Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 03:45
Static task
static1
Behavioral task
behavioral1
Sample
65e5308b24dbd45137ff761f9e6c21fb_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
65e5308b24dbd45137ff761f9e6c21fb_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65e5308b24dbd45137ff761f9e6c21fb_JaffaCakes118.html
-
Size
16KB
-
MD5
65e5308b24dbd45137ff761f9e6c21fb
-
SHA1
606e0bce8b89322e25fa61733a6b679f25135e2d
-
SHA256
cebebdb1800efc055c3ce6a96f99ab8b1974ca7d29bb2efd2a822cf1f019e250
-
SHA512
c081d67ee4401dcb4a17d577186e2fbd4761496b86dd95ef16d11a02f96ee21e6e3cc17e49b0b2f6b38b039c369775189a1c7aa008985edffa8a1b42d84fbf6b
-
SSDEEP
384:CopI6XxCRDT0/ezbPOkjPOZ1qwhU/Gia9tiMVLYertzE3iAM1kIL/k6ymnmXC7:gKUDT027asMVYertzE3iAM1kITk6ymnd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 3640 msedge.exe 3640 msedge.exe 2412 msedge.exe 2412 msedge.exe 4312 identity_helper.exe 4312 identity_helper.exe 960 msedge.exe 960 msedge.exe 960 msedge.exe 960 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 2412 wrote to memory of 1436 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 1436 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 1240 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 1240 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 1240 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 1240 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 1240 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 1240 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 1240 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 1240 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 1240 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 1240 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 1240 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 1240 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 1240 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 1240 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 1240 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 1240 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 1240 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 1240 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 1240 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 1240 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 1240 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 1240 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 1240 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 1240 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 1240 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 1240 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 1240 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 1240 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 1240 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 1240 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 1240 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 1240 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 1240 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 1240 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 1240 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 1240 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 1240 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 1240 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 1240 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 1240 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 3640 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 3640 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2592 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2592 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2592 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2592 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2592 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2592 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2592 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2592 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2592 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2592 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2592 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2592 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2592 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2592 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2592 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2592 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2592 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2592 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2592 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2592 2412 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\65e5308b24dbd45137ff761f9e6c21fb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa597346f8,0x7ffa59734708,0x7ffa597347182⤵PID:1436
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,4945262327747345887,1097747376975789869,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:1240
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,4945262327747345887,1097747376975789869,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3640 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,4945262327747345887,1097747376975789869,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2948 /prefetch:82⤵PID:2592
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,4945262327747345887,1097747376975789869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1508
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,4945262327747345887,1097747376975789869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:532
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,4945262327747345887,1097747376975789869,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5420 /prefetch:82⤵PID:636
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,4945262327747345887,1097747376975789869,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5420 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4312 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,4945262327747345887,1097747376975789869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:4516
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,4945262327747345887,1097747376975789869,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:1392
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,4945262327747345887,1097747376975789869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:4792
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,4945262327747345887,1097747376975789869,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4136 /prefetch:12⤵PID:3560
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,4945262327747345887,1097747376975789869,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4888 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:960
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4880
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1828
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
470B
MD51bd861537a7b3fe850c75636c4db70ae
SHA13a5d0a7a463314da41fd96bb23e81bd0560a8017
SHA25610c5b7d46c8ab8a522ea722657d59dc1a0d26128c2d0df9ed615bf3afab56723
SHA512c3e85ab6f2f46de3daf97fcd2f6a62b605fa62f164d05fd02a99d7891287cb0cfe25ec8288d602f243059be655ab400ffd8c5bddfceb4811c1632905e9e06a17
-
Filesize
5KB
MD502699d22be4f59cee022b403316eedee
SHA1dd55a24af61197e3e0916247a91ecaa2d9c97c62
SHA256b68e50e52c3ced2a0d0146f04d69ea8067d16ed729949e01845e759b2be79e1f
SHA51274f6de5c37a287a583e398eb2f4bdcb800a294028714ab9fafcbf16b9521b777b3e74149b573b9732b9310fe38c5468ec34be06941161e08b0d4df20538e1ded
-
Filesize
6KB
MD55b55e5cea07f0d80533c71fdcb5781e9
SHA1feb7283559df2185f558693f1ef59195791daf86
SHA25690d65c90bc74d0cd26c8bbc42a5a3839bac9e7ad509a30bbc7aafa737f067094
SHA5121bdd41c894823b2c05b464257732ab7f4fef6c6eca8fa3cbd53b7f4addbe5beb1a45db883c28b0b1bc1d9c2f54bcd9d009d7a26deb9238124ca24c4810c82a62
-
Filesize
6KB
MD56ae8e399b095df833795ea3471f4cea4
SHA1aa2434ee63aeb5ead2bd367671b05c4f27fafbaf
SHA256fa492f667c4861d24b23b25eed4cf58364140e556f3dccba098979d82df3b5df
SHA512da0fee89afcd1cfb7ffc4b165aa4ce1a08f503e5b3da2b550d47d7987c652e68467c290e3d6eba278c0d3e524c46cdb86f5a977214910f796db70ddc7f1605f7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b6e58745d210114fee7683c122acc37b
SHA19dfa6c27ed10f667d523bcd759d313a51e6a7c80
SHA2563b54d044a8c13a81c3e462f29cdb777d81e045ce5b664549cd7addb3b8a4c0d9
SHA512b6580f52d90bcf06a5f57f45362eeeece8217721f675940fc63e800cf15b7a974d8e041070617b669cc5b9a5545b90cb65b7cf7e4ac4823f224aa49b188a60b5
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e