Analysis
-
max time kernel
145s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 19:51
Static task
static1
Behavioral task
behavioral1
Sample
686aa876606635c80961039e2c547b80_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
686aa876606635c80961039e2c547b80_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
686aa876606635c80961039e2c547b80_JaffaCakes118.html
-
Size
20KB
-
MD5
686aa876606635c80961039e2c547b80
-
SHA1
a3f17c2c1187d91c2416271dc214230537fab0cb
-
SHA256
4a8b216997177ebee1dcec6b3e0e12c6b503d6e38ab916e7dd3ff1ace632284f
-
SHA512
52d7201e3ba16d72ae3da003c59930c66b7e14801005053cdca7b150a27c3403d049cfe12a0c422318f56b921571dc0379536f2237225b936fd5a20a96039632
-
SSDEEP
192:ejgl3DijLOTciZh/jIB58U7CGWfhXm/HnMmKlR48oWP6u5Se+bhXRZ:UQDiOTD/jIBv+GIJiEabzZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 2112 msedge.exe 2112 msedge.exe 3904 msedge.exe 3904 msedge.exe 1320 identity_helper.exe 1320 identity_helper.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3904 wrote to memory of 4328 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 4328 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 4760 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 4760 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 4760 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 4760 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 4760 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 4760 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 4760 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 4760 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 4760 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 4760 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 4760 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 4760 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 4760 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 4760 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 4760 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 4760 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 4760 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 4760 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 4760 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 4760 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 4760 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 4760 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 4760 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 4760 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 4760 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 4760 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 4760 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 4760 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 4760 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 4760 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 4760 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 4760 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 4760 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 4760 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 4760 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 4760 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 4760 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 4760 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 4760 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 4760 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 2112 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 2112 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 1808 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 1808 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 1808 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 1808 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 1808 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 1808 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 1808 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 1808 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 1808 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 1808 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 1808 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 1808 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 1808 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 1808 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 1808 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 1808 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 1808 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 1808 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 1808 3904 msedge.exe msedge.exe PID 3904 wrote to memory of 1808 3904 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\686aa876606635c80961039e2c547b80_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa322e46f8,0x7ffa322e4708,0x7ffa322e47182⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,11639224811262696815,10718110130870003075,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,11639224811262696815,10718110130870003075,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,11639224811262696815,10718110130870003075,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:1808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,11639224811262696815,10718110130870003075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,11639224811262696815,10718110130870003075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,11639224811262696815,10718110130870003075,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4720 /prefetch:82⤵PID:856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,11639224811262696815,10718110130870003075,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4720 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,11639224811262696815,10718110130870003075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:12⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,11639224811262696815,10718110130870003075,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4680 /prefetch:12⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,11639224811262696815,10718110130870003075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,11639224811262696815,10718110130870003075,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,11639224811262696815,10718110130870003075,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3040 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1792
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4416
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
177B
MD542c78ac6c948653ab96de2feaf158653
SHA1f8a938b9dd70674542e6dfb1d9fc90416b6f3ec2
SHA256b5d6a66d05ab0cb2ddea05225c3839e918f012a9fd4f4f0fb204b32f9aff1f8d
SHA51243adf99c4a19cdc0d682bdf83d510f00374c64a320bbb482cb515de902b4370dcfeea707c590e38a2a671f0b47a003222c199ef3e5139b411c302e18435fb0f9
-
Filesize
5KB
MD56436e7d48bb3ca044f9745c80c9ac2d3
SHA1f57e64ce30a1cc9844a124fb1da9088aa4162b84
SHA256c2a314d96d9166d53ba7109151b3226473f2b4fe0371068ad57df17d79cb8a92
SHA51237588a398a0b93eda6176051b072e51b3b8b7492b419ee476a4ba4b502fc80d43dc1085f2e0c9ee55aa8ec5a57f0f876e1de4d597ff62af4c5e6b22a91aeafc2
-
Filesize
6KB
MD55c4bcffe314242fc7567996a2e23b012
SHA16ec320efd7388a5457bd0e27137a75cbc7b97be4
SHA2564b9c13766949aa43a1e858550e8a10793698ac5b2ead01dac40fcb8ba5347b14
SHA5124638be04eb391783f4537565f7663f19366e8ff15ff42eb668a7d665b81767601ee10e28e54554159fccf7628d2ffc9584909e35262eff0e22cbeab36d5f5d07
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ee0f8f21d04922d51db60272a48243d4
SHA1c6730a58657ca6c66a4391ef05525fa19c105e11
SHA25684cacc1c9722b7ab33e04c71cb7dacefccb31bbd7f76edbe26d8fda25465e284
SHA512afe3da81646132ab99ff00fd40492c02d7c46e53c785fee6f8b9a066aaa9a94bf3f8908bdc3f4002b14ca1bf3ae88b5c3a07e8e3ec996053356190423b8fcdd6
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e