Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 01:43
Static task
static1
Behavioral task
behavioral1
Sample
65906f28cf01f11289f9fbe2a1afbb51_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
65906f28cf01f11289f9fbe2a1afbb51_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65906f28cf01f11289f9fbe2a1afbb51_JaffaCakes118.html
-
Size
94KB
-
MD5
65906f28cf01f11289f9fbe2a1afbb51
-
SHA1
29639c7f2c6bf29453c2f530b2431cd9d6a0a285
-
SHA256
f374bf2c0cb7432a2de01acb0f91de1e73bd54587d151c2bf1771d1825b70e4c
-
SHA512
b9ca9780bb9bb4f57502e8f30124e587ba7fad4fc8cbbeff33f5e60e01170554018a8d7b07632ee25de69a081eb1432575da28980636cfdc86882a1876905ee3
-
SSDEEP
1536:WMLiNgFL6VS8jBZMnanWdPANBIp7LAfAyaFXZbhBdkrY8mgHC+qpEyW:WAiTyhBdkrY8mgHC+qpEyW
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 3092 msedge.exe 3092 msedge.exe 760 msedge.exe 760 msedge.exe 3532 identity_helper.exe 3532 identity_helper.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 760 wrote to memory of 1448 760 msedge.exe msedge.exe PID 760 wrote to memory of 1448 760 msedge.exe msedge.exe PID 760 wrote to memory of 5084 760 msedge.exe msedge.exe PID 760 wrote to memory of 5084 760 msedge.exe msedge.exe PID 760 wrote to memory of 5084 760 msedge.exe msedge.exe PID 760 wrote to memory of 5084 760 msedge.exe msedge.exe PID 760 wrote to memory of 5084 760 msedge.exe msedge.exe PID 760 wrote to memory of 5084 760 msedge.exe msedge.exe PID 760 wrote to memory of 5084 760 msedge.exe msedge.exe PID 760 wrote to memory of 5084 760 msedge.exe msedge.exe PID 760 wrote to memory of 5084 760 msedge.exe msedge.exe PID 760 wrote to memory of 5084 760 msedge.exe msedge.exe PID 760 wrote to memory of 5084 760 msedge.exe msedge.exe PID 760 wrote to memory of 5084 760 msedge.exe msedge.exe PID 760 wrote to memory of 5084 760 msedge.exe msedge.exe PID 760 wrote to memory of 5084 760 msedge.exe msedge.exe PID 760 wrote to memory of 5084 760 msedge.exe msedge.exe PID 760 wrote to memory of 5084 760 msedge.exe msedge.exe PID 760 wrote to memory of 5084 760 msedge.exe msedge.exe PID 760 wrote to memory of 5084 760 msedge.exe msedge.exe PID 760 wrote to memory of 5084 760 msedge.exe msedge.exe PID 760 wrote to memory of 5084 760 msedge.exe msedge.exe PID 760 wrote to memory of 5084 760 msedge.exe msedge.exe PID 760 wrote to memory of 5084 760 msedge.exe msedge.exe PID 760 wrote to memory of 5084 760 msedge.exe msedge.exe PID 760 wrote to memory of 5084 760 msedge.exe msedge.exe PID 760 wrote to memory of 5084 760 msedge.exe msedge.exe PID 760 wrote to memory of 5084 760 msedge.exe msedge.exe PID 760 wrote to memory of 5084 760 msedge.exe msedge.exe PID 760 wrote to memory of 5084 760 msedge.exe msedge.exe PID 760 wrote to memory of 5084 760 msedge.exe msedge.exe PID 760 wrote to memory of 5084 760 msedge.exe msedge.exe PID 760 wrote to memory of 5084 760 msedge.exe msedge.exe PID 760 wrote to memory of 5084 760 msedge.exe msedge.exe PID 760 wrote to memory of 5084 760 msedge.exe msedge.exe PID 760 wrote to memory of 5084 760 msedge.exe msedge.exe PID 760 wrote to memory of 5084 760 msedge.exe msedge.exe PID 760 wrote to memory of 5084 760 msedge.exe msedge.exe PID 760 wrote to memory of 5084 760 msedge.exe msedge.exe PID 760 wrote to memory of 5084 760 msedge.exe msedge.exe PID 760 wrote to memory of 5084 760 msedge.exe msedge.exe PID 760 wrote to memory of 5084 760 msedge.exe msedge.exe PID 760 wrote to memory of 3092 760 msedge.exe msedge.exe PID 760 wrote to memory of 3092 760 msedge.exe msedge.exe PID 760 wrote to memory of 732 760 msedge.exe msedge.exe PID 760 wrote to memory of 732 760 msedge.exe msedge.exe PID 760 wrote to memory of 732 760 msedge.exe msedge.exe PID 760 wrote to memory of 732 760 msedge.exe msedge.exe PID 760 wrote to memory of 732 760 msedge.exe msedge.exe PID 760 wrote to memory of 732 760 msedge.exe msedge.exe PID 760 wrote to memory of 732 760 msedge.exe msedge.exe PID 760 wrote to memory of 732 760 msedge.exe msedge.exe PID 760 wrote to memory of 732 760 msedge.exe msedge.exe PID 760 wrote to memory of 732 760 msedge.exe msedge.exe PID 760 wrote to memory of 732 760 msedge.exe msedge.exe PID 760 wrote to memory of 732 760 msedge.exe msedge.exe PID 760 wrote to memory of 732 760 msedge.exe msedge.exe PID 760 wrote to memory of 732 760 msedge.exe msedge.exe PID 760 wrote to memory of 732 760 msedge.exe msedge.exe PID 760 wrote to memory of 732 760 msedge.exe msedge.exe PID 760 wrote to memory of 732 760 msedge.exe msedge.exe PID 760 wrote to memory of 732 760 msedge.exe msedge.exe PID 760 wrote to memory of 732 760 msedge.exe msedge.exe PID 760 wrote to memory of 732 760 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\65906f28cf01f11289f9fbe2a1afbb51_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff54f946f8,0x7fff54f94708,0x7fff54f947182⤵PID:1448
