Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 02:33
Static task
static1
Behavioral task
behavioral1
Sample
65b498e79911794ab9267fb8ed46327f_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
65b498e79911794ab9267fb8ed46327f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65b498e79911794ab9267fb8ed46327f_JaffaCakes118.html
-
Size
24KB
-
MD5
65b498e79911794ab9267fb8ed46327f
-
SHA1
fe4977b1af91c8c2f2e26d208ebc4822ef28f2bb
-
SHA256
1aea22f1d44c6dff0621741a2e1655e20f0c42b27fe642f9991e467db34f61e7
-
SHA512
b91c98e1c270e358233798726bf3142d98b17f49a0fbda38227ad23db5f5add88772e142bf62be708da55609f2c5a9e8a914a7e4c54a03d4b599b3fedf9973ca
-
SSDEEP
768:09fA6dt54+leyLgRAviTwgd8yrDuBjHhXQeZvU/:04qa+LSObm8Iad9vZvo
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 408 msedge.exe 408 msedge.exe 552 msedge.exe 552 msedge.exe 880 identity_helper.exe 880 identity_helper.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 552 wrote to memory of 4836 552 msedge.exe msedge.exe PID 552 wrote to memory of 4836 552 msedge.exe msedge.exe PID 552 wrote to memory of 3280 552 msedge.exe msedge.exe PID 552 wrote to memory of 3280 552 msedge.exe msedge.exe PID 552 wrote to memory of 3280 552 msedge.exe msedge.exe PID 552 wrote to memory of 3280 552 msedge.exe msedge.exe PID 552 wrote to memory of 3280 552 msedge.exe msedge.exe PID 552 wrote to memory of 3280 552 msedge.exe msedge.exe PID 552 wrote to memory of 3280 552 msedge.exe msedge.exe PID 552 wrote to memory of 3280 552 msedge.exe msedge.exe PID 552 wrote to memory of 3280 552 msedge.exe msedge.exe PID 552 wrote to memory of 3280 552 msedge.exe msedge.exe PID 552 wrote to memory of 3280 552 msedge.exe msedge.exe PID 552 wrote to memory of 3280 552 msedge.exe msedge.exe PID 552 wrote to memory of 3280 552 msedge.exe msedge.exe PID 552 wrote to memory of 3280 552 msedge.exe msedge.exe PID 552 wrote to memory of 3280 552 msedge.exe msedge.exe PID 552 wrote to memory of 3280 552 msedge.exe msedge.exe PID 552 wrote to memory of 3280 552 msedge.exe msedge.exe PID 552 wrote to memory of 3280 552 msedge.exe msedge.exe PID 552 wrote to memory of 3280 552 msedge.exe msedge.exe PID 552 wrote to memory of 3280 552 msedge.exe msedge.exe PID 552 wrote to memory of 3280 552 msedge.exe msedge.exe PID 552 wrote to memory of 3280 552 msedge.exe msedge.exe PID 552 wrote to memory of 3280 552 msedge.exe msedge.exe PID 552 wrote to memory of 3280 552 msedge.exe msedge.exe PID 552 wrote to memory of 3280 552 msedge.exe msedge.exe PID 552 wrote to memory of 3280 552 msedge.exe msedge.exe PID 552 wrote to memory of 3280 552 msedge.exe msedge.exe PID 552 wrote to memory of 3280 552 msedge.exe msedge.exe PID 552 wrote to memory of 3280 552 msedge.exe msedge.exe PID 552 wrote to memory of 3280 552 msedge.exe msedge.exe PID 552 wrote to memory of 3280 552 msedge.exe msedge.exe PID 552 wrote to memory of 3280 552 msedge.exe msedge.exe PID 552 wrote to memory of 3280 552 msedge.exe msedge.exe PID 552 wrote to memory of 3280 552 msedge.exe msedge.exe PID 552 wrote to memory of 3280 552 msedge.exe msedge.exe PID 552 wrote to memory of 3280 552 msedge.exe msedge.exe PID 552 wrote to memory of 3280 552 msedge.exe msedge.exe PID 552 wrote to memory of 3280 552 msedge.exe msedge.exe PID 552 wrote to memory of 3280 552 msedge.exe msedge.exe PID 552 wrote to memory of 3280 552 msedge.exe msedge.exe PID 552 wrote to memory of 408 552 msedge.exe msedge.exe PID 552 wrote to memory of 408 552 msedge.exe msedge.exe PID 552 wrote to memory of 3672 552 msedge.exe msedge.exe PID 552 wrote to memory of 3672 552 msedge.exe msedge.exe PID 552 wrote to memory of 3672 552 msedge.exe msedge.exe PID 552 wrote to memory of 3672 552 msedge.exe msedge.exe PID 552 wrote to memory of 3672 552 msedge.exe msedge.exe PID 552 wrote to memory of 3672 552 msedge.exe msedge.exe PID 552 wrote to memory of 3672 552 msedge.exe msedge.exe PID 552 wrote to memory of 