Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 09:49
Static task
static1
Behavioral task
behavioral1
Sample
66d9620572104aec72007aa5df3ae671_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
66d9620572104aec72007aa5df3ae671_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
66d9620572104aec72007aa5df3ae671_JaffaCakes118.html
-
Size
798B
-
MD5
66d9620572104aec72007aa5df3ae671
-
SHA1
52db6b37e28756c425f421eccd9282733a5763ca
-
SHA256
e0d9afe9bea9ed11e4209c427c62f01152cd88b9398757cdc9d540bb1b0f11ec
-
SHA512
a48ac0d657b0a9cccb07f2cc0cdd48d836700b3985ac1a9634dfe417d1990db525aa9809b1f9c66990e1d3e79fb1b7413ab889e6292dc38ae0cadabd2c68faa7
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2572 msedge.exe 2572 msedge.exe 1336 msedge.exe 1336 msedge.exe 4928 identity_helper.exe 4928 identity_helper.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1336 wrote to memory of 3196 1336 msedge.exe 84 PID 1336 wrote to memory of 3196 1336 msedge.exe 84 PID 1336 wrote to memory of 5036 1336 msedge.exe 85 PID 1336 wrote to memory of 5036 1336 msedge.exe 85 PID 1336 wrote to memory of 5036 1336 msedge.exe 85 PID 1336 wrote to memory of 5036 1336 msedge.exe 85 PID 1336 wrote to memory of 5036 1336 msedge.exe 85 PID 1336 wrote to memory of 5036 1336 msedge.exe 85 PID 1336 wrote to memory of 5036 1336 msedge.exe 85 PID 1336 wrote to memory of 5036 1336 msedge.exe 85 PID 1336 wrote to memory of 5036 1336 msedge.exe 85 PID 1336 wrote to memory of 5036 1336 msedge.exe 85 PID 1336 wrote to memory of 5036 1336 msedge.exe 85 PID 1336 wrote to memory of 5036 1336 msedge.exe 85 PID 1336 wrote to memory of 5036 1336 msedge.exe 85 PID 1336 wrote to memory of 5036 1336 msedge.exe 85 PID 1336 wrote to memory of 5036 1336 msedge.exe 85 PID 1336 wrote to memory of 5036 1336 msedge.exe 85 PID 1336 wrote to memory of 5036 1336 msedge.exe 85 PID 1336 wrote to memory of 5036 1336 msedge.exe 85 PID 1336 wrote to memory of 5036 1336 msedge.exe 85 PID 1336 wrote to memory of 5036 1336 msedge.exe 85 PID 1336 wrote to memory of 5036 1336 msedge.exe 85 PID 1336 wrote to memory of 5036 1336 msedge.exe 85 PID 1336 wrote to memory of 5036 1336 msedge.exe 85 PID 1336 wrote to memory of 5036 1336 msedge.exe 85 PID 1336 wrote to memory of 5036 1336 msedge.exe 85 PID 1336 wrote to memory of 5036 1336 msedge.exe 85 PID 1336 wrote to memory of 5036 1336 msedge.exe 85 PID 1336 wrote to memory of 5036 1336 msedge.exe 85 PID 1336 wrote to memory of 5036 1336 msedge.exe 85 PID 1336 wrote to memory of 5036 1336 msedge.exe 85 PID 1336 wrote to memory of 5036 1336 msedge.exe 85 PID 1336 wrote to memory of 5036 1336 msedge.exe 85 PID 1336 wrote to memory of 5036 1336 msedge.exe 85 PID 1336 wrote to memory of 5036 1336 msedge.exe 85 PID 1336 wrote to memory of 5036 1336 msedge.exe 85 PID 1336 wrote to memory of 5036 1336 msedge.exe 85 PID 1336 wrote to memory of 5036 1336 msedge.exe 85 PID 1336 wrote to memory of 5036 1336 msedge.exe 85 PID 1336 wrote to memory of 5036 1336 msedge.exe 85 PID 1336 wrote to memory of 5036 1336 msedge.exe 85 PID 1336 wrote to memory of 2572 1336 msedge.exe 86 PID 1336 wrote to memory of 2572 1336 msedge.exe 86 PID 1336 wrote to memory of 2684 1336 msedge.exe 87 PID 1336 wrote to memory of 2684 1336 msedge.exe 87 PID 1336 wrote to memory of 2684 1336 msedge.exe 87 PID 1336 wrote to memory of 2684 1336 msedge.exe 87 PID 1336 wrote to memory of 2684 1336 msedge.exe 87 PID 1336 wrote to memory of 2684 1336 msedge.exe 87 PID 1336 wrote to memory of 2684 1336 msedge.exe 87 PID 1336 wrote to memory of 2684 1336 msedge.exe 87 PID 1336 wrote to memory of 2684 1336 msedge.exe 87 PID 1336 wrote to memory of 2684 1336 msedge.exe 87 PID 1336 wrote to memory of 2684 1336 msedge.exe 87 PID 1336 wrote to memory of 2684 1336 msedge.exe 87 PID 1336 wrote to memory of 2684 1336 msedge.exe 87 PID 1336 wrote to memory of 2684 1336 msedge.exe 87 PID 1336 wrote to memory of 2684 1336 msedge.exe 87 PID 1336 wrote to memory