Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 03:08
Static task
static1
Behavioral task
behavioral1
Sample
65cda5a63528852066b66157a1b16303_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
65cda5a63528852066b66157a1b16303_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65cda5a63528852066b66157a1b16303_JaffaCakes118.html
-
Size
26KB
-
MD5
65cda5a63528852066b66157a1b16303
-
SHA1
69dcaa40fa0a9007de4987dae405787df11b9e86
-
SHA256
449ca016d21252c62824fa12758e17b89c8d01ac5b601b60244d7d4e518ff77d
-
SHA512
5c92afd401cd12af76b6a8074b4f29dfaeac7cb103b663fe47e8e9f4bc2e6807f44f4ed669dd5683097ba78f1d2f1512c3e37c9b72a163ae1f0f2d6fe5cceab9
-
SSDEEP
384:Jmte+a++kDWAFWA1Muswh1qF+2mplY/xcmHhnnz:4te+aYFSvfDzGmHhnnz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 1212 msedge.exe 1212 msedge.exe 464 msedge.exe 464 msedge.exe 1616 identity_helper.exe 1616 identity_helper.exe 5468 msedge.exe 5468 msedge.exe 5468 msedge.exe 5468 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
Processes:
msedge.exepid process 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 464 wrote to memory of 4416 464 msedge.exe msedge.exe PID 464 wrote to memory of 4416 464 msedge.exe msedge.exe PID 464 wrote to memory of 5052 464 msedge.exe msedge.exe PID 464 wrote to memory of 5052 464 msedge.exe msedge.exe PID 464 wrote to memory of 5052 464 msedge.exe msedge.exe PID 464 wrote to memory of 5052 464 msedge.exe msedge.exe PID 464 wrote to memory of 5052 464 msedge.exe msedge.exe PID 464 wrote to memory of 5052 464 msedge.exe msedge.exe PID 464 wrote to memory of 5052 464 msedge.exe msedge.exe PID 464 wrote to memory of 5052 464 msedge.exe msedge.exe PID 464 wrote to memory of 5052 464 msedge.exe msedge.exe PID 464 wrote to memory of 5052 464 msedge.exe msedge.exe PID 464 wrote to memory of 5052 464 msedge.exe msedge.exe PID 464 wrote to memory of 5052 464 msedge.exe msedge.exe PID 464 wrote to memory of 5052 464 msedge.exe msedge.exe PID 464 wrote to memory of 5052 464 msedge.exe msedge.exe PID 464 wrote to memory of 5052 464 msedge.exe msedge.exe PID 464 wrote to memory of 5052 464 msedge.exe msedge.exe PID 464 wrote to memory of 5052 464 msedge.exe msedge.exe PID 464 wrote to memory of 5052 464 msedge.exe msedge.exe PID 464 wrote to memory of 5052 464 msedge.exe msedge.exe PID 464 wrote to memory of 5052 464 msedge.exe msedge.exe PID 464 wrote to memory of 5052 464 msedge.exe msedge.exe PID 464 wrote to memory of 5052 464 msedge.exe msedge.exe PID 464 wrote to memory of 5052 464 msedge.exe msedge.exe PID 464 wrote to memory of 5052 464 msedge.exe msedge.exe PID 464 wrote to memory of 5052 464 msedge.exe msedge.exe PID 464 wrote to memory of 5052 464 msedge.exe msedge.exe PID 464 wrote to memory of 5052 464 msedge.exe msedge.exe PID 464 wrote to memory of 5052 464 msedge.exe msedge.exe PID 464 wrote to memory of 5052 464 msedge.exe msedge.exe PID 464 wrote to memory of 5052 464 msedge.exe msedge.exe PID 464 wrote to memory of 5052 464 msedge.exe msedge.exe PID 464 wrote to memory of 5052 464 msedge.exe msedge.exe PID 464 wrote to memory of 5052 464 msedge.exe msedge.exe PID 464 wrote to memory of 5052 464 msedge.exe msedge.exe PID 464 wrote to memory of 5052 464 msedge.exe msedge.exe PID 464 wrote to memory of 5052 464 msedge.exe msedge.exe PID 464 wrote to memory of 5052 464 msedge.exe msedge.exe PID 464 wrote to memory of 5052 464 msedge.exe msedge.exe PID 464 wrote to memory of 5052 464 msedge.exe msedge.exe PID 464 wrote to memory of 5052 464 msedge.exe msedge.exe PID 464 wrote to memory of 1212 464 msedge.exe msedge.exe PID 464 wrote to memory of 1212 464 msedge.exe msedge.exe PID 464 wrote to memory of 1196 464 msedge.exe msedge.exe PID 464 wrote to memory of 1196 464 msedge.exe msedge.exe PID 464 wrote to memory of 1196 464 msedge.exe msedge.exe PID 464 wrote to memory of 1196 464 msedge.exe msedge.exe PID 464 wrote to memory of 1196 464 msedge.exe msedge.exe PID 464 wrote to memory of 1196 464 msedge.exe msedge.exe PID 464 wrote to memory of 1196 464 msedge.exe msedge.exe PID 464 wrote to memory of 1196 464 msedge.exe msedge.exe PID 464 wrote to memory of 1196 464 msedge.exe msedge.exe PID 464 wrote to memory of 1196 464 msedge.exe msedge.exe PID 464 wrote to memory of 1196 464 msedge.exe msedge.exe PID 464 wrote to memory of 1196 464 msedge.exe msedge.exe PID 464 wrote to memory of 1196 464 msedge.exe msedge.exe PID 464 wrote to memory of 1196 464 msedge.exe msedge.exe PID 464 wrote to memory of 1196 464 msedge.exe msedge.exe PID 464 wrote to memory of 1196 464 msedge.exe msedge.exe PID 464 wrote to memory of 1196 464 msedge.exe msedge.exe PID 464 wrote to memory of 1196 464 msedge.exe msedge.exe PID 464 wrote to memory of 1196 464 msedge.exe msedge.exe PID 464 wrote to memory of 1196 464 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\65cda5a63528852066b66157a1b16303_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9a1dd46f8,0x7ff9a1dd4708,0x7ff9a1dd47182⤵PID:4416
