Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 03:10
Static task
static1
Behavioral task
behavioral1
Sample
65cf26f4e7ed9dd08d5899ff0430ba4a_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
65cf26f4e7ed9dd08d5899ff0430ba4a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65cf26f4e7ed9dd08d5899ff0430ba4a_JaffaCakes118.html
-
Size
51KB
-
MD5
65cf26f4e7ed9dd08d5899ff0430ba4a
-
SHA1
aa14c2a6a381e85569bac6f4af5b7549f88689c1
-
SHA256
acc8264afc049194fcabc30b7d1030a98db3e28ae76c3c82e7f74a38096757b6
-
SHA512
20ee177a3d178b67f68c7a4a2f86563658a9d3ad16828c981517406f86c341f85597e1c185bcf4fe849fe36983ecb047760feb93ce01e95fd4251d6e99d447d4
-
SSDEEP
1536:FnG0bUe+6+ORRKWjIyhJlF8UFfhH1fO3BdNRR6lBhtlRKRFJV5VGRuN+:5G0bUe+6+ORRKWHlF8UFfhH1fO3BdNRs
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 440 msedge.exe 440 msedge.exe 716 msedge.exe 716 msedge.exe 4456 identity_helper.exe 4456 identity_helper.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 716 wrote to memory of 4908 716 msedge.exe msedge.exe PID 716 wrote to memory of 4908 716 msedge.exe msedge.exe PID 716 wrote to memory of 4972 716 msedge.exe msedge.exe PID 716 wrote to memory of 4972 716 msedge.exe msedge.exe PID 716 wrote to memory of 4972 716 msedge.exe msedge.exe PID 716 wrote to memory of 4972 716 msedge.exe msedge.exe PID 716 wrote to memory of 4972 716 msedge.exe msedge.exe PID 716 wrote to memory of 4972 716 msedge.exe msedge.exe PID 716 wrote to memory of 4972 716 msedge.exe msedge.exe PID 716 wrote to memory of 4972 716 msedge.exe msedge.exe PID 716 wrote to memory of 4972 716 msedge.exe msedge.exe PID 716 wrote to memory of 4972 716 msedge.exe msedge.exe PID 716 wrote to memory of 4972 716 msedge.exe msedge.exe PID 716 wrote to memory of 4972 716 msedge.exe msedge.exe PID 716 wrote to memory of 4972 716 msedge.exe msedge.exe PID 716 wrote to memory of 4972 716 msedge.exe msedge.exe PID 716 wrote to memory of 4972 716 msedge.exe msedge.exe PID 716 wrote to memory of 4972 716 msedge.exe msedge.exe PID 716 wrote to memory of 4972 716 msedge.exe msedge.exe PID 716 wrote to memory of 4972 716 msedge.exe msedge.exe PID 716 wrote to memory of 4972 716 msedge.exe msedge.exe PID 716 wrote to memory of 4972 716 msedge.exe msedge.exe PID 716 wrote to memory of 4972 716 msedge.exe msedge.exe PID 716 wrote to memory of 4972 716 msedge.exe msedge.exe PID 716 wrote to memory of 4972 716 msedge.exe msedge.exe PID 716 wrote to memory of 4972 716 msedge.exe msedge.exe PID 716 wrote to memory of 4972 716 msedge.exe msedge.exe PID 716 wrote to memory of 4972 716 msedge.exe msedge.exe PID 716 wrote to memory of 4972 716 msedge.exe msedge.exe PID 716 wrote to memory of 4972 716 msedge.exe msedge.exe PID 716 wrote to memory of 4972 716 msedge.exe msedge.exe PID 716 wrote to memory of 4972 716 msedge.exe msedge.exe PID 716 wrote to memory of 4972 716 msedge.exe msedge.exe PID 716 wrote to memory of 4972 716 msedge.exe msedge.exe PID 716 wrote to memory of 4972 716 msedge.exe msedge.exe PID 716 wrote to memory of 4972 716 msedge.exe msedge.exe PID 716 wrote to memory of 4972 716 msedge.exe msedge.exe PID 716 wrote to memory of 4972 716 msedge.exe msedge.exe PID 716 wrote to memory of 4972 716 msedge.exe msedge.exe PID 716 wrote to memory of 4972 716 msedge.exe msedge.exe PID 716 wrote to memory of 4972 716 msedge.exe msedge.exe PID 716 wrote to memory of 4972 716 msedge.exe msedge.exe PID 716 wrote to memory of 440 716 msedge.exe msedge.exe PID 716 wrote to memory of 440 716 msedge.exe msedge.exe PID 716 wrote to memory of 4244 716 msedge.exe msedge.exe PID 716 wrote to memory of 4244 716 msedge.exe msedge.exe PID 716 wrote to memory of 4244 716 msedge.exe msedge.exe PID 716 wrote to memory of 4244 716 msedge.exe msedge.exe PID 716 wrote to memory of 4244 716 msedge.exe msedge.exe PID 716 wrote to memory of 4244 716 msedge.exe msedge.exe PID 716 wrote to memory of 4244 716 msedge.exe msedge.exe PID 716 wrote to memory of 