Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 03:21
Static task
static1
Behavioral task
behavioral1
Sample
65d5d5610e8f96237bee79a5fbd2b4ae_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
65d5d5610e8f96237bee79a5fbd2b4ae_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65d5d5610e8f96237bee79a5fbd2b4ae_JaffaCakes118.html
-
Size
37KB
-
MD5
65d5d5610e8f96237bee79a5fbd2b4ae
-
SHA1
dd5d356451d3b7ab7637b443d8ba1fe53505e751
-
SHA256
d6e6a826d2da451452f4f70ac3b5cc1f277b38fd0fd9ca6cd80e35792cc668f3
-
SHA512
802e44b2b7f085a200ecc58d6b4fd1113c5522d1138391b554fee4d67272d9884e8948539a2c8269317927ec66ddb2a17860dce591b3f63d13cc404fba325527
-
SSDEEP
768:n/bVoRTW81D4RA+vEOjz6rdG2Gil54RZfPGnf3Gu34azi6781DdRA4vEOjq6h8at:yRTW81D4RA+vEOjz6raA7IaGC81DdRAW
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 2840 msedge.exe 2840 msedge.exe 3604 msedge.exe 3604 msedge.exe 3508 identity_helper.exe 3508 identity_helper.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3604 wrote to memory of 232 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 232 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 2060 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 2060 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 2060 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 2060 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 2060 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 2060 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 2060 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 2060 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 2060 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 2060 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 2060 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 2060 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 2060 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 2060 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 2060 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 2060 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 2060 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 2060 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 2060 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 2060 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 2060 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 2060 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 2060 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 2060 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 2060 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 2060 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 2060 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 2060 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 2060 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 2060 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 2060 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 2060 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 2060 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 2060 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 2060 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 2060 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 2060 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 2060 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 2060 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 2060 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 2840 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 2840 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 4856 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 4856 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 4856 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 4856 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 4856 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 4856 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 4856 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 4856 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 4856 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 4856 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 4856 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 4856 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 4856 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 4856 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 4856 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 4856 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 4856 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 4856 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 4856 3604 msedge.exe msedge.exe PID 3604 wrote to memory of 4856 3604 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\65d5d5610e8f96237bee79a5fbd2b4ae_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc801b46f8,0x7ffc801b4708,0x7ffc801b47182⤵PID:232
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2268,1302806626145582872,5017394514259999807,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2244 /prefetch:22⤵PID:2060
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2268,1302806626145582872,5017394514259999807,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2840 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2268,1302806626145582872,5017394514259999807,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:4856
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2268,1302806626145582872,5017394514259999807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3456
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2268,1302806626145582872,5017394514259999807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:1208
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2268,1302806626145582872,5017394514259999807,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 /prefetch:82⤵PID:4552
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2268,1302806626145582872,5017394514259999807,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3508 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2268,1302806626145582872,5017394514259999807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:4208
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2268,1302806626145582872,5017394514259999807,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:12⤵PID:3368
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2268,1302806626145582872,5017394514259999807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:2516
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2268,1302806626145582872,5017394514259999807,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:2644
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2268,1302806626145582872,5017394514259999807,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4800 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4640
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2708
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
724B
MD5f6c07a0955455e9812cb6da03ea27b79
SHA1697daebbc6045582d4f45022ab870d94562fb9c1
SHA256af249ef2f724e114714336d8a088e39234ace7e20ea6f38fa4d4febea0574bfb
SHA5120c8648401ab646fbe6d1e8abb13760cdf58f21109763394baa7e453ffa503805f0db5604982ad3ca446fdbf666af7008b723e269b6b98ffc93fb36dcdc655f50
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5334b6e9abdeff6f2227489ba69b82745
SHA165f34911aef2674a15e8ef04f957492cfacbdb4e
SHA256b2604f3d469ae4bb98bdef0b2f222fb01f611ee915a33e6a99eccd83d1ad518e
SHA512f45cfae1a602a5653c2a7f573025aac81c70cd0858df0a5896ffe40f62b97fd0810b96674e72f61b1ec6b00d50e4ed7613427eff38a4fcc2b18a58af8310335f
-
Filesize
6KB
MD5c6436f49d4dd526b9eeee1eddae838e8
SHA1f469d5ad5bad72654053339dcc94828776661f0b
SHA25696225b3281df7375ef20c7cba080e4f5fa090f5c05d568af5ecdcc817663e851
SHA512b98202fd41a8e5401aeaf86fdc7588d5021b54ca95e9b093ad4f796eaf03cf8ca72c25b88bf8fd4a44979080d50df2f1c7e6bf86fbae9e93c817ea8489d37b6c
-
Filesize
6KB
MD5e099771f792c16408dac8b9c914388a8
SHA16465f882f332ee42b9d9a06dc876a71c77883eb8
SHA256db783bb8a41d60bd39fc59630ae13bc4a40511cc6a367497010a01409710b768
SHA5122f2d6822f4cd3a60c7c55f4675e9f934febe69b293c71637fc5ae9d91f0353cbaa465cab42fb51b384323b050f4f59a589cbd7e1318907ceafdd509a23a0944e
-
Filesize
6KB
MD5be7cbd4cc84fd7529b4b9a015094047c
SHA175d1d1690c76e8b88b27c5b764d87c4e982d6057
SHA2566e582e97299e8e165a65960ba7c4f0e585c7f221669e17df7184d21a22126bd3
SHA512b15212187ff2f15fcf377f627c4a6cf9b28857415630c0fca077139d66a2471aa2da4c6865b5a935de70858e18c62b81309789207f973c9ec139cce076d51d9f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5290b17ff5c0b6d527e5ead7df4dd58fa
SHA10517fb01e45774263239774feedfbb0d79e489c0
SHA25646a0f2c2bd2ea1526ff1774a37b3823acf02125aa7dbce52ad9b541c2780d622
SHA512545d20a96abdae69b347159debf96d4439dec3af2510c52bc9b2a782d274cde841125d3608b95473f4a47053da877c3ee6a2abf8a60c1232dd3d011ce0082422
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e