Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 02:56
Static task
static1
Behavioral task
behavioral1
Sample
65c5754d86dd3bb3c35adab8edf2a39d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
65c5754d86dd3bb3c35adab8edf2a39d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65c5754d86dd3bb3c35adab8edf2a39d_JaffaCakes118.html
-
Size
17KB
-
MD5
65c5754d86dd3bb3c35adab8edf2a39d
-
SHA1
d835d6779ca7e754609307d55492bfa43ac991b4
-
SHA256
7cadae7fcd296620f87ab9270b827c97f7e6c0ab8e76c6ccb72c189c2ecb3126
-
SHA512
9651944eceef8893d814be780132cb3d29fc10e7ee4fdebcfd9e4eb2c27f18726b818fd1032cf50913043ee70f661a1e7a6f5db9136f6cca43f50f0ac28440d5
-
SSDEEP
384:AKhLXOQvd91kblS/OvY2oEddSddzdduHY/1:AKhLXOkSdqd5dF
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 3800 msedge.exe 3800 msedge.exe 1952 msedge.exe 1952 msedge.exe 3224 identity_helper.exe 3224 identity_helper.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1952 wrote to memory of 4644 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 4644 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 2676 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 2676 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 2676 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 2676 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 2676 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 2676 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 2676 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 2676 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 2676 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 2676 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 2676 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 2676 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 2676 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 2676 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 2676 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 2676 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 2676 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 2676 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 2676 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 2676 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 2676 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 2676 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 2676 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 2676 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 2676 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 2676 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 2676 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 2676 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 2676 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 2676 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 2676 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 2676 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 2676 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 2676 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 2676 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 2676 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 2676 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 2676 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 2676 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 2676 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 3800 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 3800 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 1728 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 1728 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 1728 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 1728 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 1728 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 1728 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 1728 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 1728 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 1728 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 1728 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 1728 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 1728 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 1728 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 1728 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 1728 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 1728 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 1728 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 1728 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 1728 1952 msedge.exe msedge.exe PID 1952 wrote to memory of 1728 1952 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\65c5754d86dd3bb3c35adab8edf2a39d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9272c46f8,0x7ff9272c4708,0x7ff9272c47182⤵PID:4644
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,2101815646349086025,16290339295292727632,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:2676
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,2101815646349086025,16290339295292727632,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2368 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3800 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,2101815646349086025,16290339295292727632,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:82⤵PID:1728
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2101815646349086025,16290339295292727632,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3680
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2101815646349086025,16290339295292727632,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1736
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,2101815646349086025,16290339295292727632,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5456 /prefetch:82⤵PID:4404
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,2101815646349086025,16290339295292727632,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5456 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3224 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2101815646349086025,16290339295292727632,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:2440
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2101815646349086025,16290339295292727632,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:388
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2101815646349086025,16290339295292727632,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3364
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2101815646349086025,16290339295292727632,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:1580
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,2101815646349086025,16290339295292727632,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4828 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4376
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4812
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
263B
MD5fa70eb9fd4feba184cd32e6a1eb4563e
SHA12081eb84ce29f7db74d48e97510839562daa9aa4
SHA2560e30be26fb5b7de2331ca111fc9435b02681d746b26b225cc3995937972d0259
SHA5128ddc5e2c028fb65322000391b8292e99ea96dcd26b47de9d6af55ac096a7ca26853927fc88f49a0ad6c929995682d3fa19269d22f417fecac30b17631783a815
-
Filesize
5KB
MD56b285702daa41410e46a7d7c5614d0d8
SHA1237e7a372c09d15f744b159735d63614a1b55f98
SHA25618946e542ae28b0b94cc35fe37a49aebe801fb84ef4672b31302f53661bd462d
SHA51212d6ca8b13e8df2514255716fecbe06b053d70e954f6b4facbd4db892788201417dafc9a6119cfa4302fa4a4345b481922da1536fb2c21cadedac22d50b5b516
-
Filesize
6KB
MD55c5e1ddcc0ef567bda66b387d50bfabc
SHA15b1cdac7f409f6687acb320a8b26cb8872972df8
SHA256f4064cf65b9768246bdbfe71e17a5e785a1aaaa21cc87f9bb088ebe06d3a0d3b
SHA512c671c41ed454638a60325eeeba9c1524675df6aa1bd6634c71bb8b45898eafd90e6176bcc0b1bd6eefc3dbfffa15701bedea959350fd90998200d6a741805bf9
-
Filesize
6KB
MD5021619658b0d94d9614d93661c24cdd1
SHA1843a5999bdc28254d15274714893930b83d2221b
SHA2562d19c15361abe5d3ffdaea5acbd0549168e85829be4c141a16be5fcd47e7f1d5
SHA51251a9d36425b2bf385a74969ae1271f7fdb7b73092f01b9351831fa7c3992bf5c75c02ec19d13ae12bd0842a70667f46461fa181728efeb6e45b982a052fe6862
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD535b64228ad8388ea1c6dd25bcf065bf5
SHA1bb92f6e8a96b1c967f5d65553feb724a481de935
SHA2562136170b1f71440e04d8e6bf25973db679da51e0cf7bdc8500991a3d5ecf4007
SHA512802d6599c5714f31ec4a4a10234833e1acf0dd732d3557b02f72607b9fcedde089e0cbb8ffa84b78704686e062a64c97db48a4c4b674e9d6cfe6331ac4cf0018
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e