Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 03:03
Static task
static1
Behavioral task
behavioral1
Sample
65c9f28947d1e1cb803398ec9ffa10ec_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
65c9f28947d1e1cb803398ec9ffa10ec_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65c9f28947d1e1cb803398ec9ffa10ec_JaffaCakes118.html
-
Size
45KB
-
MD5
65c9f28947d1e1cb803398ec9ffa10ec
-
SHA1
6c533f2acaefe2d8d6c35efa3d8851b00eae2674
-
SHA256
cd02f4d407530a264991c585ef703cf6304e56e58d5c1d262faac0e5bdb52992
-
SHA512
8657835e246b623c778adb7e5d156873087cced4860ea5262dd1c80e9f9d5caaff02e218ba9a4cdab03b19347127951d810b5f51ed2e5c8001216b95ecb26f9f
-
SSDEEP
768:3ide9a9VUXbU6Q5uuvESVJkEVgFdJmEcj8K:d9a9VUrU6Q5uuvESVGlFeEc4K
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 1100 msedge.exe 1100 msedge.exe 4476 msedge.exe 4476 msedge.exe 4896 identity_helper.exe 4896 identity_helper.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4476 wrote to memory of 1148 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 1148 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 3412 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 3412 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 3412 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 3412 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 3412 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 3412 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 3412 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 3412 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 3412 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 3412 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 3412 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 3412 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 3412 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 3412 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 3412 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 3412 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 3412 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 3412 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 3412 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 3412 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 3412 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 3412 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 3412 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 3412 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 3412 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 3412 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 3412 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 3412 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 3412 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 3412 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 3412 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 3412 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 3412 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 3412 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 3412 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 3412 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 3412 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 3412 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 3412 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 3412 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 1100 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 1100 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 2404 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 2404 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 2404 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 2404 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 2404 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 2404 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 2404 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 2404 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 2404 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 2404 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 2404 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 2404 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 2404 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 2404 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 2404 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 2404 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 2404 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 2404 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 2404 4476 msedge.exe msedge.exe PID 4476 wrote to memory of 2404 4476 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\65c9f28947d1e1cb803398ec9ffa10ec_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9a8ac46f8,0x7ff9a8ac4708,0x7ff9a8ac47182⤵PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,5548030256690783887,11687640572177996317,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,5548030256690783887,11687640572177996317,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,5548030256690783887,11687640572177996317,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5548030256690783887,11687640572177996317,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5548030256690783887,11687640572177996317,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,5548030256690783887,11687640572177996317,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4628 /prefetch:82⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,5548030256690783887,11687640572177996317,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4628 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5548030256690783887,11687640572177996317,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5548030256690783887,11687640572177996317,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:1208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5548030256690783887,11687640572177996317,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4896 /prefetch:12⤵PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5548030256690783887,11687640572177996317,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:12⤵PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,5548030256690783887,11687640572177996317,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2000 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1608
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1064
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3096
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
758B
MD548656e144f4d22beecdf2b0c9df095fc
SHA121c3f4405d51c2a426b9ef0b6f953d3bea1e5962
SHA256e9bf328b6e63da7199ddcc2563d1ec54067bdb3dee8e4fa34543965349874650
SHA51230e8cc827a2bd326ca340a73cafc89e279b209b7ac97175efb49621cce03430346cef56d265ed1e9f2d4673a170c48b33b14e0da8c2d248a5f8151e681ecef14
-
Filesize
5KB
MD500b1018978a6c922e086687b6e610e0d
SHA18521f7118e39381430b3303592743ab275434997
SHA256883114c6258be95d0a4f3900ecc601e5302be5eebbd59d29e7b8b6a9f2da4e3c
SHA512cbb729198c7183d919c4fd382fa054dde1351058bb0d93ec676b3f9971a1df88dee31d0361f9c7037035bcc78fc93802cf870f12b3da5be7b72e74fa58fe08b8
-
Filesize
6KB
MD503f8d22381a0b8c7c96fe2b4eb439baf
SHA12784883f7d9d7896bdb79a8bb13894c3509bb838
SHA256097b8be1573e0fe82f29320f059232a22186b05e975900c6ea1bda1e7899ea7b
SHA512e3f59924a2a365e57fb91d5949d59233a528f9fb2b937214d06803c93278193ad14023b7e8ea87bbb8a078a04aefb1369722cb4bc1143de0fb7476b40b6b61f4
-
Filesize
874B
MD5363c9de798d5854a030c9420e5b62cd0
SHA19a2dc238928213df64bb80340d564a58a4d76a70
SHA2561442db57c48adb8754228dc6213927a7567102f6f86dfe1462e1824826b92626
SHA512637187b0d6bcd2c5234807d30b08e37131e125849c43fc478a66a9ad77ae2b79795a0f0d5ded98f4b89de830cfb573721a5d0b64bc2a7410e40fb59dcc8f103f
-
Filesize
874B
MD551e3503592c98ef2b8ee4c045cb3133e
SHA13f7e99bc13bc315822e672d79258ad0f8e70d4a8
SHA25657a3800bbf6d8d7b1fa2a76ff0e07a64b49f1f5de037a1dbf6ba6635274afc6f
SHA51207381073f0c62bc62427aecaea09c5a0359fdb374fcbd4500c7b96bfccf3de16592f2312014bfbc81d2db8f430a4a651c2ba52147b0bbbf3fff995cdadb452dd
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58c2e14fd7ba73b3bb4025cb003f0a445
SHA10d943b587358fc2511c66144473757e885cba789
SHA2567dcf992f67b5bd9be466000f825ff2ac0dfc373f590e3b0fc66f6f5a13c679e6
SHA5124143805bc09dcfce0c0de547fff884c4aecad8b9abfb9b223e3b6809efbd8b91c227f29b502bcb0a07a361420c196a99c41fcbf9d179b0b5d27c4147ea3afc13
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e