Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 02:29
Static task
static1
Behavioral task
behavioral1
Sample
65b1006f3130caacc33f71d1cf73ce5d_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
65b1006f3130caacc33f71d1cf73ce5d_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65b1006f3130caacc33f71d1cf73ce5d_JaffaCakes118.html
-
Size
66KB
-
MD5
65b1006f3130caacc33f71d1cf73ce5d
-
SHA1
02cda3ad417b3d7d2b55bf0577cea284d61fa239
-
SHA256
ba66f21c0a2f8d95456575d52e35499daea6a08001e5b853235a8829327a9877
-
SHA512
1041a5055801640bf1f0f37d777d588d2c177a5fd70b3f08ca1342dac2815b3b38fca0e41e2307a147c5be15402d8e9a72f2c3a0ff988b22d42a899b12b3c6af
-
SSDEEP
768:DG3g/V1F6nFZH3DRAV5zwtC2wQP+Lz2xSaGTX9HjV322qHTeotfGGgheJzD:K+5ktGQGvos9DV3WdGGghetD
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 3944 msedge.exe 3944 msedge.exe 540 msedge.exe 540 msedge.exe 1944 identity_helper.exe 1944 identity_helper.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 540 wrote to memory of 3852 540 msedge.exe msedge.exe PID 540 wrote to memory of 3852 540 msedge.exe msedge.exe PID 540 wrote to memory of 976 540 msedge.exe msedge.exe PID 540 wrote to memory of 976 540 msedge.exe msedge.exe PID 540 wrote to memory of 976 540 msedge.exe msedge.exe PID 540 wrote to memory of 976 540 msedge.exe msedge.exe PID 540 wrote to memory of 976 540 msedge.exe msedge.exe PID 540 wrote to memory of 976 540 msedge.exe msedge.exe PID 540 wrote to memory of 976 540 msedge.exe msedge.exe PID 540 wrote to memory of 976 540 msedge.exe msedge.exe PID 540 wrote to memory of 976 540 msedge.exe msedge.exe PID 540 wrote to memory of 976 540 msedge.exe msedge.exe PID 540 wrote to memory of 976 540 msedge.exe msedge.exe PID 540 wrote to memory of 976 540 msedge.exe msedge.exe PID 540 wrote to memory of 976 540 msedge.exe msedge.exe PID 540 wrote to memory of 976 540 msedge.exe msedge.exe PID 540 wrote to memory of 976 540 msedge.exe msedge.exe PID 540 wrote to memory of 976 540 msedge.exe msedge.exe PID 540 wrote to memory of 976 540 msedge.exe msedge.exe PID 540 wrote to memory of 976 540 msedge.exe msedge.exe PID 540 wrote to memory of 976 540 msedge.exe msedge.exe PID 540 wrote to memory of 976 540 msedge.exe msedge.exe PID 540 wrote to memory of 976 540 msedge.exe msedge.exe PID 540 wrote to memory of 976 540 msedge.exe msedge.exe PID 540 wrote to memory of 976 540 msedge.exe msedge.exe PID 540 wrote to memory of 976 540 msedge.exe msedge.exe PID 540 wrote to memory of 976 540 msedge.exe msedge.exe PID 540 wrote to memory of 976 540 msedge.exe msedge.exe PID 540 wrote to memory of 976 540 msedge.exe msedge.exe PID 540 wrote to memory of 976 540 msedge.exe msedge.exe PID 540 wrote to memory of 976 540 msedge.exe msedge.exe PID 540 wrote to memory of 976 540 msedge.exe msedge.exe PID 540 wrote to memory of 976 540 msedge.exe msedge.exe PID 540 wrote to memory of 976 540 msedge.exe msedge.exe PID 540 wrote to memory of 976 540 msedge.exe msedge.exe PID 540 wrote to memory of 976 540 msedge.exe msedge.exe PID 540 wrote to memory of 976 540 msedge.exe msedge.exe PID 540 wrote to memory of 976 540 msedge.exe msedge.exe PID 540 wrote to memory of 976 540 msedge.exe msedge.exe PID 540 wrote to memory of 976 540 msedge.exe msedge.exe PID 540 wrote to memory of 976 540 msedge.exe msedge.exe PID 540 wrote to memory of 976 540 msedge.exe msedge.exe PID 540 wrote to memory of 3944 540 msedge.exe msedge.exe PID 540 wrote to memory of 3944 540 msedge.exe msedge.exe PID 540 wrote to memory of 4420 540 msedge.exe msedge.exe PID 540 wrote to memory of 4420 540 msedge.exe msedge.exe PID 540 wrote to memory of 4420 540 msedge.exe msedge.exe PID 540 wrote to memory of 4420 540 msedge.exe msedge.exe PID 540 wrote to memory of 4420 540 msedge.exe msedge.exe PID 540 wrote to memory of 4420 540 msedge.exe msedge.exe PID 540 wrote to memory of 4420 540 msedge.exe msedge.exe PID 540 wrote to memory of 4420 540 msedge.exe msedge.exe PID 540 wrote to memory of 4420 540 msedge.exe msedge.exe PID 540 wrote to memory of 4420 540 msedge.exe msedge.exe PID 540 wrote to memory of 4420 540 msedge.exe msedge.exe PID 540 wrote to memory of 4420 540 msedge.exe msedge.exe PID 540 wrote to memory of 4420 540 msedge.exe msedge.exe PID 540 wrote to memory of 4420 540 msedge.exe msedge.exe PID 540 wrote to memory of 4420 540 msedge.exe msedge.exe PID 540 wrote to memory of 4420 540 msedge.exe msedge.exe PID 540 wrote to memory of 4420 540 msedge.exe msedge.exe PID 540 wrote to memory of 4420 540 msedge.exe msedge.exe PID 540 wrote to memory of 4420 540 msedge.exe msedge.exe PID 540 wrote to memory of 4420 540 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\65b1006f3130caacc33f71d1cf73ce5d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffda88e46f8,0x7ffda88e4708,0x7ffda88e47182⤵PID:3852
