Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 03:27
Static task
static1
Behavioral task
behavioral1
Sample
65da55d36054b8b5bd399858fe2c9f10_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
65da55d36054b8b5bd399858fe2c9f10_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65da55d36054b8b5bd399858fe2c9f10_JaffaCakes118.html
-
Size
137KB
-
MD5
65da55d36054b8b5bd399858fe2c9f10
-
SHA1
8f9d6eacc7afd3845ba1d22cb3b76220210fffcb
-
SHA256
43e705d023f664358c74b78914395ce636db74fe3a2ea2aeccebb76a8b5f66f7
-
SHA512
98ad83d0f0e88f37c92a6b7c772d4d482aae44c7a036857b8331b6c296747cefd07701b9035aa2768818f96d1897aea3a821e02549c284c9aada1fac66beb398
-
SSDEEP
1536:PpziO58j6sSszBYue9EIBle6qWoPV15qYorc5d73eIygQWPelp:kEsSszBYueh/wTM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 3280 msedge.exe 3280 msedge.exe 1724 msedge.exe 1724 msedge.exe 2836 identity_helper.exe 2836 identity_helper.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1724 wrote to memory of 4880 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 4880 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 2828 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 2828 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 2828 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 2828 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 2828 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 2828 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 2828 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 2828 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 2828 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 2828 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 2828 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 2828 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 2828 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 2828 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 2828 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 2828 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 2828 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 2828 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 2828 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 2828 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 2828 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 2828 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 2828 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 2828 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 2828 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 2828 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 2828 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 2828 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 2828 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 2828 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 2828 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 2828 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 2828 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 2828 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 2828 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 2828 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 2828 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 2828 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 2828 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 2828 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 3280 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 3280 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 3652 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 3652 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 3652 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 3652 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 3652 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 3652 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 3652 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 3652 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 3652 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 3652 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 3652 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 3652 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 3652 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 3652 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 3652 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 3652 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 3652 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 3652 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 3652 1724 msedge.exe msedge.exe PID 1724 wrote to memory of 3652 1724 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\65da55d36054b8b5bd399858fe2c9f10_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9e90546f8,0x7ff9e9054708,0x7ff9e90547182⤵PID:4880
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,12321962943701012581,10475958938298487981,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:2828
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,12321962943701012581,10475958938298487981,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3280 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,12321962943701012581,10475958938298487981,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:3652
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,12321962943701012581,10475958938298487981,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:4452
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,12321962943701012581,10475958938298487981,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1456
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,12321962943701012581,10475958938298487981,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5728 /prefetch:82⤵PID:3756
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,12321962943701012581,10475958938298487981,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5728 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2836 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,12321962943701012581,10475958938298487981,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6068 /prefetch:12⤵PID:1792
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,12321962943701012581,10475958938298487981,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:1316
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,12321962943701012581,10475958938298487981,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:12⤵PID:4492
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,12321962943701012581,10475958938298487981,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:2104
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,12321962943701012581,10475958938298487981,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4864 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3640
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:640
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4832
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
1KB
MD5c69b4d2aa5074e4a258cf58c67401ccd
SHA1da0ad17810a133b6e47eefc72060b25345870c0c
SHA256f02c3bb5b181127856d36ad42901ad6af3cb024c50734f7a9a73b33170f415a7
SHA512db2191033faa051e91add480cc2dace79e4f5ae7465c32fc9f7ec3f60dacc3d029d0d867526aa88434d56e5e8fdd9a0c9284f4cb84cf76e3e283748079d73bb2
-
Filesize
5KB
MD52952eccd6dc4e52430a7c1f68e775647
SHA10a79ba421ae3fb91df1017375af7de6a97ea77b5
SHA256c7eb244ffd73a926117a6b5a9c5fb94952c1aebae1ef477c408ea287d1afaf64
SHA512c896ee910e13f4dafdfe4a80e61802267c02e726f41180e9e7e9040dc431bbb35d24c25806dcba642cfd6b1f10a265015631521c0c2d6ca6b72d18795531109c
-
Filesize
6KB
MD5c78473136f3b5726782030fc58fa0fce
SHA101dd7342194af4fe66e18e96f3b7ef1b420dec92
SHA2564f8646fdc9c69c775d88c882a938c7bcac4fbd04eeeec2bf218a9da141964e68
SHA512e74aa311baa01da17698a8cef87586d1bd26175e38a3dcafe589072a7462529867be504a340c69bb9e42500d22af5f6f64a01a84601c34ff79f34c03a32d82f7
-
Filesize
6KB
MD5244c3ed6ff2a990273199d6208b7f6be
SHA1132615eaf7f5a0282eded6f3a3cc0025000bc41d
SHA256c89abcc81f85a4cdb2a5cb9ba68d47d59d592e53c975f5188e72abd6188bc53a
SHA51271c32287cd3edc28624372afb07dd1bcd81adeddb5928ac84ffc42571ef44422ee9309b8aa1a53fd921df68efa9ca9a5d83f7cd561760c190f5ff8d972e1e67e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5102efd0db492b4ec1a064695a25cd9bb
SHA18434e27eeea784d481a20176bf1533bde4d93810
SHA256b854267ff01984215529a2e86f0b2d273dbcb41d8a4f33be196dea449977e7de
SHA512e81dda5ae7d7f7df35815152ca254e4d2060745ec1ea58d2b3dcecf26734ee0e9396ca0d3850d0627c08a726d4c4fdd081e8e4904ee9906d7dd23ca5ca4edc60
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e