Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 02:59
Static task
static1
Behavioral task
behavioral1
Sample
65c7431b4e6763c880010089550b0d3d_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
65c7431b4e6763c880010089550b0d3d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65c7431b4e6763c880010089550b0d3d_JaffaCakes118.html
-
Size
19KB
-
MD5
65c7431b4e6763c880010089550b0d3d
-
SHA1
060ee1d53efc195d54409f4f4cf41808145cb78e
-
SHA256
210967ed4878dcd500e287e9e84ce6f0f241018a8a412e45d591b35eb60b0105
-
SHA512
278e75be8b333d0bf61858a2eae3451a8ff1b41d3e6f88a716d484865bc63d4549317f547ba689c9c11ecfcd62668319a4ca139c6f103a6f5e35197396927677
-
SSDEEP
384:Ie43nFDIqGG7wA+wtBT/33PyGyonnpzw13ut3/D10wsLdgLmPhLmhMyMEAwYZ1BI:IDVDIqGsyMpZt+p+Jrp
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 1408 msedge.exe 1408 msedge.exe 552 msedge.exe 552 msedge.exe 4792 identity_helper.exe 4792 identity_helper.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 552 wrote to memory of 1556 552 msedge.exe msedge.exe PID 552 wrote to memory of 1556 552 msedge.exe msedge.exe PID 552 wrote to memory of 2860 552 msedge.exe msedge.exe PID 552 wrote to memory of 2860 552 msedge.exe msedge.exe PID 552 wrote to memory of 2860 552 msedge.exe msedge.exe PID 552 wrote to memory of 2860 552 msedge.exe msedge.exe PID 552 wrote to memory of 2860 552 msedge.exe msedge.exe PID 552 wrote to memory of 2860 552 msedge.exe msedge.exe PID 552 wrote to memory of 2860 552 msedge.exe msedge.exe PID 552 wrote to memory of 2860 552 msedge.exe msedge.exe PID 552 wrote to memory of 2860 552 msedge.exe msedge.exe PID 552 wrote to memory of 2860 552 msedge.exe msedge.exe PID 552 wrote to memory of 2860 552 msedge.exe msedge.exe PID 552 wrote to memory of 2860 552 msedge.exe msedge.exe PID 552 wrote to memory of 2860 552 msedge.exe msedge.exe PID 552 wrote to memory of 2860 552 msedge.exe msedge.exe PID 552 wrote to memory of 2860 552 msedge.exe msedge.exe PID 552 wrote to memory of 2860 552 msedge.exe msedge.exe PID 552 wrote to memory of 2860 552 msedge.exe msedge.exe PID 552 wrote to memory of 2860 552 msedge.exe msedge.exe PID 552 wrote to memory of 2860 552 msedge.exe msedge.exe PID 552 wrote to memory of 2860 552 msedge.exe msedge.exe PID 552 wrote to memory of 2860 552 msedge.exe msedge.exe PID 552 wrote to memory of 2860 552 msedge.exe msedge.exe PID 552 wrote to memory of 2860 552 msedge.exe msedge.exe PID 552 wrote to memory of 2860 552 msedge.exe msedge.exe PID 552 wrote to memory of 2860 552 msedge.exe msedge.exe PID 552 wrote to memory of 2860 552 msedge.exe msedge.exe PID 552 wrote to memory of 2860 552 msedge.exe msedge.exe PID 552 wrote to memory of 2860 552 msedge.exe msedge.exe PID 552 wrote to memory of 2860 552 msedge.exe msedge.exe PID 552 wrote to memory of 2860 552 msedge.exe msedge.exe PID 552 wrote to memory of 2860 552 msedge.exe msedge.exe PID 552 wrote to memory of 2860 552 msedge.exe msedge.exe PID 552 wrote to memory of 2860 552 msedge.exe msedge.exe PID 552 wrote to memory of 2860 552 msedge.exe msedge.exe PID 552 wrote to memory of 2860 552 msedge.exe msedge.exe PID 552 wrote to memory of 2860 552 msedge.exe msedge.exe PID 552 wrote to memory of 2860 552 msedge.exe msedge.exe PID 552 wrote to memory of 2860 552 msedge.exe msedge.exe PID 552 wrote to memory of 2860 552 msedge.exe msedge.exe PID 552 wrote to memory of 2860 552 msedge.exe msedge.exe PID 552 wrote to memory of 1408 552 msedge.exe msedge.exe PID 552 wrote to memory of 1408 552 msedge.exe msedge.exe PID 552 wrote to memory of 1684 552 msedge.exe msedge.exe PID 552 wrote to memory of 1684 552 msedge.exe msedge.exe PID 552 wrote to memory of 1684 552 msedge.exe msedge.exe PID 552 wrote to memory of 1684 552 msedge.exe msedge.exe PID 552 wrote to memory of 1684 552 msedge.exe msedge.exe PID 552 wrote to memory of 1684 552 msedge.exe msedge.exe PID 552 wrote to memory of 1684 552 msedge.exe msedge.exe PID 552 wrote to memory of 1684 552 msedge.exe msedge.exe PID 552 wrote to memory of 1684 552 msedge.exe msedge.exe PID 552 wrote to memory of 1684 552 msedge.exe msedge.exe PID 552 wrote to memory of 1684 552 msedge.exe msedge.exe PID 552 wrote to memory of 1684 552 msedge.exe msedge.exe PID 552 wrote to memory of 1684 552 msedge.exe msedge.exe PID 552 wrote to memory of 1684 552 msedge.exe msedge.exe PID 552 wrote to memory of 1684 552 msedge.exe msedge.exe PID 552 wrote to memory of 1684 552 msedge.exe msedge.exe PID 552 wrote to memory of 1684 552 msedge.exe msedge.exe PID 552 wrote to memory of 1684 552 msedge.exe msedge.exe PID 552 wrote to memory of 1684 552 msedge.exe msedge.exe PID 552 wrote to memory of 1684 552 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\65c7431b4e6763c880010089550b0d3d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8591c46f8,0x7ff8591c4708,0x7ff8591c47182⤵PID:1556
