Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 21:19
Static task
static1
Behavioral task
behavioral1
Sample
68aba068aba32bef0d9951c44fee1a58_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
68aba068aba32bef0d9951c44fee1a58_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68aba068aba32bef0d9951c44fee1a58_JaffaCakes118.html
-
Size
102KB
-
MD5
68aba068aba32bef0d9951c44fee1a58
-
SHA1
c7a90ca875b6a5a6498b75cc88dd04ec5aca9947
-
SHA256
7aee38a4da4cf3bb61819885766ab48971041e7b60924f5f130b79592baba827
-
SHA512
116662f3d76f484baa7c16fd93d1284cfa8b0c4f44c952b603df8b8e080073fa2fa29afa1158b1bff1e92e96b47b09b7a86560999938e51a1fe7b85d5c0082f8
-
SSDEEP
3072:PBnVO78UwpTXGMOPYPY6/rpKSOgr7N7iuc0U7:khYPY6/rpKSOp
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 5060 msedge.exe 5060 msedge.exe 4196 msedge.exe 4196 msedge.exe 5192 identity_helper.exe 5192 identity_helper.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
Processes:
msedge.exepid process 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4196 wrote to memory of 4896 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 4896 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 5056 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 5056 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 5056 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 5056 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 5056 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 5056 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 5056 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 5056 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 5056 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 5056 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 5056 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 5056 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 5056 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 5056 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 5056 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 5056 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 5056 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 5056 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 5056 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 5056 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 5056 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 5056 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 5056 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 5056 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 5056 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 5056 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 5056 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 5056 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 5056 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 5056 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 5056 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 5056 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 5056 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 5056 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 5056 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 5056 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 5056 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 5056 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 5056 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 5056 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 5060 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 5060 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 936 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 936 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 936 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 936 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 936 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 936 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 936 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 936 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 936 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 936 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 936 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 936 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 936 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 936 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 936 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 936 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 936 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 936 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 936 4196 msedge.exe msedge.exe PID 4196 wrote to memory of 936 4196 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\68aba068aba32bef0d9951c44fee1a58_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa12ce46f8,0x7ffa12ce4708,0x7ffa12ce47182⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,11854863909194687948,13447525353004232431,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,11854863909194687948,13447525353004232431,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,11854863909194687948,13447525353004232431,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2628 /prefetch:82⤵PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,11854863909194687948,13447525353004232431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:5432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,11854863909194687948,13447525353004232431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,11854863909194687948,13447525353004232431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4640 /prefetch:12⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,11854863909194687948,13447525353004232431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,11854863909194687948,13447525353004232431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,11854863909194687948,13447525353004232431,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5712 /prefetch:82⤵PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,11854863909194687948,13447525353004232431,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5712 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,11854863909194687948,13447525353004232431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,11854863909194687948,13447525353004232431,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5812 /prefetch:12⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,11854863909194687948,13447525353004232431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3932 /prefetch:12⤵PID:5372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,11854863909194687948,13447525353004232431,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:12⤵PID:5532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,11854863909194687948,13447525353004232431,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1120 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1140
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1900
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5144
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5befac51f11f91b08a7e4df5184b58e76
SHA13f8c2da07b285068613613953990a100964d7f37
SHA256a523d4d32ee7de726900c43a066191d6234deafb4f56746956b000f3d5f15672
SHA51293084a83c0753917a8153464028f61ec39e1364ab6453925283739ddd36633095c098c949429ca69347110b1b2cc59b7aacf8f38fe067e7cf593affb69ed7b21
-
Filesize
1KB
MD5391f8418db4dc86e6cbb261ba63697c5
SHA13a233d2da696850326f2eb616e3e2affeef8bb70
SHA256f93e4eecb280bba1716b458eb0e291f587900ae7fe0d9946efa61cf1853ec58f
SHA512fb87b762e24589822adc20a707a5ce97f3a1055ba2282a016d01063790f467f9655a32127f3a437d3e0c6294687b48061ab940507c6cc0ea9eaafa5b75c65312
-
Filesize
5KB
MD5659d2b083a93d8f70c9657eb15f0514f
SHA10bab9b7ae6fbeed0baa0f714b9d8ed61cbb2fb24
SHA25648c04b68f3b35098e4956e3ab5124ddefd380491876525f107d48dd6aa0c9877
SHA512b7543d272c86e66a1b2317f11906679aff84843bd12571266abc4b77badf4534f7984f414f16061d988d466eb858477284a56093a4e7eaa05b432f21a57a725a
-
Filesize
6KB
MD548daf118ac87bd124f09ad7849ac4782
SHA178875e5c3b8d0a57e71dde401c0744253c99ba99
SHA256c6142088fc7fcf21f46221ded4d9cfb4232836066654c01526f6b7562e171ae1
SHA5127ca146fdd99c9e104c8186fe56f18522f7b421e67c5527ff60740787b572812e17abf0ef7f7d0a340147e6c25083c374e9c69f8438a4036018b58aae5fe8a266
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ca5f3838b3239012f55d31732bb71a6a
SHA1f40f1863e1b08e4a00a194391daadb5b88deb474
SHA256e4fca594de7fb4de565cf94ae4d7fe2a5e500b715d099e72aee8f5235a18dceb
SHA512191e1e0c43a818a5794998a1e56ca907d235e0ec64268184b0da097dc2d03c4c1c875fd76db4b4017df05fb3cfadd94f246c9f15e25ee3cdc10174f57c99ada3
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e