Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 03:30
Static task
static1
Behavioral task
behavioral1
Sample
65dbc26e5bf2856e8ebb1a92cfe996e1_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
65dbc26e5bf2856e8ebb1a92cfe996e1_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65dbc26e5bf2856e8ebb1a92cfe996e1_JaffaCakes118.html
-
Size
87KB
-
MD5
65dbc26e5bf2856e8ebb1a92cfe996e1
-
SHA1
739be925102a792f51faa0daa723784940dcb9fa
-
SHA256
1bb235ac97544dad4dbc7066156c1d58caa5909a96155aa03c1087c530bd59b9
-
SHA512
7c96a453a8290fcbb16148a3c28eab4958d5703a81d102b6eb63ba282df4faa2908fa8f2126e8a6db55d086493b25b69ce50657eed5bd91810fa476d11445642
-
SSDEEP
1536:8ETDU7QwBF9FGzUy4UvULOInobw0ih67wcHZVJCI1LFPrSGHI6yleoZfEwpU46mi:8UoBF9FGzUy4UcLOInXet/4/rplBMX5P
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 1648 msedge.exe 1648 msedge.exe 4632 msedge.exe 4632 msedge.exe 2812 identity_helper.exe 2812 identity_helper.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4632 wrote to memory of 5112 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 5112 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1104 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1104 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1104 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1104 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1104 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1104 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1104 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1104 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1104 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1104 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1104 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1104 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1104 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1104 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1104 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1104 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1104 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1104 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1104 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1104 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1104 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1104 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1104 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1104 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1104 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1104 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1104 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1104 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1104 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1104 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1104 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1104 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1104 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1104 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1104 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1104 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1104 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1104 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1104 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1104 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1648 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1648 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1704 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1704 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1704 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1704 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1704 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1704 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1704 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1704 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1704 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1704 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1704 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1704 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1704 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1704 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1704 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1704 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1704 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1704 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1704 4632 msedge.exe msedge.exe PID 4632 wrote to memory of 1704 4632 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\65dbc26e5bf2856e8ebb1a92cfe996e1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffedb2d46f8,0x7ffedb2d4708,0x7ffedb2d47182⤵PID:5112
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,12985911058568958286,13117070779733839742,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:1104
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,12985911058568958286,13117070779733839742,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1648 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,12985911058568958286,13117070779733839742,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:1704
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12985911058568958286,13117070779733839742,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:5088
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12985911058568958286,13117070779733839742,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3104
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12985911058568958286,13117070779733839742,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:3392
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,12985911058568958286,13117070779733839742,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 /prefetch:82⤵PID:1112
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,12985911058568958286,13117070779733839742,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2812 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12985911058568958286,13117070779733839742,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:3324
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12985911058568958286,13117070779733839742,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:2568
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12985911058568958286,13117070779733839742,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4600 /prefetch:12⤵PID:576
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12985911058568958286,13117070779733839742,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5872 /prefetch:12⤵PID:4640
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,12985911058568958286,13117070779733839742,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2684 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3340
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1344
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
1KB
MD5cf817efc59b9c5dd5e54257000ba593e
SHA19c1e92cb55ce06f978e39ba10e581d15ac92a8db
SHA256214c8a9da5e9433e17dea2d217982d042720c2a3966d3cae5586dcc7a80c105b
SHA5128b3446768685d2604582bb66b664d029d9d8feaf30470bb3560ffdd02d89b8f6af6e2aaf84aa525b949a46f3ea690ff2a55433461c22b47bb63503ce7888e5ae
-
Filesize
5KB
MD553b2077bc861bfd2a64ceb67e3854920
SHA1ab90446a96558d29990749e63e1576cebfe6b17d
SHA25680ed6b9ce826d2efda3fe2b1683a95c00a5a50663ac20268ef78bfde05244dc9
SHA51225ccf562c0c1717925a22f07790f0c5c3e6ffcc06ae4d419e093df93a21c14734878dea73726af544a5c83e50c8656a34cd2a8b9b1ff69f7b215a155d657cc3c
-
Filesize
6KB
MD5a1885694638bfb3e71176a2cc777304b
SHA1f16fa1ff38a64bd012a9209f2ea578f6dfadee05
SHA2567d974e43c0de7146ad30095869a0781ddf2b800c3617a0db66949cf65eb15d9c
SHA5128b227a4b25071724338ac46bb3e84b9eca25ace0aae2f5767c60b052c3e80091388f2dc5e48f8515dea522c1f17c5e35d9db24fbbe81413f8d3103005447dc32
-
Filesize
1KB
MD5acb489d1ad163fdf1aa79b5a5e9669ca
SHA1bfd4edd314033be346abf32823cce584c946090b
SHA25610f0a8ed07a0e8ad73b4fb1087a88104934357ce1492366fd73b22887dfba1c9
SHA5125d5ff206c68039b6a236fa4627e401c0d0a2de62262a314688b0045fc922978ef8c3391b5acb32a1e91f9ec9e374d597418625f0951c08ae78430abf0dd9e2ca
-
Filesize
1KB
MD5785afd21a1dc235a3bc016c3b4cfa194
SHA116dce0c6fb646ae08175dde03ee56f586b77509a
SHA25625e690ce4c178f32b2c6be967a216f5697925245b26536bcb455e37ef4fdbfec
SHA51231a21efa60d296b8e4db0cd61b19ddb067bb982cd30b44dcbe0df2053a961ec5b2d7fb31e7cd6293ed44d4a990becf88a324aa72b85c105b9124abc24275c249
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD55565daf18721c31b86def3e077071672
SHA17a9679f8d24eb91669a2005dc838b7be294305d0
SHA2569c24da92d059ee92988ae1d39e0661345d528ea1ff34ecb92f3e48b599883f91
SHA512712dbcf02887e4644f34229161538a63128dff8dfe1316bc247a6205747e67d5d258640cda5703133ea0d079db9705e1aa355364a000f40574464864638a25ad
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e