Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 03:24
Static task
static1
Behavioral task
behavioral1
Sample
65d7a2896c1664f1ef2f1c4388c6ef86_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
65d7a2896c1664f1ef2f1c4388c6ef86_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65d7a2896c1664f1ef2f1c4388c6ef86_JaffaCakes118.html
-
Size
67KB
-
MD5
65d7a2896c1664f1ef2f1c4388c6ef86
-
SHA1
bb6dab7e2c93a9d861dcc2611271fe6a6e832a82
-
SHA256
0ba8785ef14e12e679a3b8e643f0a4ac05df6c601224fa31dd3efe535eaf2ec5
-
SHA512
da3ff9fc823240a1fe64b0ccb585d58c03d59dab448f6b62b86f3f645e400d97b940f1f7a2324b3f066da6cf73aa5a96ca48ada1ea30646af22216059bff6cb9
-
SSDEEP
768:JiogcMiR3sI2PDDnX0g6kz3WHzboTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVGo:JUqUTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4616 msedge.exe 4616 msedge.exe 768 msedge.exe 768 msedge.exe 2708 identity_helper.exe 2708 identity_helper.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 768 wrote to memory of 848 768 msedge.exe 84 PID 768 wrote to memory of 848 768 msedge.exe 84 PID 768 wrote to memory of 4512 768 msedge.exe 85 PID 768 wrote to memory of 4512 768 msedge.exe 85 PID 768 wrote to memory of 4512 768 msedge.exe 85 PID 768 wrote to memory of 4512 768 msedge.exe 85 PID 768 wrote to memory of 4512 768 msedge.exe 85 PID 768 wrote to memory of 4512 768 msedge.exe 85 PID 768 wrote to memory of 4512 768 msedge.exe 85 PID 768 wrote to memory of 4512 768 msedge.exe 85 PID 768 wrote to memory of 4512 768 msedge.exe 85 PID 768 wrote to memory of 4512 768 msedge.exe 85 PID 768 wrote to memory of 4512 768 msedge.exe 85 PID 768 wrote to memory of 4512 768 msedge.exe 85 PID 768 wrote to memory of 4512 768 msedge.exe 85 PID 768 wrote to memory of 4512 768 msedge.exe 85 PID 768 wrote to memory of 4512 768 msedge.exe 85 PID 768 wrote to memory of 4512 768 msedge.exe 85 PID 768 wrote to memory of 4512 768 msedge.exe 85 PID 768 wrote to memory of 4512 768 msedge.exe 85 PID 768 wrote to memory of 4512 768 msedge.exe 85 PID 768 wrote to memory of 4512 768 msedge.exe 85 PID 768 wrote to memory of 4512 768 msedge.exe 85 PID 768 wrote to memory of 4512 768 msedge.exe 85 PID 768 wrote to memory of 4512 768 msedge.exe 85 PID 768 wrote to memory of 4512 768 msedge.exe 85 PID 768 wrote to memory of 4512 768 msedge.exe 85 PID 768 wrote to memory of 4512 768 msedge.exe 85 PID 768 wrote to memory of 4512 768 msedge.exe 85 PID 768 wrote to memory of 4512 768 msedge.exe 85 PID 768 wrote to memory of 4512 768 msedge.exe 85 PID 768 wrote to memory of 4512 768 msedge.exe 85 PID 768 wrote to memory of 4512 768 msedge.exe 85 PID 768 wrote to memory of 4512 768 msedge.exe 85 PID 768 wrote to memory of 4512 768 msedge.exe 85 PID 768 wrote to memory of 4512 768 msedge.exe 85 PID 768 wrote to memory of 4512 768 msedge.exe 85 PID 768 wrote to memory of 4512 768 msedge.exe 85 PID 768 wrote to memory of 4512 768 msedge.exe 85 PID 768 wrote to memory of 4512 768 msedge.exe 85 PID 768 wrote to memory of 4512 768 msedge.exe 85 PID 768 wrote to memory of 4512 768 msedge.exe 85 PID 768 wrote to memory of 4616 768 msedge.exe 86 PID 768 wrote to memory of 4616 768 msedge.exe 86 PID 768 wrote to memory of 3672 768 msedge.exe 87 PID 768 wrote to memory of 3672 768 msedge.exe 87 PID 768 wrote to memory of 3672 768 msedge.exe 87 PID 768 wrote to memory of 3672 768 msedge.exe 87 PID 768 wrote to memory of 3672 768 msedge.exe 87 PID 768 wrote to memory of 3672 768 msedge.exe 87 PID 768 wrote to memory of 3672 768 msedge.exe 87 PID 768 wrote to memory of 3672 768 