Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 02:01
Static task
static1
Behavioral task
behavioral1
Sample
659f4784510dda10f72cb19562521a7a_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
659f4784510dda10f72cb19562521a7a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
659f4784510dda10f72cb19562521a7a_JaffaCakes118.html
-
Size
460KB
-
MD5
659f4784510dda10f72cb19562521a7a
-
SHA1
a621705f2643b97df5a1ef27143857262c37980f
-
SHA256
95666e422c91bbc0bf3a32b9c35a22d60a77b7f0d084f38bf9adde86a5a1b599
-
SHA512
af16d187fc1957a71ac12518b3698e67e40d5fede242ca1b50c874f79ad71fc0a0d2de0aa021ccc52a725fef3597f8ef7ccb7e10687d30b1e3bd624aa35f0979
-
SSDEEP
6144:SSsMYod+X3oI+YQsMYod+X3oI+YssMYod+X3oI+YLsMYod+X3oI+YQ:b5d+X3Q5d+X3w5d+X315d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 3708 msedge.exe 3708 msedge.exe 1436 msedge.exe 1436 msedge.exe 2144 identity_helper.exe 2144 identity_helper.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1436 wrote to memory of 3108 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 3108 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 3276 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 3276 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 3276 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 3276 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 3276 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 3276 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 3276 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 3276 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 3276 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 3276 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 3276 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 3276 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 3276 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 3276 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 3276 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 3276 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 3276 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 3276 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 3276 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 3276 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 3276 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 3276 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 3276 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 3276 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 3276 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 3276 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 3276 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 3276 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 3276 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 3276 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 3276 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 3276 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 3276 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 3276 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 3276 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 3276 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 3276 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 3276 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 3276 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 3276 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 3708 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 3708 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 2612 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 2612 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 2612 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 2612 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 2612 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 2612 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 2612 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 2612 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 2612 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 2612 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 2612 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 2612 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 2612 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 2612 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 2612 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 2612 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 2612 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 2612 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 2612 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 2612 1436 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\659f4784510dda10f72cb19562521a7a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff825a646f8,0x7ff825a64708,0x7ff825a647182⤵PID:3108
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,9063480690742740816,9655990093391413283,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:3276
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,9063480690742740816,9655990093391413283,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2424 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3708 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,9063480690742740816,9655990093391413283,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:2612
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9063480690742740816,9655990093391413283,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2468
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9063480690742740816,9655990093391413283,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4944
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,9063480690742740816,9655990093391413283,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:82⤵PID:1268
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,9063480690742740816,9655990093391413283,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2144 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9063480690742740816,9655990093391413283,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:2480
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9063480690742740816,9655990093391413283,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:5060
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9063480690742740816,9655990093391413283,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4076 /prefetch:12⤵PID:3740
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9063480690742740816,9655990093391413283,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:212
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,9063480690742740816,9655990093391413283,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:640
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1396
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4504
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD591e2a5e67b98930f178d393b1b13e5b8
SHA1e21da9890086a3cb85326ffbf9f8c75af3b0cb39
SHA256b6b0193e841597a2e237337d2553c9d5820a67700ff4bbc276e1d243b88c2285
SHA5124d5e9fbf78e77e8eeec6c2368bf0b2df04ae270de82494e7ca488d6599673ebc139c1bb5f3599a81bb2bd7e7699430b1221639b2a24a10d8c77b27616dbed777
-
Filesize
6KB
MD5846d98db71b42f17555583b74801adfa
SHA1ab2e986bd384163d0554c6a0c3862299d1b66379
SHA25696b21736036da9a4fb8d48ded3e1881f08b38373b61826d943db9ede9a07c6b7
SHA512fbd0759b31e15c2d6e392bd15098bac98ca611abc5d93f9890a4aee6f11de4c7b261fb3d3475500b84bf69397aecf553b6944a3585d0c9125ee51e4ea2989347
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5358faf9ffa5797166448d110fedcd3da
SHA1118e5147b0ef453a2b1ef51cfd6dc1b8834a3517
SHA256e0dec6c9bc5d05578849f3921f630dc729bbeffc674807bf825efcd030932cf7
SHA51233126c3ff73d413d51fe4fd639f8a80113a8799a559806633e696e5d21665efa01c12eb5279856617ac56f4b6e14bb3d2fdaf24182853a4063ee24114df89fc4
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e