Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 03:21
Static task
static1
Behavioral task
behavioral1
Sample
65d5e232a6f26b05a8ca24456785789a_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
65d5e232a6f26b05a8ca24456785789a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65d5e232a6f26b05a8ca24456785789a_JaffaCakes118.html
-
Size
156KB
-
MD5
65d5e232a6f26b05a8ca24456785789a
-
SHA1
0c8d4700beaed24b8129527260fea85df8194bc8
-
SHA256
bf368216be82a3381b4f0fa37c639dcd8eabfc5b2e6b07e92908eedd969610f8
-
SHA512
3bb97b4621e63f3eb38a9622bc7cebd810f08dc014369bd96ad5d3cd7572ad98da16471f078dd52fe8776c8dd8dbc3d34b5e4afcab49cd92d693e70f19cc41e4
-
SSDEEP
1536:S+hOk4VCVHCOri73H5HCFWYcGdX14BFNbiBpPgwf3WuynsdOnJhdveOlfY4k7RAN:SL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
msedge.exemsedge.exemsedge.exepid process 2036 msedge.exe 2036 msedge.exe 4916 msedge.exe 4916 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
msedge.exepid process 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4916 wrote to memory of 1616 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 1616 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 3748 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 3748 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 3748 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 3748 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 3748 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 3748 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 3748 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 3748 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 3748 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 3748 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 3748 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 3748 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 3748 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 3748 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 3748 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 3748 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 3748 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 3748 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 3748 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 3748 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 3748 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 3748 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 3748 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 3748 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 3748 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 3748 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 3748 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 3748 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 3748 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 3748 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 3748 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 3748 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 3748 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 3748 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 3748 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 3748 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 3748 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 3748 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 3748 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 3748 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 2036 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 2036 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 4320 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 4320 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 4320 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 4320 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 4320 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 4320 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 4320 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 4320 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 4320 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 4320 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 4320 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 4320 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 4320 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 4320 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 4320 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 4320 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 4320 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 4320 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 4320 4916 msedge.exe msedge.exe PID 4916 wrote to memory of 4320 4916 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\65d5e232a6f26b05a8ca24456785789a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd5eb246f8,0x7ffd5eb24708,0x7ffd5eb247182⤵PID:1616
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,6778233083060093776,16651573767297888813,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:3748
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,6778233083060093776,16651573767297888813,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2036 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,6778233083060093776,16651573767297888813,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:4320
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6778233083060093776,16651573767297888813,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1112
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6778233083060093776,16651573767297888813,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:5060
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6778233083060093776,16651573767297888813,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2248 /prefetch:12⤵PID:868
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,6778233083060093776,16651573767297888813,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1380 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2296
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3036
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
5KB
MD57a7de58e8cba9bf76ba04efa2c50946d
SHA1ba55fa97008ef06759644b4ce96c7c8ed574214f
SHA25698815d9b85cf8e70a21db6cca3291e5bf4824f7439f60c819fe06e723ec45b03
SHA51218779a9f1f6fc723fded66d871de20f474701fb3757cd962243b0f79674cdcc1cff7bce301ede34a5f9f0308a1751bdd6badf6fe007b37d6a5e09dcca859e8fc
-
Filesize
6KB
MD561be73629bd136301f25b154e60fcb11
SHA1febc02b0cd41632168247845b5d5db857311f9da
SHA25675085b358a8a1e6790f50f3d00e5d883bd0c87a0d593bf3dd2309647fb299b70
SHA5120442af79cdded34a9782bf6bb0d35fd1ec1cb596d59319cfae4e5e7bb51b11dc304cf432c3732a17084e23c9474987ad8d5f4b151047c4e6e56fe6efa3ca84a7
-
Filesize
6KB
MD5a6670e181d7df95fe287fb1947fe4c65
SHA14cca4984a0a30dda1cc55f913591f71c5ba781c9
SHA2567781f105d5287ec3716e0a662f43eae0360d47fe2897cb7d4135e4fa3ce00e3b
SHA512c3fb4700a4f60a544d57317932ec4ce35d76568e41f3b4e08458e57d147b79944d7481a309ffe4565ae6f4d432b4a61c889310f5840023e27dfe061bf2eb6d80
-
Filesize
11KB
MD56adaa7c3912f07acae11466258cb5dca
SHA1c5250a503efa34c9f32415a2e11fb3bebb07d0a5
SHA256c4d31b70934315ce2f02fd402360d8c2282c8898fd1f982f00b2de192944bedf
SHA512396ee81d75b7166266d651debd7e57d912cad0a9957027949f15b6e3c38933c421a049c8becd20ab4348408544a4a47fae224fa151a9aec219a3fff5a62c8422
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e