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,9699770715432937628,5391637112673801271,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:976
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,9699770715432937628,5391637112673801271,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2356 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3944 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,9699770715432937628,5391637112673801271,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:4420
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9699770715432937628,5391637112673801271,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4648
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9699770715432937628,5391637112673801271,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3940
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9699770715432937628,5391637112673801271,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:4688
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,9699770715432937628,5391637112673801271,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5860 /prefetch:82⤵PID:2700
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,9699770715432937628,5391637112673801271,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5860 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1944 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9699770715432937628,5391637112673801271,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:12⤵PID:4348
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9699770715432937628,5391637112673801271,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:2456
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9699770715432937628,5391637112673801271,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:1808
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9699770715432937628,5391637112673801271,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:12⤵PID:2976
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,9699770715432937628,5391637112673801271,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4876 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4284
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4660
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
32KB
MD5f48baec69cc4dc0852d118259eff2d56
SHA1e64c6e4423421da5b35700154810cb67160bc32b
SHA256463d99ca5448f815a05b2d946ddae9eed3e21c335c0f4cfe7a16944e3512f76c
SHA51206fdccb5d9536ab7c68355dbf49ac02ebccad5a4ea01cb62200fd67728a6d05c276403e588a5bdceacf5e671913fc65b63e8b92456ca5493dae5b5a70e4a8b37
-
Filesize
268B
MD52380d14e16137a859787af4fb1047f30
SHA10e50828e3fd589b577155b9c73fbd84ab0e6d525
SHA256b0025896336300b477e700757414741a0e67ee78519e8f739e136d2e66d17fa4
SHA5125b98d77b8edd201061674ac961066bf95ac3b3214da14e72e59797c409064d242f0e108c2b9539549e032ae6c26c92dfead58d00813d136f3d834d428b7fb539
-
Filesize
5KB
MD593009a70e9c8a806e681d9b2c21cffe1
SHA1b48601a2f2626da27e3c2344875556af8987eb57
SHA2569672f9b7a9ac0982ee0c00d3b4211d6602accd3ca57a19f70ca79dd678974f01
SHA512c4f06c260255b941348f3dd85b1899fda4f2482658f99a0900df2da75c851d563846611f36f32e841d14b4ffe1dee2d24f5828221d4555026f5d6373cddbeb4b
-
Filesize
6KB
MD5c6929dfcdbd092ce9238b6f6bd0eba46
SHA108bb319039d3a8b2c61598df80c56875b1746f69
SHA25607a34e26faa5a55714a65a9866f6262d033e04480e3c428528fab87e74443a4e
SHA51251e1987d16d1a469b8437b487ff261ef13e75c744a27d7a8a26b01e83ca1530bf6ff7a451a51c0f3d5f48bf11591c23f4d71b9cb646e220471bd64cce41deb1a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD573e143db1ae24f4453eda2d80d194790
SHA147ee977e7463b716c122a24adbef5b3c1ca888b9
SHA25669160167649a4b39738231ab697485212b1070c09e4edb5430f6b1c6b4f32363
SHA512206685fbe361e1ea6a481518acb1315126bdc5a07a44a6597ec41b69dc2dae7d39fa3663e888ab171a885fc1bf09e52fa26cd9094c92f891307667ea0690dd87
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e