Analysis
-
max time kernel
145s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 01:09
Static task
static1
Behavioral task
behavioral1
Sample
65781085e5da44993a94968b68f087f5_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
65781085e5da44993a94968b68f087f5_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65781085e5da44993a94968b68f087f5_JaffaCakes118.html
-
Size
1KB
-
MD5
65781085e5da44993a94968b68f087f5
-
SHA1
3a2b4df2b0a1a5f684a67fdd2d0090ee108d7e90
-
SHA256
b0aeda70671320da4dd7277a94466dbe2e119fc4ad9d7661aa9cb6c34ac7e34a
-
SHA512
821960914b3d66e07fd00d163c66b289361e7b6fee7f0f6e3ee74d295b228e3d005beb60efd645abbd8df6cef41eff572be2ca17633ce9424817c638ca396037
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 3024 msedge.exe 3024 msedge.exe 5092 msedge.exe 5092 msedge.exe 1972 identity_helper.exe 1972 identity_helper.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 5092 wrote to memory of 1556 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 1556 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 3956 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 3956 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 3956 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 3956 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 3956 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 3956 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 3956 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 3956 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 3956 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 3956 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 3956 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 3956 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 3956 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 3956 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 3956 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 3956 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 3956 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 3956 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 3956 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 3956 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 3956 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 3956 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 3956 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 3956 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 3956 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 3956 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 3956 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 3956 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 3956 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 3956 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 3956 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 3956 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 3956 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 3956 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 3956 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 3956 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 3956 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 3956 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 3956 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 3956 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 3024 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 3024 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 4444 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 4444 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 4444 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 4444 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 4444 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 4444 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 4444 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 4444 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 4444 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 4444 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 4444 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 4444 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 4444 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 4444 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 4444 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 4444 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 4444 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 4444 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 4444 5092 msedge.exe msedge.exe PID 5092 wrote to memory of 4444 5092 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\65781085e5da44993a94968b68f087f5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffea93746f8,0x7ffea9374708,0x7ffea93747182⤵PID:1556
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,10290743034798856233,16606878704012202389,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:3956
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,10290743034798856233,16606878704012202389,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3024 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,10290743034798856233,16606878704012202389,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:4444
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,10290743034798856233,16606878704012202389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:3000
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,10290743034798856233,16606878704012202389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:4036
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,10290743034798856233,16606878704012202389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4644 /prefetch:12⤵PID:2012
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,10290743034798856233,16606878704012202389,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5396 /prefetch:82⤵PID:2212
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,10290743034798856233,16606878704012202389,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5396 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1972 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,10290743034798856233,16606878704012202389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4888 /prefetch:12⤵PID:3088
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,10290743034798856233,16606878704012202389,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:3324
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,10290743034798856233,16606878704012202389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:12⤵PID:4324
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,10290743034798856233,16606878704012202389,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:4532
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,10290743034798856233,16606878704012202389,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5044 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4468
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:436
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
5KB
MD5c1957f40879f070894059b245a010ca9
SHA19939b5a8791b6e29a1203a7e41515a7a4908c7a1
SHA256f79f3386d3a1e8dd0b6dbdd016ef2f4ab185c281ea1d407d01c196cc4833f1f0
SHA51220400a11d4a15bc963db58d5a025ce3e4e8d227b27722d3f0cfcd0a9238879f687989b6c1bf3513a1c963e334860459ac4cd431b69a2e76ec932ecb31ba68808
-
Filesize
6KB
MD5790d81a68326e32b9a9705e0eb6459b8
SHA1e3b65cd08c1264760ee5464235ad93a608f72208
SHA25676be4d65ce3392fc35e287822a5abdebe27827d663c627b45a547fa790dc9615
SHA5120d230de39d59aeadf105c933b16f2940cb908e5b3c86464a496f0c69b8c21b24269202d9714b7a0a00e60d75147a32b6ca22fd067de931bc277c24a8d63a6467
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59a6fc0f79dfef0256ba73dd8e38473f3
SHA1bf8cf0bad9e26c1de7931fa21d5159393c3228c8
SHA256c5bcbbb1326977775f2876a4500e91296174ebcb3dcb75fd05cd152fe625d4da
SHA512984302ff42301bb610c4d06490a145b5a1fe6649e72c36b68d7235583caf7b768ebac6faef6b6ef0ad3cc0655f3cb1805a590cf3d900cab4af4e7c2950ddcf55
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e