4244 716 msedge.exe msedge.exe PID 716 wrote to memory of 4244 716 msedge.exe msedge.exe PID 716 wrote to memory of 4244 716 msedge.exe msedge.exe PID 716 wrote to memory of 4244 716 msedge.exe msedge.exe PID 716 wrote to memory of 4244 716 msedge.exe msedge.exe PID 716 wrote to memory of 4244 716 msedge.exe msedge.exe PID 716 wrote to memory of 4244 716 msedge.exe msedge.exe PID 716 wrote to memory of 4244 716 msedge.exe msedge.exe PID 716 wrote to memory of 4244 716 msedge.exe msedge.exe PID 716 wrote to memory of 4244 716 msedge.exe msedge.exe PID 716 wrote to memory of 4244 716 msedge.exe msedge.exe PID 716 wrote to memory of 4244 716 msedge.exe msedge.exe PID 716 wrote to memory of 4244 716 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\65cf26f4e7ed9dd08d5899ff0430ba4a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc0ddf46f8,0x7ffc0ddf4708,0x7ffc0ddf47182⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,16960814511771853374,17399417825587629272,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,16960814511771853374,17399417825587629272,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,16960814511771853374,17399417825587629272,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:82⤵PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16960814511771853374,17399417825587629272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16960814511771853374,17399417825587629272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,16960814511771853374,17399417825587629272,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6064 /prefetch:82⤵PID:1268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,16960814511771853374,17399417825587629272,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6064 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16960814511771853374,17399417825587629272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16960814511771853374,17399417825587629272,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6024 /prefetch:12⤵PID:2304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16960814511771853374,17399417825587629272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16960814511771853374,17399417825587629272,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3508 /prefetch:12⤵PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,16960814511771853374,17399417825587629272,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4852 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1704
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2588
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4388
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
5KB
MD5bdfd195c9cb0c0840cc794b2cc69be4c
SHA1c0aaa19b6eb63778e65a6d651ec63081323745f5
SHA256ad6614e8a5d358c322c1138a3ec69dcbcd3c6f39d596e274ea55a958d503e697
SHA5127aff7e170c6a6d7401b8e2e0e4a9452788308b4f94f98edd34a8da5b94d068c72c6515b9691f5ed06b1b9e1335156cdd20ffb237dbcf6a0e5a341bbcb96dced0
-
Filesize
6KB
MD510b8d6bb5672eb576fe88b7c5209875d
SHA108b7d01a76355b958a0302a8218c5b32abd3ff29
SHA2560a8fbe465869298391f446d43605102a50d4806843a7eda9947f9d76defa3b2a
SHA512ca152a33c4566fbb7be8dd82e990a7d97ce4b601fefa8e1dd711149ab9fef4a85f531b6c9fca09a8344c98c4a53877049b3b43306392190e8ce78ea89f7bcb44
-
Filesize
6KB
MD5a64d734b7ae77b0176df160c498e319d
SHA1a63f4508f4939573db47fde948892b18950fb99d
SHA256d03f3f4db430d50ffd49d73d193d8a186f43ebab088dd18c1584936998d31d36
SHA5120394e96e1614c7013ab19168515d388cedc86a95534ce79e90c3061e018690cee772d4e682ca147c7ddbf4627cdcf877552d36c3a4703208b85dccd3ece81d70
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD556bfdc287a8930888a62528166fb8f68
SHA181b19d06adc879a20a905e42ad732b2a85c70082
SHA256f4d5844dce362e6a005f013a71120dfae0ee2bb9347f1436aef0621bd41acf63
SHA5122ac302f88f72a88b4dc724f84c18f9cecd0072ab28eb3f573617469350f67172da2870ce272343dba5fa15da44dfe5c4f7cbc94324c7c021607c454266f7bdbc
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e