Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 01:38
Static task
static1
Behavioral task
behavioral1
Sample
658c92809b6f8203826ae264bf4dd4f9_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
658c92809b6f8203826ae264bf4dd4f9_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
658c92809b6f8203826ae264bf4dd4f9_JaffaCakes118.html
-
Size
2KB
-
MD5
658c92809b6f8203826ae264bf4dd4f9
-
SHA1
04b8005fa19a955d5c21fed155531cc4cedafa60
-
SHA256
0695cd1574bed33ace77e99d5e957e437c91df556868d931e4cae79ea6edb6e6
-
SHA512
e14f6e4c6d46ebabcbce2b9c161745773e48404e88624b01f17e226a8fcc0e3e7725d21e9bc49bd80f91aa923b0694539c3de2bc6124b1dd77c6b44cdb21941d
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 3240 msedge.exe 3240 msedge.exe 3692 msedge.exe 3692 msedge.exe 4088 identity_helper.exe 4088 identity_helper.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3692 wrote to memory of 3296 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3296 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3016 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3016 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3016 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3016 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3016 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3016 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3016 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3016 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3016 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3016 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3016 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3016 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3016 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3016 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3016 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3016 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3016 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3016 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3016 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3016 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3016 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3016 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3016 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3016 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3016 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3016 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3016 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3016 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3016 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3016 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3016 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3016 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3016 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3016 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3016 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3016 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3016 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3016 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3016 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3016 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3240 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3240 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 2500 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 2500 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 2500 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 2500 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 2500 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 2500 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 2500 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 2500 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 2500 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 2500 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 2500 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 2500 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 2500 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 2500 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 2500 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 2500 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 2500 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 2500 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 2500 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 2500 3692 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\658c92809b6f8203826ae264bf4dd4f9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb84cd46f8,0x7ffb84cd4708,0x7ffb84cd47182⤵PID:3296
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,8064285338892154551,13177108358238226092,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:3016
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,8064285338892154551,13177108358238226092,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3240 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,8064285338892154551,13177108358238226092,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:2500
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8064285338892154551,13177108358238226092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3488
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8064285338892154551,13177108358238226092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2236
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,8064285338892154551,13177108358238226092,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5404 /prefetch:82⤵PID:4216
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,8064285338892154551,13177108358238226092,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5404 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4088 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8064285338892154551,13177108358238226092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:12⤵PID:5112
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8064285338892154551,13177108358238226092,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:4592
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8064285338892154551,13177108358238226092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4048 /prefetch:12⤵PID:1988
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8064285338892154551,13177108358238226092,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:4320
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,8064285338892154551,13177108358238226092,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2748 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:528
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2756
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\413aa9e1-2131-477f-b92d-70644e322f1e.tmp
Filesize6KB
MD5017c2f87b2f170d9c7f521325a33c184
SHA17e11b6f171a5cc0bb935867b469e5f9dbe1bbb3a
SHA256f5fc42305294c1e48d13fe519d23c973a7f6b51e07979b8e35a560c0135b9005
SHA51211d0f3c2c609a81c04b4c1004f169427d14f0fa606481038b38f664d423f47216cf168018725e78027c5225fc254d2228f11118e4ffdae896777393a7b2dc516
-
Filesize
5KB
MD5fe5feab0414b1a9f461cec88ec382eb1
SHA19d83d256fe87be9ce4ac01378f28a108fcd5cd9c
SHA25696e627828aaf1dc66de4b2b8c127d4cd7262eb612d88e9e220f5a5f8aff3295d
SHA512773b833239ce1a6bf73ca5ce80fd7074602f0d96c836909d2e05e9372b4c0dce3f03e93408fd385e31419039364b59041c481d20e9611f65e6ada577871b227b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58598947bedfaa2b243cfa6d23c3d304b
SHA17ab3696f6dcffbe8c284d78892bf1a6109fb7146
SHA256e8fc74643ab00e4dc91ddbef9343bbaad8bf98b31723f18f1e1cbdc9697c7266
SHA512dd04b5b6fa0595961b92c0ee067cffeb71d8ad86d0b3b5ea08bc50db25f53ca7233d23761d72dbfe597eb516b2954aa3022726728830fb8607c712f905016cc6