Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 03:32
Static task
static1
Behavioral task
behavioral1
Sample
65dc83bc0b23f297aac8d7ca09120a68_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
65dc83bc0b23f297aac8d7ca09120a68_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65dc83bc0b23f297aac8d7ca09120a68_JaffaCakes118.html
-
Size
68KB
-
MD5
65dc83bc0b23f297aac8d7ca09120a68
-
SHA1
6c091ce8201fa6496165e3bafde58af7ddf4014a
-
SHA256
c758c5bd2b30d36e4cb956fc05e431a68b92f323e10548d326e4930a6fee68d1
-
SHA512
c5315462f39b241b50efc200dd8a9c069c06f64e67ab0350ad7c34ed8b00181c4abc810ff62c9cdb3da5747f1ab493879fd6cdb0a5de94e05ca0d70679508b3b
-
SSDEEP
1536:aCC+yfE+NWIvvRqhg+sVbDijrhzt2i6MqcBV5f6bO5JT9gQ+51fuXUP2YGvU/RuX:svli7H05UJ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 652 msedge.exe 652 msedge.exe 4788 msedge.exe 4788 msedge.exe 1208 identity_helper.exe 1208 identity_helper.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4788 wrote to memory of 3920 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 3920 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2188 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2188 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2188 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2188 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2188 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2188 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2188 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2188 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2188 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2188 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2188 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2188 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2188 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2188 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2188 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2188 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2188 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2188 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2188 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2188 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2188 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2188 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2188 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2188 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2188 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2188 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2188 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2188 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2188 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2188 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2188 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2188 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2188 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2188 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2188 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2188 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2188 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2188 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2188 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2188 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 652 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 652 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2024 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2024 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2024 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2024 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2024 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2024 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2024 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2024 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2024 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2024 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2024 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2024 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2024 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2024 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2024 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2024 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2024 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2024 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2024 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2024 4788 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\65dc83bc0b23f297aac8d7ca09120a68_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffffc5d46f8,0x7ffffc5d4708,0x7ffffc5d47182⤵PID:3920
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2256,4349029871007737797,3715999660193852357,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2264 /prefetch:22⤵PID:2188
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2256,4349029871007737797,3715999660193852357,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:652 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2256,4349029871007737797,3715999660193852357,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:2024
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,4349029871007737797,3715999660193852357,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4440
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,4349029871007737797,3715999660193852357,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3752
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,4349029871007737797,3715999660193852357,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:5016
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2256,4349029871007737797,3715999660193852357,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5640 /prefetch:82⤵PID:4820
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2256,4349029871007737797,3715999660193852357,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5640 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1208 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,4349029871007737797,3715999660193852357,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:4028
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,4349029871007737797,3715999660193852357,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:4908
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,4349029871007737797,3715999660193852357,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4108 /prefetch:12⤵PID:3788
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,4349029871007737797,3715999660193852357,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:4860
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2256,4349029871007737797,3715999660193852357,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2460 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3864
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:852
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4836
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
988B
MD5d9f12353d6f94e85524acfea73b5e313
SHA1aaacf4215e7bf89f29f02e100371308a930e3d50
SHA2565695c7f8f52e7ee9db13ceb31eac5270bc0d978e0cc21fd7c8620bfa3c72043a
SHA512d60886875472a17ebb821c76aeab065144ba1912dfe97f72f0fc752eaa8f4619615d09aa2c835f9348a877a6b48327e2fe8701c7798ed339ee9d5893d6cd101e
-
Filesize
5KB
MD5ff9029fe5c883b0bbc825b9e5da5535b
SHA1ab6bc200925eeefcdbaeff98ca0d57825dc6815a
SHA256bf551dee3487319f3eb21d7c4daf10cd783693cbcc64cd4f8e515f98cb1c4229
SHA512b59494cd4335b685152513144e78a137d286b3d63bbc7881dc835de6002560b61454e58a720dc3a1fc2cd52f3e5b83628514112734fad49fcc6eae34ef0d898c
-
Filesize
7KB
MD582868d18ca22d255cf6a41e771176edd
SHA122f8e1f640e3027452d41d3567b8b022dcecd48b
SHA2565ec7714452a10abccf11ab171e738dfc877ad0148cd61a390baa293328ffbeed
SHA51204bea31ce371a3a987057b5a95ad7cf25d99392f1fa51dfe9a29bf83cca2fe9052bb71bd1dd1ee5189e828bcbfefe32f95ce5c7e33d4341c2134a7d78129e82c
-
Filesize
6KB
MD564b2f9ec5409686bce1104ae36b9436f
SHA16c63b99d75f8dcbff01dfc9cc02bdf3fbd63e2ac
SHA2563df994c9f5e5904a268c5ff27a6df21f5b3adfbb6584966e7f75d7f5643d79a7
SHA5121af3e8e1c994109e83baca14756aae034775648c3415b4c0ed1bc95763a1c699592d9f946216c651e94a6495ef8da5f357b68709de8a99b56c379aeb02dcd087
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5770290c0a3df2a9d2104af3bc4d6c6c4
SHA1c68ca3d946d691b06a0b351e29fa9ea4f85e6585
SHA25683e02655c66e2fb02665ec4fafbfa7e386f1f373eb25c5ed9235ba9769db9454
SHA5123cdef479afd5d2286a8891905859646a5d9e607e0be5edf380fc49f5fc1f63f6b57555356773634adbdb9a920cff36f80911017697c54ac5039d3b5c828d8e88
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e