd3676c636f81f5c1
-
Filesize
370B
MD55fd27955aa089b983c12a7b9975ebc96
SHA1da596680d3fabc37f7a3ab10257177232b60047d
SHA256d904355d0c69cee1c17d7dafc42f74b57de13b58a4fcd83843fbecd2e5097484
SHA5123d424cd154779b33d170b1ff47d68db613856fda22b1c7f58122f0af3c35f9c82d1f18fe9c5b5d6b6c7aa84c52e1524e4b19540336d3c7ac963dfa2e6413668c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57e789e34c28943a3942d66dfc3bcf72b
SHA135e8ca83fb38a52e1093d1c2b7c9c074287c8e66
SHA25642d682b7073ab1e459f5a971866bac45252e04628a908a488f21e2bfa2914068
SHA5122c8427a21d1d112b913dc40a15ef282bec514c0e6db16f2119d3231954200d248ba4b9f34df0c8e1dcea2caf1151020964fa086c7264e4a86da9b2f1284f1995
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e