Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 09:39
Static task
static1
Behavioral task
behavioral1
Sample
66d215599a3f8fbb98393381fb63e024_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
66d215599a3f8fbb98393381fb63e024_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
66d215599a3f8fbb98393381fb63e024_JaffaCakes118.html
-
Size
229KB
-
MD5
66d215599a3f8fbb98393381fb63e024
-
SHA1
6cf82559eec959cc314f650322bc729a7a000920
-
SHA256
e01ebe9c8729c35b79a38583811e1c3059e7d3d3398e7e7f5019949b0038eb68
-
SHA512
564b103cf0e8fd6ce9bb1204e3d800e3249166bc87a5d8f26eaec23b287f7e927fc64c387e9317f7a6e2acad7cf7bdd83fcca7a99d52c145d38563722354e757
-
SSDEEP
1536:0Eh2/rxnKeHKwUw4fz1wg4OxbGbmvlfxotTxpgQOolhAh32IvWXMQ5eqZO3mirw7:ZI14Xu6FbH8L9ksAesPhfbTXVjR+HZRV
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
msedge.exemsedge.exemsedge.exepid process 3360 msedge.exe 3360 msedge.exe 4392 msedge.exe 4392 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
msedge.exepid process 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4392 wrote to memory of 3744 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 3744 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4428 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4428 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4428 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4428 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4428 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4428 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4428 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4428 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4428 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4428 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4428 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4428 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4428 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4428 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4428 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4428 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4428 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4428 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4428 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4428 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4428 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4428 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4428 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4428 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4428 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4428 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4428 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4428 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4428 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4428 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4428 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4428 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4428 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4428 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4428 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4428 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4428 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4428 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4428 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4428 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 3360 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 3360 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4260 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4260 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4260 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4260 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4260 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4260 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4260 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4260 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4260 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4260 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4260 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4260 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4260 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4260 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4260 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4260 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4260 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4260 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4260 4392 msedge.exe msedge.exe PID 4392 wrote to memory of 4260 4392 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\66d215599a3f8fbb98393381fb63e024_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffccfeb46f8,0x7ffccfeb4708,0x7ffccfeb47182⤵PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,4735176488814844146,15656219768540692597,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,4735176488814844146,15656219768540692597,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,4735176488814844146,15656219768540692597,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,4735176488814844146,15656219768540692597,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,4735176488814844146,15656219768540692597,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,4735176488814844146,15656219768540692597,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,4735176488814844146,15656219768540692597,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,4735176488814844146,15656219768540692597,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3028 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4032
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3176
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2184
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
22KB
MD55e74c6d871232d6fe5d88711ece1408b
SHA11a5d3ac31e833df4c091f14c94a2ecd1c6294875
SHA256bcadf445d413314a44375c63418a0f255fbac7afae40be0a80c9231751176105
SHA5129d001eabce7ffdbf8e338725ef07f0033d0780ea474b7d33c2ad63886ff3578d818eb5c9b130d726353cd813160b49f572736dd288cece84e9bd8b784ce530d5
-
Filesize
20KB
MD5b6c8122025aff891940d1d5e1ab95fce
SHA1a0c7ca41d0922d085c358f5dde81ae3e85a8c9c4
SHA2569954c64c68000f615e5066bc255eced1195d1f8b7dbc715f9062ddf9f147e87e
SHA512e62a37b55b6b8d95c24fb624105ff6ff72f118e31760d0da1e8df8e8acf627ec6327c26dfa26df8535585877604c7948d2f621ccabc39beec49787e22c302c10
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5af5a2adb101bb3e8bc8bcf0cb74f9360
SHA19a93fbb6a0586d6e1b3b18c423b786fbd1bba35b
SHA25602a4ea90b281b9bea06955fffdf92f7b074f623b6604ba460189e22ba56c4d28
SHA51250bf4b0921e9bcf1fefb8a3158942f99dd8e742def3fd93c4142bfade868cb259691ec8cb80f312ac568a7609c7381c23c91689c0621040b020c6f78b02fa18a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD563d674ab5b6550dd2a0936e6fd3c4ecd
SHA14506be7fec059571cf34b183d8c704da1522363e
SHA256e82655a0c5bce994255a7183b5fdb54ea01bc9ec3645f623ad03585798f4fe81
SHA5123181e7b12f2a051e8bfb937e3acc1bc92491e10b9769011747e0c26dc8346519e4052cb2fc6921e91cb0499272d09a0a0a246f56ac661b1161deece19d68ebbe
-
Filesize
2KB
MD5234695385d8fd9d086412cb233983060
SHA17a66cae398be1c5ebbfcb6159e7718a6d5ed1546
SHA2562d48ed77eaa9dbfff1ba59c61dd1e04979cd71bb613e478d383bc2e6eddf52a8
SHA512b52d6dfd08c989b2bee4dbe3b210893c427d12d2782883ee15dc2b5731305c6a802a98c9a540370f80058a9c63768bbd65c48469648f9e92b9829444398dfbe0
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
7KB
MD52888d1147c40117ec8b8b06406c6d347
SHA1a1f7dc1258c591ef971121e3002fd7f03b12cd33
SHA2568ba112bfb8b18a66f63e7b2f1a4f4bfc9c96ff6a232d34fcc1122a32668ab5fb
SHA512e72a529ca792ab9ca21cce2ab6b6ec9d9ebc4cbab482fd5725ddcfedd3d75a5397136cb227e58a920dd1c3888bb27d764fae586394db84ee7c27d43410c09525
-
Filesize
5KB
MD50676c0b6278f76d3256951ae06ecb325
SHA1651be9a33fb53f6ffa3103c3492aafc13c2a0d9c
SHA2561e1a03c35d6250c0cde0fdbf379c271af7aed6778730a02bdb4918e1eda68730
SHA5128bb711749c396d7940308007456c307ede46e7afe42fcfdf4c13f0e0a45cffa833bae0bfb8e55ca7ee58efdec69f7f99dd1744dc723133f843a429d98233f0e8
-
Filesize
537B
MD55fee8c138bd29d35ea181677290bc09e
SHA1379b70a3ce300c230356379abe8e249586397b4b
SHA25662767331beddf483b7f414c28f877312eeecbb46cdac7195bf84055c7b1a0020
SHA5123697c24de2ccef895b71099ab6484bae25c07d9423829d003a382b8f639737071d60ae2791660b73fff04eb0794c41d73d8c3b3b8930f966c7b7c84dd2cefb0d
-
Filesize
537B
MD5979f8065ee77097c23451b16c3609464
SHA15c5d02eb9b28cbf16e99509905bc0e54cb7096c0
SHA256cfe65485fcea39cb63108812ec810662036183b96084836b6804962028dd2f0d
SHA512b2e74cc97946b195dcb4b1cb403d5adce838b92a68bff6ad29e894f9987666c52e11d07004846103650ebcad9c337b7d7cfd40a6f2127ca904d336c349bba6dc
-
Filesize
11KB
MD5485e89f44f5af0c40209bdb6ac26c1b5
SHA16cace92e963260f221b3bc38512e5b0018e98d5b
SHA25604ab70e9bdca8dfd7bb9e7dee9a61fcfe20a210e9e8779d21d5d04ae80a3550e
SHA51234c94d1023717de1c8de8b2cd311be6d15af487341647a600f979a71edb5cd8e3a2f1b0af9d58a459756622a6bcf2c017af07eadd6d73e858a13151d0e320f3b
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e