msedge.exe 87 PID 768 wrote to memory of 3672 768 msedge.exe 87 PID 768 wrote to memory of 3672 768 msedge.exe 87 PID 768 wrote to memory of 3672 768 msedge.exe 87 PID 768 wrote to memory of 3672 768 msedge.exe 87 PID 768 wrote to memory of 3672 768 msedge.exe 87 PID 768 wrote to memory of 3672 768 msedge.exe 87 PID 768 wrote to memory of 3672 768 msedge.exe 87 PID 768 wrote to memory of 3672 768 msedge.exe 87 PID 768 wrote to memory of 3672 768 msedge.exe 87 PID 768 wrote to memory of 3672 768 msedge.exe 87 PID 768 wrote to memory of 3672 768 msedge.exe 87 PID 768 wrote to memory of 3672 768 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\65d7a2896c1664f1ef2f1c4388c6ef86_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaf8b746f8,0x7ffaf8b74708,0x7ffaf8b747182⤵PID:848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,7373602478867929118,7524261103188121266,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,7373602478867929118,7524261103188121266,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,7373602478867929118,7524261103188121266,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,7373602478867929118,7524261103188121266,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,7373602478867929118,7524261103188121266,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,7373602478867929118,7524261103188121266,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,7373602478867929118,7524261103188121266,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,7373602478867929118,7524261103188121266,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:12⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,7373602478867929118,7524261103188121266,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,7373602478867929118,7524261103188121266,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,7373602478867929118,7524261103188121266,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,7373602478867929118,7524261103188121266,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4628 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2000
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2216
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4664
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD55fa37948dfdf95f3387236e2327710c4
SHA125308580cd155fbd47d7e7e32938a0518f6e3eae
SHA256539186408dfc005dc87136066d448aa1a3b4c915060602ca04ee9d1623d47042
SHA5124881dd1ff109928c42b0aa418cfcaccef826e535c35a233dfe0512b4330e197b1a759165d3180262a1af903e1b92f3e28cab05f4dec5a5a88218b58fea9a6329
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
477B
MD5b62bf631b8712742db5967024146a5a5
SHA1f8204637b8c821c3883a77422e79f6dbe2f02c51
SHA2567a67b5d13dc42355aa5a78ecc9ab2b53a44bcca9f3e4fbb152637e2154857b37
SHA51211fbcca67b27c0a58d7601c75acafe159415087e03df6b55a7537f7e911aab9c1a4a4f44943aadb2cf9efe31b4c3a76f6198582ea6544c9b5f66b9ee5eb741a3
-
Filesize
5KB
MD59480389f16822dffbe91512622cb9337
SHA1ecd6b92ffeaad63f1bf895ce9a265a6f3cce2ea1
SHA25603d3a4821633a0761fafe71dec3085262a7ed7948e063e74a55458a166fd2bfb
SHA51255040f0bba3046de3d0cfa556ec80d172ac7663a6d2a218945095bc28c122deb65a7dfc23a15effd26a7da2da70e18bcf9df38cf95f235672afe356daa1586cf
-
Filesize
6KB
MD5ec119e649dc9b01071a8e5c62653515b
SHA14ef796015792177f19b196e7a40c23cf052c2724
SHA2565d66e1c8eaae0eaad21d7a287ad770b5e32c6a8ceea74b5a8516055d22d6a33d
SHA512534b1e48c2a20288296b84abd272296485f32bf755839393e4a185824e1299a47e072d515a48b9b4df69aae2f6764816a9339370cf5ed1323e3826f834cb4eb7
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145