Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 03:29
Static task
static1
Behavioral task
behavioral1
Sample
65db5b57027921d40a8a73bf94eba176_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
65db5b57027921d40a8a73bf94eba176_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65db5b57027921d40a8a73bf94eba176_JaffaCakes118.html
-
Size
18KB
-
MD5
65db5b57027921d40a8a73bf94eba176
-
SHA1
4b554820f74ad948342d2759ab2a519e38c8ed9e
-
SHA256
f4f47a35a9957d9cffef9624e9a868954510f460d0b39aa70e528a679bda4e8a
-
SHA512
216e267b8a44e228e104c145c43d20f75a0a18dff25db17610c22c622d6b4c5281046bf82d24e781466d098668a57e51ad66518c53b5f49a9c062bfd4efff20b
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIB4xzUnjBhfx82qDB8:SIMd0I5nvHhsvf6xDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
msedge.exemsedge.exemsedge.exepid process 3360 msedge.exe 3360 msedge.exe 4812 msedge.exe 4812 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
msedge.exepid process 4812 msedge.exe 4812 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4812 wrote to memory of 5080 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 5080 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3280 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3280 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3280 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3280 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3280 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3280 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3280 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3280 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3280 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3280 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3280 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3280 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3280 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3280 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3280 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3280 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3280 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3280 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3280 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3280 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3280 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3280 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3280 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3280 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3280 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3280 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3280 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3280 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3280 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3280 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3280 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3280 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3280 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3280 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3280 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3280 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3280 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3280 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3280 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3280 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3360 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3360 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3656 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3656 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3656 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3656 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3656 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3656 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3656 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3656 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3656 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3656 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3656 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3656 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3656 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3656 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3656 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3656 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3656 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3656 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3656 4812 msedge.exe msedge.exe PID 4812 wrote to memory of 3656 4812 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\65db5b57027921d40a8a73bf94eba176_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff936df46f8,0x7ff936df4708,0x7ff936df47182⤵PID:5080
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,2310972763483376451,10057671879574674643,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:3280
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,2310972763483376451,10057671879574674643,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3360 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,2310972763483376451,10057671879574674643,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2628 /prefetch:82⤵PID:3656
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2310972763483376451,10057671879574674643,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:2036
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2310972763483376451,10057671879574674643,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:2152
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,2310972763483376451,10057671879574674643,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4784 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3328
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3364
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
5KB
MD5aa4954f9de7cdb661e2b7fc1599aa8c6
SHA1d1eeac0f0295166c82e45061cf197aea71640ccc
SHA25693f97bc540c103908238394618aa2064557b8378d3639f3e00683da3afe80238
SHA51209f58e87caf48e0c1296ae40c53ce01d0d6392be5dfa9ada5cab6d3c1ffac8ad11d62921fbab2c34a26f5f2eac7414294047936106b5cc841acc43f6a5cdd42e
-
Filesize
6KB
MD5b16006eedda836f1f91998179aebeed2
SHA12f354487d33dc2ef154ded6cb1ebfe8e1521a4b1
SHA2565807d53d904079b4f4284c2b607db18d2207885d3b9c61cb940a55abd43cd526
SHA512639a5a35bf2e0d4b6a51cef34ad6081e19aad011be612e8adabd1ec500ad6126dd100c8a0cc6a3eb28fd9abcc93cf838647b4789e0047aaf7b03739b9b360d46
-
Filesize
6KB
MD5bcac42a67ffaf4d66a2d8915878fcfe3
SHA1d82fae61f272b9017a16d76fe6dd67ce6e5515c3
SHA2565d1a03ae87e50a5edc8de281c05fa6ca12bd41189fab323235cc5e913f2f74b7
SHA512e79c82b3f15595d3b541e85a0f6e9a6cf94f16ae00d016a1f3f1d3cbaad37cd3f2b390ad35bb387d4ba24740405eb3ff954da974228b60b09b4e9ac4ffa0ddb3
-
Filesize
11KB
MD5ba5271763273a40486a29fd65f2039fb
SHA14cbf6780cfd9b8f5292f0f7d696f185c25f7a137
SHA2565b6769e3f49c7490dd7edbb7f1ab1a2494fe76cf021569cb0ae7c46816689471
SHA512806062a07e1e7cd8e6ad8940b8183779477ce0ec8bda8f4b1597b34420c93d1950e7607aa8bd185685d0e6edc120953feef788a582e6ee0aa2885fd137f93cfa
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e