Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 03:26
Static task
static1
Behavioral task
behavioral1
Sample
65d959d628b54f1b10df0c9b1bd5f1d4_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
65d959d628b54f1b10df0c9b1bd5f1d4_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65d959d628b54f1b10df0c9b1bd5f1d4_JaffaCakes118.html
-
Size
41KB
-
MD5
65d959d628b54f1b10df0c9b1bd5f1d4
-
SHA1
3f453e7b2f2708e4d9cace56789d1e8d2f9e4f48
-
SHA256
6572651948f53c4ac51e619fd6134263afc4872bd2334d457bc3e902008a8a97
-
SHA512
06d8b0980d0e69e2cf20ba84b6d36a1590c818969faf9d1d847a02650d7324864383c578186d796e6f9ac8349a3ce1e7f57963335d54d5911c5fa07461e0128b
-
SSDEEP
768:4yvmIRIOITIwIgIiKZgNDfIwIGI5IVJ7SqIRIOITIwIgIiKZgNDfIwIGI5IVJ7Sl:4yvmIRIOITIwIgIiKZgNDfIwIGI5IVJs
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 4780 msedge.exe 4780 msedge.exe 1696 msedge.exe 1696 msedge.exe 456 identity_helper.exe 456 identity_helper.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1696 wrote to memory of 4320 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 4320 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 436 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 436 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 436 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 436 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 436 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 436 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 436 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 436 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 436 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 436 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 436 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 436 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 436 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 436 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 436 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 436 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 436 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 436 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 436 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 436 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 436 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 436 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 436 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 436 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 436 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 436 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 436 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 436 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 436 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 436 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 436 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 436 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 436 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 436 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 436 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 436 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 436 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 436 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 436 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 436 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 4780 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 4780 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 4388 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 4388 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 4388 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 4388 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 4388 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 4388 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 4388 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 4388 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 4388 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 4388 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 4388 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 4388 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 4388 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 4388 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 4388 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 4388 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 4388 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 4388 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 4388 1696 msedge.exe msedge.exe PID 1696 wrote to memory of 4388 1696 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\65d959d628b54f1b10df0c9b1bd5f1d4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff8c3c46f8,0x7fff8c3c4708,0x7fff8c3c47182⤵PID:4320
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,1408063362693687846,17916118750121558870,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2032 /prefetch:22⤵PID:436
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2008,1408063362693687846,17916118750121558870,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4780 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2008,1408063362693687846,17916118750121558870,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:4388
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,1408063362693687846,17916118750121558870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3272
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,1408063362693687846,17916118750121558870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3536
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,1408063362693687846,17916118750121558870,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 /prefetch:82⤵PID:1956
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,1408063362693687846,17916118750121558870,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:456 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,1408063362693687846,17916118750121558870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:4092
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,1408063362693687846,17916118750121558870,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:3068
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,1408063362693687846,17916118750121558870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:5104
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,1408063362693687846,17916118750121558870,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:1032
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,1408063362693687846,17916118750121558870,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4788 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1724
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1596
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
385B
MD5afff3e617503d0d3c4c9e46178c1e414
SHA109d3221c39387fbad05c555db44b69da43a06a96
SHA256cf2c154100346472ac93ca1f01d87fc7c9c496a0e8ab0bd848ba2f13b165dc62
SHA5121e9cfbee500713ce56cb3e7ede710a684f386d0b6b4b21290feb1e13c4e7f52b642067117b92deab111747f0531a79a8de506b802c8c1240145128d102044b89
-
Filesize
5KB
MD562f85e71180f7fa4256af3590829dcae
SHA159f9e89665031596d5313ac8a2146252c93d4119
SHA25667c50993d5ca7f28b5864faf28a1f6709bdc647bfb7f32609383f38b77f25961
SHA512bd97bbb268ea1ca9141d3ba7806e20ce2efe6d2367c9c8173b19ec4b10e35231d0e227e1028df2aa50abb49431582a0d65da8da628ab0c504445eab30c828a61
-
Filesize
6KB
MD51cb8d04759d1980325478a8038a0e843
SHA1f53585e5437831775c5564a3a7919e5a1c9c3966
SHA25662ae0a6cba06719c34e7ab117097a4129a4170b9038de7333a98c3783fccd5fa
SHA512ff04ca6f57e680f34e839c8dff48890f47ababc259a9c2927fa9e8e27ed0ce6e7eddc3ffe10e9c7de90472f1c2c3462e0dd342544fbcb6d2aacc2ab0a9a12d16
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\a4c3c9e1-da65-4418-bd79-285dcf0175e3.tmp
Filesize6KB
MD527685e020e10dead8aab649bcfcd5524
SHA1a93ed319e0b16b087ebe9f3d3057f098c48ccb72
SHA256324c05f28ac32110d1af8cdee073b86aa9551bac5b3fdc49a3334866a29883c6
SHA512f610f7fada5201c4c0d16f0d5a0a27b7eb2b91ad704d770f4205978887a5420e7d044b38862d7893922915997451172f809d38f28b20b3cdf18146a699eab33c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56af218617130ad061f4b7beeee7aa204
SHA18058906d717f0e70fa76419fa036225335a5d110
SHA256c81dddf6cbf62f6209db6e9f7051a2ba3a563813982f419c2d53655216de27c8
SHA5122a0f53620667d445b7689f4b6150939ec6a0f00cc99b04ed59b76e98e2b5f7bf0d302eb37c72dd3b51f4c3745fb847d68b2d8a008822835c60610dfc3ee89e44
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e