Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 01:53
Static task
static1
Behavioral task
behavioral1
Sample
65989d622bc1045219b9582fcb8e72e1_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
65989d622bc1045219b9582fcb8e72e1_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65989d622bc1045219b9582fcb8e72e1_JaffaCakes118.html
-
Size
139KB
-
MD5
65989d622bc1045219b9582fcb8e72e1
-
SHA1
3e2095247a249838d4aec5e6879ba018ade9a1c5
-
SHA256
8ce17e7d0312549ce1f5684fb5454532b6aecfc8c6a644a216c2a6b7908d8351
-
SHA512
2307f3e7374a7b2091107d3f6d4e6b34a8e229d1f1650d1b1dfa8281e11df10245cfdd5e5b0df22899d2077f0c1462f9c0d4cd0d710e73207cdd9c7301ad9604
-
SSDEEP
3072:NmvvAj1ddwmqPn4G+7rs55nItaCpRLW/clulhfOVYKcCP:NMAjbd1qPnU9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
msedge.exemsedge.exemsedge.exepid process 2032 msedge.exe 2032 msedge.exe 3432 msedge.exe 3432 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
msedge.exepid process 3432 msedge.exe 3432 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3432 wrote to memory of 4212 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 4212 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 392 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 392 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 392 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 392 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 392 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 392 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 392 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 392 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 392 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 392 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 392 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 392 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 392 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 392 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 392 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 392 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 392 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 392 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 392 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 392 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 392 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 392 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 392 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 392 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 392 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 392 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 392 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 392 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 392 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 392 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 392 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 392 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 392 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 392 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 392 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 392 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 392 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 392 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 392 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 392 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 2032 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 2032 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 4584 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 4584 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 4584 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 4584 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 4584 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 4584 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 4584 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 4584 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 4584 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 4584 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 4584 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 4584 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 4584 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 4584 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 4584 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 4584 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 4584 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 4584 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 4584 3432 msedge.exe msedge.exe PID 3432 wrote to memory of 4584 3432 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\65989d622bc1045219b9582fcb8e72e1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f93d46f8,0x7ff8f93d4708,0x7ff8f93d47182⤵PID:4212
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1956,2314454499675229732,6464296756916263584,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1976 /prefetch:22⤵PID:392
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1956,2314454499675229732,6464296756916263584,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2060 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2032 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1956,2314454499675229732,6464296756916263584,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:4584
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,2314454499675229732,6464296756916263584,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3428
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,2314454499675229732,6464296756916263584,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:3048
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1956,2314454499675229732,6464296756916263584,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6976 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2136
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2076
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2256
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\54d1501b-dd42-4eaf-bf41-57164a086eb1.tmp
Filesize6KB
MD575aab6b1bcf64311e241fce0395bd57a
SHA1921c42b63a6277b6adab692a032860d4d9002101
SHA25679580db6f8fdc4fa22b77f2700ab3e2806dd9c2d191685ecd34213a20fb60d93
SHA512ef9a2de1edf1da02db05355c93716e0564e9abe864cda7a847e035979cf18bb0e5c2d8de0d02dea899286a9b9226ea2e810943441aba5c3a9cc2cbd1e46b8b44
-
Filesize
40KB
MD5d341cf3b1ddddac3246c84c1a2df349b
SHA1f84ef997181a0fff3438e06acd25eb45d8f8659b
SHA25643ccae8f9c4d8a4e6875e871ff4ba260abb391a538c5ea8c2b0e40d44b896867
SHA5125feadf7db053ec83bf2f77353f8be066067534ac80593be49f965443e77ef84bc145c39cf110a994f163a01d2ea1be9420d4fab4b7861ebd9f6194d00610365e
-
Filesize
40KB
MD5d844730d63e899e316a973f2a8fedf72
SHA1b71a6e434e3d1407cf643176258a8c57d8ee1bb2
SHA256666797a6079bec3324ff547673ec4ab70f6648979a276a16bc4b7f3089b905b9
SHA512c3393faecd8c249f120ea52b83970636e0df2d575d3881056fb729cdd1eddc71fc626adeed170259f633b1559eef80b658ece6ebb5deee2ecaa4f041dc529e4b
-
Filesize
33KB
MD5c641b177b5f7cc6b5eb4c1dae8fb16d4
SHA12ae12ba1967a156cbe94e558d019b7875e64348d
SHA25615dc3dec9132846abf304dfb87a2d63a42d0c1beb0d00e579d30074e44b5a668
SHA512ba9efc405a84ba85496c51c1e0630acef634574bf514d4a886b6e63868f2ab69c87157fb2a7edb5002ea291fd632dc37cb50e1980ca2df9d59e85b0f318b4296
-
Filesize
675B
MD5ef8f1cfaa80c122be730f8ce7ba87dcb
SHA18254cc542254f510fff0f72df7b5cf9a7b2d3d90
SHA25699f469e7889aa72cc5b329d5106388c3d5fe4b9c17f2989176711f827a8ecb01
SHA512619b80098684fadaeef37b09ca12c075a4c1c6806188a7c6517c591d7624165abe35ac9f606d2a2d247a6b84390e7a04da7090518e282a24209f496dbfbc7341
-
Filesize
5KB
MD59b33a66066819715c47dcf741dbb89b1
SHA188c82ede0f3b08d41cc4b9669955436876b507d8
SHA256691cec8c418629ba28a5aef4a2d9e6e1b43720ffb81f23f5ce31c1e7885523b8
SHA51281f2b2b78a63335a7ad6db8455c2e9ca2f8dba55729e4883631604f898ab23dd37b6453bb1c6dac56b40c9a1faf5bb0f03c00f4744d2033fe5300b40cf39b490
-
Filesize
11KB
MD5856ad397e722112a549eda85ff44a601
SHA1f5254f27c14d1a3212b7ac54d80387a9804f1f61
SHA256fde656c1bd32fb776d94e85165feba79cb3c3ed38d8b1df4b74795ec7150890d
SHA5128b1cdebc66fb2fb4aa4e7e69ad920bdd7e45d8aa938e2da9ddbdfbc532a3f0c10350c3d903ce4d31e950a71954abc4ef61062688efab1f5627b5c714f284ee8e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e