3672 552 msedge.exe msedge.exe PID 552 wrote to memory of 3672 552 msedge.exe msedge.exe PID 552 wrote to memory of 3672 552 msedge.exe msedge.exe PID 552 wrote to memory of 3672 552 msedge.exe msedge.exe PID 552 wrote to memory of 3672 552 msedge.exe msedge.exe PID 552 wrote to memory of 3672 552 msedge.exe msedge.exe PID 552 wrote to memory of 3672 552 msedge.exe msedge.exe PID 552 wrote to memory of 3672 552 msedge.exe msedge.exe PID 552 wrote to memory of 3672 552 msedge.exe msedge.exe PID 552 wrote to memory of 3672 552 msedge.exe msedge.exe PID 552 wrote to memory of 3672 552 msedge.exe msedge.exe PID 552 wrote to memory of 3672 552 msedge.exe msedge.exe PID 552 wrote to memory of 3672 552 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\65b498e79911794ab9267fb8ed46327f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff936df46f8,0x7ff936df4708,0x7ff936df47182⤵PID:4836
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,10505559132355617227,6265047364589990237,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:3280
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,10505559132355617227,6265047364589990237,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:408 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,10505559132355617227,6265047364589990237,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:3672
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10505559132355617227,6265047364589990237,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:3288
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10505559132355617227,6265047364589990237,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4568
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,10505559132355617227,6265047364589990237,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:82⤵PID:4044
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,10505559132355617227,6265047364589990237,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:880 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10505559132355617227,6265047364589990237,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:2540
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10505559132355617227,6265047364589990237,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:3240
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10505559132355617227,6265047364589990237,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3636 /prefetch:12⤵PID:532
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10505559132355617227,6265047364589990237,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:3212
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,10505559132355617227,6265047364589990237,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1764 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1028
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:916
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
5KB
MD50407ed32de76544aec30aa85dade5656
SHA1569fb7a40ae6c23a1cf847870f165c62e6169003
SHA25623b6f3207604b64c42b597b2225e6dbed7787432942bebd5221306b6ddf90d56
SHA5129d9481669c8bcc567d9c8f1ff6159baf84d7450b0ea68163fe41b106c03acecdd2c8296e46753129f349498f7ab16e79bbdb6008304f4738b2dcf6b5a1c815c3
-
Filesize
6KB
MD55eff0aa06a3a5786ea16a3f49c692b95
SHA15ee4bbe6a9a20eb70d3b247d5ecdc7faa588287d
SHA256d0b5fcf900b5603a62dc2e4798221504281521e7828dabb044905438ab88f120
SHA5127336bb2e99a80800cfae9b6052592d5445b19515e416ef26e085e97e86f9dd51c589b9820d0b99f436ed3d47e0a5415ac5d2a9c008081d3ca7b17b7b86b797a7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54c91f7c57f669aaf9f4f844ca5d13a06
SHA144cdba30b59db4edcb30b50b57d785582debb783
SHA256725ea4c09f5fe655a8d1205a740500aee62978996f380a23e7bdd05c5ec9f67e
SHA5127379d93aa4d87e922961074620060ca311f0d1bbd9df8317814034e59dcd8f104911acb3b72e1ab5dba45a64f70c24ae12c866385e665aeb3272f76f2b90b8f0
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e