Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 20:43
Static task
static1
Behavioral task
behavioral1
Sample
689017668ec789ee4c22e5f85d9df14e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
689017668ec789ee4c22e5f85d9df14e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
689017668ec789ee4c22e5f85d9df14e_JaffaCakes118.html
-
Size
4KB
-
MD5
689017668ec789ee4c22e5f85d9df14e
-
SHA1
fadd26f8abde8fa5ecc925d0b139dbe4556264c6
-
SHA256
31b836c8f86fe30f136bd325cb4cc4b86fcf50ab6911d7f412512ea054bd668a
-
SHA512
42c2767c9f16c970300875474c96ea55507fad581082982bfe2a3d784eaf242c258cffb1a7e980a91cf9eb69059bc29ecd38eed9c2ea1dc447a25927f36759bd
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oJ1d:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDE
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 3096 msedge.exe 3096 msedge.exe 3440 msedge.exe 3440 msedge.exe 1536 identity_helper.exe 1536 identity_helper.exe 5652 msedge.exe 5652 msedge.exe 5652 msedge.exe 5652 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3440 wrote to memory of 4188 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 4188 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 4460 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 4460 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 4460 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 4460 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 4460 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 4460 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 4460 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 4460 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 4460 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 4460 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 4460 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 4460 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 4460 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 4460 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 4460 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 4460 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 4460 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 4460 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 4460 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 4460 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 4460 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 4460 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 4460 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 4460 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 4460 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 4460 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 4460 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 4460 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 4460 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 4460 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 4460 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 4460 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 4460 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 4460 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 4460 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 4460 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 4460 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 4460 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 4460 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 4460 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 3096 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 3096 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 1876 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 1876 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 1876 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 1876 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 1876 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 1876 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 1876 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 1876 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 1876 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 1876 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 1876 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 1876 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 1876 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 1876 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 1876 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 1876 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 1876 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 1876 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 1876 3440 msedge.exe msedge.exe PID 3440 wrote to memory of 1876 3440 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\689017668ec789ee4c22e5f85d9df14e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff76e346f8,0x7fff76e34708,0x7fff76e347182⤵PID:4188
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,11443294752460765388,14248090864271897674,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:4460
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,11443294752460765388,14248090864271897674,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3096 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,11443294752460765388,14248090864271897674,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:82⤵PID:1876
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11443294752460765388,14248090864271897674,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2260
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11443294752460765388,14248090864271897674,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4880
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,11443294752460765388,14248090864271897674,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5004 /prefetch:82⤵PID:1124
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,11443294752460765388,14248090864271897674,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5004 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1536 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11443294752460765388,14248090864271897674,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:1724
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11443294752460765388,14248090864271897674,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:3788
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11443294752460765388,14248090864271897674,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:12⤵PID:1404
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11443294752460765388,14248090864271897674,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2296 /prefetch:12⤵PID:5028
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,11443294752460765388,14248090864271897674,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5652
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3624
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3704
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
292B
MD50f8a956f6950c81ed7e2909e79a92429
SHA1b74513e46a04037d08ccccbfaaaa20beb4f32c28
SHA2565a5f3e26d6a9ce1b0b7919084eafbcf3269ac3d0f5ea40abbf97b37a03df7350
SHA5120fc2434aa228f1b52767d5ad1d70832da52541cd8495a3f5d227c703e0937c5db0a5551b95b68fa22491e8eb5bf54bf5377d6a7d96196b4b6cc097f60699c5aa
-
Filesize
5KB
MD5409bb22c69db418a20809daa0cdcfc10
SHA11b6f64192e9fde4e9be75e75b88946c34eb41783
SHA2560c6f5a2d967e4f0bc58ccaa00993dfe8de94ccbdc83f5eba48831efb51467a9f
SHA512d4d69492a1e072d08d342fa84ef59508b383e8ec8960f384f0c59f417e27e691601537737a58ced476b695399c571472905e5df52d4cf5fc078aa8a0609ee0d6
-
Filesize
6KB
MD5fe53af57d28f4a0ee0b5324328d93f5a
SHA1760a0ea266f128890e5447c4de375c7dd5f6cf0b
SHA25683e4c1e4ab52e7ee58fef9621076edb66ea4504d6d4eafb09f1536551c3d7c77
SHA5125159b8ee4de3d10805847484b398140e3f7d1fcfec77c3b2ea203ca19d74e078b88ec9edc5418c337d8f1909e2e1275c46a91b28621b88fb8a67d460fd8efbdd
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5c7be99e05878d1c077678f8f3a0118ad
SHA14f3ce86107f053ef62fe617620d3521e1ab1ed09
SHA25626ef07e2a8f19c76a0eebd118ecd6e73457ed19cdc31f8e9b1389922e5c1e79b
SHA512ca64e38691e8d29b01be0489bca2841ca7399aa72d1468a1e843f4d4b82a88039989eb8ab5f86a6aeb1d71efb0637a372618970f65687d8b08d2730d44ce7c3c
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e