Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 00:53
Static task
static1
Behavioral task
behavioral1
Sample
69349274f47a827cefe152b6114f599b_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
69349274f47a827cefe152b6114f599b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
69349274f47a827cefe152b6114f599b_JaffaCakes118.html
-
Size
19KB
-
MD5
69349274f47a827cefe152b6114f599b
-
SHA1
fcf8bad4e28fa82284e101d73ee7fdd86f2e33c3
-
SHA256
61f851122779fc75eb5baa45342225ce442f945b2847266172aeec768277bf32
-
SHA512
efccf9aa016eaceeb10049161aadd2bdc894b8e5e783d915926ce8ae9fe099099f332ddee3b2497d8de23e87abc18776af528915248d86251f71bd3138e2268e
-
SSDEEP
192:SIM3t0I5fo9cOQivXQWxZxdkVSoAI24czUnjBhAq82qDB8:SIMd0I5nO9HbsvApxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
msedge.exemsedge.exemsedge.exepid process 4520 msedge.exe 4520 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
msedge.exepid process 4688 msedge.exe 4688 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4688 wrote to memory of 3104 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 3104 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 4720 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 4720 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 4720 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 4720 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 4720 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 4720 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 4720 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 4720 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 4720 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 4720 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 4720 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 4720 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 4720 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 4720 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 4720 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 4720 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 4720 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 4720 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 4720 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 4720 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 4720 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 4720 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 4720 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 4720 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 4720 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 4720 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 4720 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 4720 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 4720 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 4720 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 4720 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 4720 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 4720 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 4720 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 4720 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 4720 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 4720 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 4720 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 4720 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 4720 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 4520 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 4520 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 2184 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 2184 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 2184 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 2184 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 2184 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 2184 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 2184 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 2184 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 2184 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 2184 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 2184 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 2184 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 2184 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 2184 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 2184 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 2184 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 2184 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 2184 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 2184 4688 msedge.exe msedge.exe PID 4688 wrote to memory of 2184 4688 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\69349274f47a827cefe152b6114f599b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa088046f8,0x7ffa08804708,0x7ffa088047182⤵PID:3104
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,16994649281220188676,8727013674399837647,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:4720
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,16994649281220188676,8727013674399837647,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4520 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,16994649281220188676,8727013674399837647,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:82⤵PID:2184
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16994649281220188676,8727013674399837647,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4084
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16994649281220188676,8727013674399837647,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4232
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,16994649281220188676,8727013674399837647,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1748 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1720
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4540
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3340
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
5KB
MD5eff522971eca6639201731c189542753
SHA1d501c4091971d0daebd16b4fde588d70f49da286
SHA2564b7a2b76136df2d45fdfd2ec042a6ffe84e1c51433b234144ccb0ac70e62c80f
SHA5125b79fe16b070d864b25f90bbad7da9f2f19512564e41c7236b3a12b61b89f37f0a112b6b197c23f9b2161418c6855087b56b7ebe090de1f1eb1a95f6718b3935
-
Filesize
6KB
MD51fe9e8b5bb3573e20e5c4057f4aa004f
SHA17e1343690104a6e7c68183476d9563b84066487e
SHA2561c584f6a498046475d6641044c9e7f7a0bad30e53cb003aae620c1b765c67447
SHA512404efe07c1d67f3b3f04d3cf3142c67696b20c35ce73ed4ee43a046d9110060bb1df3be3d57faa1c26b505475d10cbe9ede51700e8f8df90b2ed75975f2453e8
-
Filesize
6KB
MD5a6c45089ce9042a111fae15059f30e46
SHA1323893542f23c36a3c52c0a26165a1b65d94763b
SHA256a9609c3e38028729789777144b54e3a03ca3154a08b4630ccacfb454a4a5305c
SHA512531cd391ad3d265280866bf43c9d9c5bd890c479bfc900ab58c742c7819d6376937f16d9f71c48ec6c00718c9f099678d1a27de59f4b373c63969cd085f839c9
-
Filesize
11KB
MD5814a62b78a11a7de861cf2b7cab86d54
SHA11a7c83ee0af2939a63a78a7a6049aa49592554fd
SHA256569af81fabef7515688850a0e64243417d4a3c1a5a9e22dbd0b18068266cc6f1
SHA5127600558c939bf0e2933863f1672e7e0ed66af284fd67c7357e8fce9fd78fb895ae78f2b2a0292c6da12cadb23f492cef62c728adab1fc29758541f098109c2fb
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e