Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 03:30
Static task
static1
Behavioral task
behavioral1
Sample
65dbb4d6f11961d65ea966b83f241160_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
65dbb4d6f11961d65ea966b83f241160_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65dbb4d6f11961d65ea966b83f241160_JaffaCakes118.html
-
Size
142KB
-
MD5
65dbb4d6f11961d65ea966b83f241160
-
SHA1
fe2122a8d5fac8149271eaa6fa3812f881f038fe
-
SHA256
bdf127dca5f3530b5a34b0678f88362c47f3c592d6dd0190b88736094ac4326a
-
SHA512
47534967ec5fce8e33782a54f6ea027963638163698e26fbfd7b252798b792a44d6974c22e4b4fc9ce18c69aba0ebb1ba5eebb515aca4ca128fe754b98b9f41e
-
SSDEEP
1536:S/NBgfJNpc0fr2aLMHoea9NRS9XQwYXN5wDaTA:S/UfC6eH8daDak
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
msedge.exemsedge.exemsedge.exepid process 4204 msedge.exe 4204 msedge.exe 4308 msedge.exe 4308 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
Processes:
msedge.exepid process 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4308 wrote to memory of 4476 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 4476 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 2044 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 2044 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 2044 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 2044 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 2044 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 2044 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 2044 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 2044 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 2044 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 2044 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 2044 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 2044 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 2044 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 2044 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 2044 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 2044 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 2044 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 2044 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 2044 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 2044 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 2044 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 2044 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 2044 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 2044 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 2044 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 2044 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 2044 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 2044 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 2044 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 2044 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 2044 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 2044 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 2044 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 2044 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 2044 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 2044 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 2044 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 2044 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 2044 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 2044 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 4204 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 4204 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 3132 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 3132 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 3132 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 3132 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 3132 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 3132 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 3132 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 3132 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 3132 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 3132 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 3132 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 3132 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 3132 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 3132 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 3132 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 3132 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 3132 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 3132 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 3132 4308 msedge.exe msedge.exe PID 4308 wrote to memory of 3132 4308 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\65dbb4d6f11961d65ea966b83f241160_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9b7db46f8,0x7ff9b7db4708,0x7ff9b7db47182⤵PID:4476
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,1465974873824390221,1070617585271211565,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:2044
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,1465974873824390221,1070617585271211565,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4204 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,1465974873824390221,1070617585271211565,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:3132
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,1465974873824390221,1070617585271211565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4244
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,1465974873824390221,1070617585271211565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:1248
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,1465974873824390221,1070617585271211565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1980 /prefetch:12⤵PID:4232
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,1465974873824390221,1070617585271211565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2820 /prefetch:12⤵PID:1612
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,1465974873824390221,1070617585271211565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5944 /prefetch:12⤵PID:1540
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,1465974873824390221,1070617585271211565,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2424 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5040
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:840
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5d3d0bec98afce8b282aa2516391a8887
SHA1e69c16b171b5f0d0efd98de7e731ce510d0e6273
SHA256b52cce0f10935e3a6b43c6605b82f692154ab065fe58dc37dc4e4cef672efc9b
SHA51280771d440edbcb9d55d06f0fa71fd340701c4b9fbb6636e5af43fd53ddf83f2c450a1aaf546827462900ee18a008435263aa62b4dd12dea665e111fbbb3eac27
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
466B
MD5639389d9f04ed6123633fffe73ebb7a2
SHA1d5ea4346a4017482d5b673fd81f4d713714f6189
SHA2566a2941b2b2e1e7580f288e843754045e1cbda8cdb9a27c62d623f5472b750d78
SHA51256d97fa1c1d974e6709d6149cdec8e829c3d284bda1f13717fd0868d10fed946362af28d8bf5fe66267132d4ad99b0cc6c6e110d3c84231f886b6294206c7126
-
Filesize
5KB
MD5631db4675f9ccb7a4703f68b308f5eb0
SHA19064681fb92eb19cf49ecb9f2f9f11747914e8cb
SHA256c82dae57a6d8ea2f5311003719e4d9fdc9340f31283eb9f4530d2b9b8cfe5c74
SHA512bd29f9c4a9350f9295246155a2166eb08aa2d151a807a7af8d00fb333919110909108712f1625bae011907b73527e26ce37c7265a111a88d3900b7ec9b5bfd69
-
Filesize
6KB
MD5846798b2b6f42d0d5ec405e56d2518fa
SHA16c8c373c236e68788e1f8b6a2ebc1a6e991209ce
SHA256ebc293c58a422f2c973cb36f877064496ec68c829c5a53eadcf99a36026c1da9
SHA5122a5352d856f12bb19091f94226e432ef63e45ee5868de1146a8b1cb78beae90181c867723536047e42d6b4bdb7bd90725a90ba14357e9857126360a9c7de8c7c
-
Filesize
11KB
MD55bf8570420a28a23819d1a6224571246
SHA1f66e6db20ada2d5fc8f1424dfd1be79c70b365e3
SHA256a476a0d1adb473f3d7deb67b3295de79f44335e4dd6eb1898702da93621795d1
SHA512beda5ab6b7c8a50ef6541fb136966508bfb39d7f636b8fd8b0dcb0158c6f7590d91a4a85a4fefd8611458769498ba8012746a9b738cb87942899e7c430e55426
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e