Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 20:58
Static task
static1
Behavioral task
behavioral1
Sample
689c9cee0cb72ce7033cb2de503e4be1_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
689c9cee0cb72ce7033cb2de503e4be1_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
689c9cee0cb72ce7033cb2de503e4be1_JaffaCakes118.html
-
Size
2KB
-
MD5
689c9cee0cb72ce7033cb2de503e4be1
-
SHA1
4f3330bb702a9388139a4c50a3e898727d15b873
-
SHA256
3bb3e84baafdb886971b6320d8f58671c4ae8cf6f44b17e6e651233dbd0a698c
-
SHA512
2ff5bf3a6e9e080f680de624fdc7446711ab70be0fa2ad9c3f0e6a06eb3c46bcd0476c1b488ba2682d138cbdb4fc4b5ace5026fa21881a7f6f029d0eb67fef15
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 1752 msedge.exe 1752 msedge.exe 4540 msedge.exe 4540 msedge.exe 4400 identity_helper.exe 4400 identity_helper.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4540 wrote to memory of 744 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 744 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 3464 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 3464 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 3464 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 3464 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 3464 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 3464 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 3464 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 3464 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 3464 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 3464 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 3464 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 3464 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 3464 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 3464 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 3464 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 3464 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 3464 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 3464 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 3464 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 3464 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 3464 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 3464 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 3464 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 3464 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 3464 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 3464 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 3464 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 3464 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 3464 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 3464 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 3464 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 3464 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 3464 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 3464 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 3464 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 3464 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 3464 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 3464 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 3464 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 3464 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 1752 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 1752 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2240 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2240 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2240 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2240 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2240 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2240 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2240 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2240 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2240 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2240 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2240 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2240 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2240 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2240 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2240 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2240 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2240 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2240 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2240 4540 msedge.exe msedge.exe PID 4540 wrote to memory of 2240 4540 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\689c9cee0cb72ce7033cb2de503e4be1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa4a9b46f8,0x7ffa4a9b4708,0x7ffa4a9b47182⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,17681154127701637919,10961188358174971767,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,17681154127701637919,10961188358174971767,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2484 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,17681154127701637919,10961188358174971767,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17681154127701637919,10961188358174971767,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17681154127701637919,10961188358174971767,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,17681154127701637919,10961188358174971767,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5852 /prefetch:82⤵PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,17681154127701637919,10961188358174971767,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5852 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17681154127701637919,10961188358174971767,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17681154127701637919,10961188358174971767,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17681154127701637919,10961188358174971767,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6008 /prefetch:12⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17681154127701637919,10961188358174971767,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,17681154127701637919,10961188358174971767,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2764 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3056
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4104
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
6KB
MD5e7433cb7f1d8762ea6ec9015a8d8aa4c
SHA101844245be9e2f042e7e67e51d01e5b6dde4f842
SHA2564b4bbedd35a98b01b2677b8932a47c2d62e666118b6bc939f4665880a5408c90
SHA5120bf7a40678315213cba08179d6be2441fcde02e5ad45fe1aeb46f0092568797dad9bebc0e5ed66984bd9fe4e60b0185f09e18e427ac79536fdfa7467aa193aa2
-
Filesize
5KB
MD5510993c2dff6703ae3d87fad14088834
SHA1ee88bf633a053d06cea2c2b99ec1feb6a76b5d42
SHA2562dfbdcca32311669a024da93292936d5c4d62b5d5424a08482e933f20395dfe3
SHA5124c2ce6289a9cdaa6b1969d899f136c28e9658b7c5c8da7bb156801b4ee311379e7ccbd422b04a193c72770a3feb53089f698a31525460623e48ce6ddc876827c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\000002.dbtmp
Filesize16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5829c7af664605d196488912a2e160c60
SHA17a3da620be145f6aee2eb9a1763c8b8a19202938
SHA2569fd9e8e7cbcc61a9dfa4b85d0f7727a41028c7c0d131840039da867e78bbf8ea
SHA5128b111664b656b0b58b67811ba6b0b003b8f8a0cbd5f872fc37c9e2757f05349c2a9b44d93d9d958eae5457c90a99291275498b9e0a6a6d9ca8ccc8a8dd2acf3b
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e