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,3785587469128415209,7199128180173707338,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:5084
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,3785587469128415209,7199128180173707338,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3092 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,3785587469128415209,7199128180173707338,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:82⤵PID:732
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3785587469128415209,7199128180173707338,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3060
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3785587469128415209,7199128180173707338,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2068
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,3785587469128415209,7199128180173707338,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 /prefetch:82⤵PID:4124
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,3785587469128415209,7199128180173707338,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3532 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3785587469128415209,7199128180173707338,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:3548
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3785587469128415209,7199128180173707338,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:1316
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3785587469128415209,7199128180173707338,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:2272
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3785587469128415209,7199128180173707338,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:1300
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,3785587469128415209,7199128180173707338,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4352
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2968
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2272
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
178B
MD5efb3e41ddcb00d4e436d59962fe73c4d
SHA14b9f2cbd664cf2136cd6966774f9ee04b4efa46a
SHA256edc776d59064e412098066a07cba55cbabb1e7d18534e1292d34003961ad3bb6
SHA51285a53139125a0e589b222ebee00d1c593eb24c8059b9f3f86196f8ef346cf7fc988493bb6f5cebf7aec2d0debc5017eff291b04e8aa37180d1ec5a6e2bb362ba
-
Filesize
5KB
MD5cac7c4bb0bc7274fcbd2636c9f3b96aa
SHA1c6f7f9215841818f4c3f3a50551d29f9ea2c97db
SHA256a39bc875a899103dfe2ec677f79f2f5dc4053880910ac8721131659cee61fc29
SHA512d54b718bc8a48d44bbab942ec2a4c46715b09e70ce300412f041904a57e53abfbfc01207fb0dd6977515b2f8a6c0bd206d1a0995075c8c96ae815efeecc58e5e
-
Filesize
6KB
MD5bdd0298361b299ae997568a4d630e4e1
SHA15926801030c4d7b64ac36a876742d48e83faa1a5
SHA2560f1d23df917579eedd6d836c3b6f4a3f3d3e189422e9bb75a051f65ca5c2f56b
SHA51236c0e1bcd119f3d8aba1d01a315f1dfffbb19d602a33efadbde8ead2f7cf3c5a94f24d34f14efe780b60a3ac1213b2b2df263b6ad23a1228897672346c71a2dc
-
Filesize
6KB
MD5b645ffac51175e5ad7f1c39ab4b3a807
SHA1b65c301b7a5763360b69411c48e5378d7d3b816e
SHA2566f6310cce73b850d36b36e9db2aa4a2a403c30186121b2377d7c65794cbddb33
SHA512c5af01445b3ec1bc39e46f164de76e834c5d6374bf94c9055cc5c0dfc281482ee1a404bb1ea5bfbcf7cd730136cc8f6ccf9990c43f25348ab88c4f770e1df0c0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59810ea0f4d0fac02747439191ada8e5a
SHA1dd536c759579ea29385d995c5008677770d3cc58
SHA25642b188ee42003c431257a5428ad9564bff30f7e298accb6a5f42a82ccd23f329
SHA512f0af7dc1a581c41278eaf3ca11873a6df16f2955523755bc7f291a4a973769eff81017e6a2f2cd3e13342a54f8c8474911ec8f0bd094d60fa2b4a1d5ef0b6c7b
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e