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2304,13160602693959358952,9400290901866719536,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2320 /prefetch:22⤵PID:2860
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2304,13160602693959358952,9400290901866719536,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2372 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1408 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2304,13160602693959358952,9400290901866719536,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2588 /prefetch:82⤵PID:1684
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2304,13160602693959358952,9400290901866719536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:2424
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2304,13160602693959358952,9400290901866719536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4892
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2304,13160602693959358952,9400290901866719536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4964 /prefetch:12⤵PID:1916
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2304,13160602693959358952,9400290901866719536,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6016 /prefetch:82⤵PID:1544
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2304,13160602693959358952,9400290901866719536,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6016 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4792 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2304,13160602693959358952,9400290901866719536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5680 /prefetch:12⤵PID:2120
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2304,13160602693959358952,9400290901866719536,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:3600
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2304,13160602693959358952,9400290901866719536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:4932
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2304,13160602693959358952,9400290901866719536,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3940 /prefetch:12⤵PID:1180
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2304,13160602693959358952,9400290901866719536,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4812 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3724
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4868
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD57c395e551899835f6f0ad11666434a2c
SHA1b01a3d329fe5194218a834bddec51ae560a76a3a
SHA256221a4f371f46cf1510e15c48778951d9c31aff0fbb433c9d0fa25d91316d6e75
SHA51232b067ddec7927dc6eb92b12d5c8bf9cf1930c4c21e466e5974eaff657ced1646d2fe3797c68c65ffba02b493afa2e5ea5db057e40fcac16a6d228a1dba6ce3f
-
Filesize
1KB
MD5b40e02f0491f14fd0cfbd07d8bd1e65c
SHA155cbb6d3926ec1992f089030c46b9effd35c9602
SHA25602905a489f12610458f027a0d36abc0ec11c75b3a50c95caa49e0418acd19820
SHA5126529f5330103a26014ba75ff0f5f224324661d5ae60bf3e40adc0b957c9068035bcd48b0634156a479118bfab6992285711e013e889495e3437ca9ae31fe1b03
-
Filesize
5KB
MD596b3f741895580328cf2f8ee6cb59102
SHA1ab11d1242ace3a8314a94c1e26833e476a17c652
SHA256151f254b92e3d6e5d219e129395175e6b297327f138f2ececab6e79f3d381646
SHA512f80838563c7d07f4f2a78d68a3652dd2ea6e860111dc34450b91eb016ffd7305888f42eae3431449a83c2e2dde01ae4e730d5f02ecc29e173a9deeb80f6ca219
-
Filesize
6KB
MD5465898dd25ded2ae811aeffa46318495
SHA129d4ab71abfdb4404b26467d854edb9ae0ec1f3a
SHA2566b730ca03377402406853a9e363c42937e432fcc16e87e5f522e87cfc635189a
SHA5122d6cdbd2a83ccdf2973c5616b0de5e9eec339dcdf01a97c4b041e8442ec427449aab56768c337f1d454c744770e3bd4ac9baa3cbdd0e292cdac7f0d03d452af7
-
Filesize
6KB
MD5c0c69b44d67c1cc2ed2493bca7a207c8
SHA1760aee9c555cb6579e4cc83f524dd60e910ffec1
SHA256a45deaf72428b8d1166649d60fd5ad0eee6faca8e856f7e227cdbf5745f5dc87
SHA5128d448e5d695871c580f98a27d3c1af221acd2e4f887c786622de6ad7fb6d0e8f020b1099fa20f9538065b265ee29190e53bd4f3ee74c85b9591033abfd0eaf10
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b7b2848f9c2225b577d43859093d8a98
SHA1bde835284636a2bfdeec50cd5c08029ef5d35765
SHA2564ca33b250c69df91897f33f0a160439a8c81536f0f345b3bdc434cdbc44923ac
SHA512a5770f705414e647e794fa82e593d590f52e5c3782d7e3f833c0a42369e35df20301108f82898664f7360a84e215a6314e1dcf21a996f33065f5ccc0685e72c0
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e