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,5874668423870794492,16619208967427408237,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:5052
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,5874668423870794492,16619208967427408237,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1212 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,5874668423870794492,16619208967427408237,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:82⤵PID:1196
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5874668423870794492,16619208967427408237,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:2624
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5874668423870794492,16619208967427408237,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4544
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5874668423870794492,16619208967427408237,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:12⤵PID:5044
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5874668423870794492,16619208967427408237,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:3468
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,5874668423870794492,16619208967427408237,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5500 /prefetch:82⤵PID:4900
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,5874668423870794492,16619208967427408237,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5500 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1616 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5874668423870794492,16619208967427408237,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:3248
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5874668423870794492,16619208967427408237,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:12⤵PID:4952
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5874668423870794492,16619208967427408237,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:4984
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5874668423870794492,16619208967427408237,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5860 /prefetch:12⤵PID:1960
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,5874668423870794492,16619208967427408237,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1868 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5468
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3028
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3836
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD591e9f3c138e9991ae53d7dab433775dd
SHA1c5bcabcf0cf4e571efab9093a37f41224725aba6
SHA2565a57d3568b20cf563feafd36b50d09ca9b3af49ff7733259ea363a2cc2bb52d3
SHA51252a77f2812e0afa5daaad98b6e94d2dbf78c0ea85ee952726b5ade8de6e1de9d334b174b7a1cff452e712d262634299000e62db97b7e09e6f912bdc38175f1dc
-
Filesize
490B
MD5bb06b0c444323c6cf74d54b212507be4
SHA1ca443b5475f39ac5e86e198e18f4fe1e7eaa1d7e
SHA256b5fc4a6a5defa800e994dd87ff73bfe83ce76bd9990af126ae94e92a7387f55b
SHA5124544826052c4aead44a51e07a6b2e96753a4dc6a84963421b1afb30eb23f0dd94d5b14a6ccfd6a37c5ba3bc63ed285d5341a06263d8d737600f58dbed2937da0
-
Filesize
5KB
MD5e9ddd919145d536561b4d937ba7a544d
SHA110cd6758c5d8b30ed15724c83753db5a18cc19ca
SHA256f25f3454e9d2a251d8b60e63c574c91259bdbf2d4e1b3ad345380a91aea88cd8
SHA512386384e0e1d8cf0ae4e90230247ffca3c81d79b4d2dfc9a282243738bc83febf3862b7ad4d7ad2abc1c13221e72e178c3f494211c5a93aeb235bfb1f450c5add
-
Filesize
6KB
MD53f7f3b91e65ac20df30b7ea09d558b1c
SHA1e4728b6df5531a8c38252bc4c5f52bd24f414809
SHA2561746b850cf787af7c3414f62d425642e938aab92d36f039be4f53ef9057526f7
SHA512e552f6cecb7eaac799e967fad45eb9cdd972d0ce7fa8dadb633da66b48e62790474ddd17a1253311e1a5cd7fd9aa43355c02f840edf14729c76be10132882844
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5680bbadc3c20e27bcb2416de9b55a98c
SHA1469948918bb77e8de31f8b49e0b059e12239bbf8
SHA25622ad3fd60efbfbb723c977c2c3f31ff825cc6b5d11937166b7c6be5d9388700d
SHA51287885cbdae204bf701773462ec9b93d96449bfaee8ed6711f204432a362fc15381978157f038adc5e25dc649fbf173cab762610e8d1ac4ec0eb87af1543e58ee
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e