Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 03:43
Static task
static1
Behavioral task
behavioral1
Sample
65e396488b2147d5547daceded8be0fd_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
65e396488b2147d5547daceded8be0fd_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65e396488b2147d5547daceded8be0fd_JaffaCakes118.html
-
Size
21KB
-
MD5
65e396488b2147d5547daceded8be0fd
-
SHA1
53c1ef59bc3557e30546e8019525310a458f76cb
-
SHA256
1d557b7390da5b9380e7fdeff5a9c09408317ec1f23d3fe9b0782e84c678197f
-
SHA512
c00b6c2220d8dd30e01bb86ae969c5796828c44f153573911f1553ce870a2b693a0b94a46312f2dc84b1ccd17780197777ffe0d5d547d3b43c6b5518a7e09e5f
-
SSDEEP
384:kVUcqpQYfFbMP0HHo/ESC5G9o61X0XIAQIAe+tgTCzkcl0z:k+V6YfFbMcnT3Cn1k9ue0gTCUz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 4448 msedge.exe 4448 msedge.exe 3628 msedge.exe 3628 msedge.exe 1900 identity_helper.exe 1900 identity_helper.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3628 wrote to memory of 4544 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 4544 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 4976 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 4976 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 4976 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 4976 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 4976 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 4976 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 4976 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 4976 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 4976 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 4976 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 4976 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 4976 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 4976 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 4976 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 4976 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 4976 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 4976 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 4976 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 4976 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 4976 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 4976 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 4976 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 4976 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 4976 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 4976 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 4976 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 4976 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 4976 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 4976 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 4976 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 4976 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 4976 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 4976 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 4976 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 4976 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 4976 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 4976 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 4976 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 4976 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 4976 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 4448 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 4448 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 3752 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 3752 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 3752 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 3752 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 3752 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 3752 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 3752 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 3752 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 3752 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 3752 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 3752 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 3752 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 3752 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 3752 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 3752 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 3752 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 3752 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 3752 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 3752 3628 msedge.exe msedge.exe PID 3628 wrote to memory of 3752 3628 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\65e396488b2147d5547daceded8be0fd_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa292946f8,0x7ffa29294708,0x7ffa292947182⤵PID:4544
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,9796776285054951817,17307068443943612848,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:4976
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,9796776285054951817,17307068443943612848,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4448 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,9796776285054951817,17307068443943612848,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:3752
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9796776285054951817,17307068443943612848,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:1776
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9796776285054951817,17307068443943612848,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2908
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9796776285054951817,17307068443943612848,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:2268
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,9796776285054951817,17307068443943612848,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5840 /prefetch:82⤵PID:3440
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,9796776285054951817,17307068443943612848,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5840 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1900 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9796776285054951817,17307068443943612848,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5720 /prefetch:12⤵PID:3908
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9796776285054951817,17307068443943612848,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:1252
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9796776285054951817,17307068443943612848,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:4880
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9796776285054951817,17307068443943612848,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:3128
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,9796776285054951817,17307068443943612848,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5156 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1208
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:316
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
476B
MD552923b40b0045e3788ab40ab210cdb65
SHA13a3c6cd922ec76c4af58abef5ec1fa2f96925313
SHA256691fdbe691ca79be00451463e8eeddf1faf8fac0e5aa09c87efce81c5adfa6eb
SHA512b1c8eaecd95a8e0a578be502d7a40337de9607094f5f73a1573bd551465ad44bf66cdb3220101bd389738a776a2cbb1b3356eb009686055e57e7d38fe8af423e
-
Filesize
5KB
MD55aa47f00176830d79fdb934f682bc4d1
SHA1747d1384b70b84d93b7c71944cbe25be076b2e9c
SHA256ce2ccf62d774753856eb9e91d5e82e77f1396cfe7ecaf8e3953bec2ad6419130
SHA5127bfb10615623e1bb7f96e77a4626494d84a2cb6ef5f7b773a611018fd4db3110d8d50fa2f06b05446810816dc914d266dede9fb1ddd512207c8f860c9166d302
-
Filesize
6KB
MD56e1dddf07da071a3b4ad591f7f6ae962
SHA11e606234c0e64b66581d723106d4daeadc4be9cb
SHA2568fb0773df577bf20d895ea5933570c74686a4029591768f3878a80434624a77c
SHA5129db90da1047a65dfb1c2912d81bed3c35a74688cb330b5ae2233f4224a1262680ebfc861849869acafae293188041ecf7dc82ed4d749d694cd43b359156b208f
-
Filesize
706B
MD50049d0fb8857fd61a73bfc58a78f0261
SHA19035fc52857f56f85621d05a6a410d12a7b388ec
SHA25604647d6ec501991c8cf48230985fbd98e92e6ad89384987927b9bdf155377c61
SHA512b24b82f073f1631067bef0578e38e68a1953b56935e7fe584532d721602e8f26b396f40417264c8de1f25a303f77ba26511835f34e1573b4223a9efa11303c6c
-
Filesize
706B
MD508e978027574751a4f0e55620f9b4ff0
SHA12bca182ceaa14beb70ee0090c005c8eba9333331
SHA25667a9838b93cbd3c5161771524610be597569a8df100810a1254edc5d73b05c1b
SHA5120ebcf796e4eb642d3ba77d24078d42d2672a925840bc27fc4c244cc04a2de433502d66ca8b6476bb2ece300fe7fc543c140d6301701b0650a29803d0637cc941
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57a7ce87e206330355aad1c4ff8bfe2b6
SHA1b562c902bdd18b27527b32a309721e1adc2fad04
SHA2565e9fbf120261f80876d4e50af24aeaf9a4db15064658e6a23089e6fb6d7cf4b2
SHA51276d35c904bb083cab0f4fed935aaf6da24c9845fe7dc396dd310d5ff5904db1570f82ffc609438e9323847aaf25e93e0654d92b07d019c29bd9daa7b8d864450
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e