of 2684 1336 msedge.exe 87 PID 1336 wrote to memory of 2684 1336 msedge.exe 87 PID 1336 wrote to memory of 2684 1336 msedge.exe 87 PID 1336 wrote to memory of 2684 1336 msedge.exe 87 PID 1336 wrote to memory of 2684 1336 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\66d9620572104aec72007aa5df3ae671_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff90ff846f8,0x7ff90ff84708,0x7ff90ff847182⤵PID:3196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1568,11054388802058874697,13206433097234855253,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2280 /prefetch:22⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1568,11054388802058874697,13206433097234855253,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1568,11054388802058874697,13206433097234855253,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1568,11054388802058874697,13206433097234855253,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1568,11054388802058874697,13206433097234855253,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1568,11054388802058874697,13206433097234855253,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4248 /prefetch:12⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1568,11054388802058874697,13206433097234855253,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4844 /prefetch:12⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1568,11054388802058874697,13206433097234855253,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3688 /prefetch:12⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1568,11054388802058874697,13206433097234855253,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5436 /prefetch:82⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1568,11054388802058874697,13206433097234855253,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5436 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1568,11054388802058874697,13206433097234855253,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1568,11054388802058874697,13206433097234855253,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1568,11054388802058874697,13206433097234855253,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1568,11054388802058874697,13206433097234855253,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4888 /prefetch:12⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1568,11054388802058874697,13206433097234855253,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2936 /prefetch:12⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1568,11054388802058874697,13206433097234855253,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3488 /prefetch:12⤵PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1568,11054388802058874697,13206433097234855253,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2648 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3980
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2092
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1576
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
5KB
MD5c7cda111f6edee67dace442fc9c6fa0b
SHA10b266b095520bb0899fb0855b5043014ff3e4a41
SHA25685c695c839dbdaf503477bcdfb45d20633f71043837e2a1e09eb16c17450da29
SHA51292ef3e0a21dd69433981e18b55a67746a6c006b597e52d1863305b6918fff3d5c0538b62e9429a0e21a10423cf327a259b4adec93563a64f57beca3cd827d148
-
Filesize
6KB
MD51b755d015d36f9e7288bf58718803290
SHA1dd7c7c3174b12e2a66aa38d56e33de1799fe10dc
SHA256fcfde31cc1de5d84e275c43d44cbd21c15fb1989c2ae29e2a015c99775025a6e
SHA512214b7ba82b2de8eb4b92b1fd682881c9b5fca0027067bafe0d9031428dfcfb8ab8c62c0af75a0070b2c8753013b1afcf46d373c37605ce5aa7158049e88cc545
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57f7d3b60598048056d4612f1b1657327
SHA1f87a480a5e8eeec76eeb2591a09a179098d10b16
SHA25628cabd913b2b007299743a9e12bd731fc0d3629cffd2acc3cd90bd0ac93f04b4
SHA512ed9e0688be21d580e112989d0e980191929ad63ee77e205036d0b5969361b17019c4bb7bbd6a8f5c6678e39a45de4539d6433e992b3d8b69b375cff84cd4805a