Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 02:18
Static task
static1
Behavioral task
behavioral1
Sample
65aa003172354b375b84181f2f065534_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
65aa003172354b375b84181f2f065534_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65aa003172354b375b84181f2f065534_JaffaCakes118.html
-
Size
25KB
-
MD5
65aa003172354b375b84181f2f065534
-
SHA1
9f1cc87f5dc2f45b12c586c63213ab13d2e749ca
-
SHA256
6f7fae496dd408bfa061459ce1d18fbf79cbb5ab5e95ee52c913bd1bd8ba7722
-
SHA512
aedbd6f8af50222bd7541d652a0aa566b2647d6024c40e2bb99b9711f065090b02231e3ad829b73f05fc928ddb78872f489f14833c68fe88d026894450719672
-
SSDEEP
768:KnGSerwyKC++G4o2SSbg027oH1m5UBz/QzAJgn5in2/XBw:KnGSerwyKCC2SSc02oH1m5UBz/QzAJgE
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 752 msedge.exe 752 msedge.exe 4388 msedge.exe 4388 msedge.exe 4760 identity_helper.exe 4760 identity_helper.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4388 wrote to memory of 4332 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 4332 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3124 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3124 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3124 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3124 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3124 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3124 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3124 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3124 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3124 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3124 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3124 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3124 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3124 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3124 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3124 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3124 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3124 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3124 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3124 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3124 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3124 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3124 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3124 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3124 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3124 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3124 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3124 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3124 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3124 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3124 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3124 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3124 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3124 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3124 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3124 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3124 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3124 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3124 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3124 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3124 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 752 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 752 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 5116 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 5116 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 5116 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 5116 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 5116 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 5116 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 5116 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 5116 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 5116 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 5116 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 5116 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 5116 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 5116 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 5116 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 5116 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 5116 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 5116 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 5116 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 5116 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 5116 4388 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\65aa003172354b375b84181f2f065534_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd952e46f8,0x7ffd952e4708,0x7ffd952e47182⤵PID:4332
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1948,4559642269816338986,10273263395298554925,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1972 /prefetch:22⤵PID:3124
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1948,4559642269816338986,10273263395298554925,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2516 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:752 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1948,4559642269816338986,10273263395298554925,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:5116
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,4559642269816338986,10273263395298554925,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4908
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,4559642269816338986,10273263395298554925,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4272
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1948,4559642269816338986,10273263395298554925,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6088 /prefetch:82⤵PID:3408
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1948,4559642269816338986,10273263395298554925,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6088 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4760 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,4559642269816338986,10273263395298554925,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:3340
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,4559642269816338986,10273263395298554925,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:1000
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,4559642269816338986,10273263395298554925,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4520 /prefetch:12⤵PID:3980
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,4559642269816338986,10273263395298554925,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:12⤵PID:2232
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1948,4559642269816338986,10273263395298554925,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4980 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3220
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:948
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1344
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
182B
MD55fba847350341dc385c90bbd14b812f4
SHA1986d1713b103f3d565ccb88077a8598c8393a24e
SHA256ecb5860418331ce7b5253419ebab9fb495ab9dba26b7d0751699949555074372
SHA512227478553cd394c0ae057d78160c461119d7418765a14ab55ac18daec588ef8883c09c931adc149f380fead0a6e0e92cb0d6d8c29c27cacd63143b615b23e830
-
Filesize
5KB
MD596e06a372bbce7150ff4a12231fb543b
SHA14b6774a4eda46211d291f8b841c95c3c9a4de3e0
SHA2562d916d62d7532518fdd3625f8a194d6c8cad369497d015b35ec6177104f2dc88
SHA512d679bef724babc2bf8b813ba07f62982181d822f660fbb9958044c58b87eb14010a3d20ecda5f2db71c7ea80864fea2dd154726cf9c36df7cc9a3cca212266ec
-
Filesize
6KB
MD57a9e24a30d0310fb1cd937b81a4016a6
SHA109932c03527fe43b7de86a1c3adac674365a38f5
SHA256851a23d5710dd2ee6bfe8c85e0b979162431a48f85019664fac93a97e28f62a1
SHA512600f17bc76c583f9ba69a739072b33b4e5a7f1fa0349a21f4ec7ad9e05c66f8e0f5026c1f25e573181a6731c67fd77c429a63c96597d2fb10182bb0e506c8a29
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5892d523458c6100d07335fef31ab8e41
SHA1d2031934f0e7bb3870a2a35479baee38921b975c
SHA25639fec1452ad0858e6459a2e144b2ee379e85cdb82a2fcb3ac4b162f5979fd743
SHA512d8bd5590d7703c11ecba319390c6c04e542c7b7a3a94f851ac458b8cb85293914e0e4b288e5f1b2fcc3572f95e4fa08aa4d51f7771a5437ce2e331191883ac60
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e