Analysis
-
max time kernel
140s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 00:17
Static task
static1
Behavioral task
behavioral1
Sample
691d18daf206abc6e5d2376665299f05_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
691d18daf206abc6e5d2376665299f05_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
691d18daf206abc6e5d2376665299f05_JaffaCakes118.html
-
Size
85KB
-
MD5
691d18daf206abc6e5d2376665299f05
-
SHA1
e5537bccbe9e5005d30f782b40151246f9160715
-
SHA256
e9cb8987a1e9f52fa7a9124b2980b82bc60ffcb23b1410bcc36b5e03743bf92a
-
SHA512
4e0e29754a9065cc3a78c1dcf6b2c7a17b82a70457462f0a2bc2f3b62767facc95a16297d78e94a1d94afcb797012d1832e512f64a8024827a47f16e7050b4b7
-
SSDEEP
1536:mQcu0dyFR178/+TsQLCVcKpCp/BA30kCdQtpQuFBE0K:mQcu0ibI/78C30kgQnQL0K
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exepid process 544 msedge.exe 544 msedge.exe 2720 msedge.exe 2720 msedge.exe 4036 identity_helper.exe 4036 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
Processes:
msedge.exepid process 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
msedge.exepid process 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 2720 wrote to memory of 2276 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 2276 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 3352 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 3352 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 3352 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 3352 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 3352 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 3352 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 3352 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 3352 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 3352 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 3352 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 3352 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 3352 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 3352 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 3352 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 3352 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 3352 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 3352 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 3352 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 3352 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 3352 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 3352 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 3352 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 3352 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 3352 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 3352 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 3352 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 3352 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 3352 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 3352 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 3352 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 3352 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 3352 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 3352 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 3352 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 3352 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 3352 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 3352 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 3352 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 3352 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 3352 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 544 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 544 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 4360 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 4360 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 4360 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 4360 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 4360 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 4360 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 4360 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 4360 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 4360 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 4360 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 4360 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 4360 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 4360 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 4360 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 4360 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 4360 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 4360 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 4360 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 4360 2720 msedge.exe msedge.exe PID 2720 wrote to memory of 4360 2720 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\691d18daf206abc6e5d2376665299f05_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff80c8546f8,0x7ff80c854708,0x7ff80c8547182⤵PID:2276
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,10214829614665723636,8013443146991790961,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:3352
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,10214829614665723636,8013443146991790961,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:544 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,10214829614665723636,8013443146991790961,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:4360
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,10214829614665723636,8013443146991790961,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:2016
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,10214829614665723636,8013443146991790961,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:5028
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,10214829614665723636,8013443146991790961,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4964 /prefetch:82⤵PID:4836
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,10214829614665723636,8013443146991790961,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4964 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4036 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,10214829614665723636,8013443146991790961,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:3440
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,10214829614665723636,8013443146991790961,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:4372
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,10214829614665723636,8013443146991790961,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:4880
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,10214829614665723636,8013443146991790961,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:4900
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,10214829614665723636,8013443146991790961,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3736 /prefetch:12⤵PID:1648
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,10214829614665723636,8013443146991790961,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4900 /prefetch:12⤵PID:664
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5064
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
264KB
MD5d76987b0bb037278be1b12146ad10551
SHA15c889f89edc41d2c4a4f4d8a7ce2c7abf06225a4
SHA256844e0210921dec3e786011489de759edbba8b8927981cff6d28f9620de5bbb15
SHA5128b9c8347b6f0f4e9616763a69e75e68d23410364cfe7032236c6bf40a96d4fac5f73b9b033eae99dca5573cebcc43212dbdd21eb327872ce8d8829c3b14e54a0
-
Filesize
5KB
MD5c7f16c2c544a1423c09c658cd1ce7f33
SHA1cd336a30a6f824099fd74cf9850e5929aa32461c
SHA2569c50433b13a2cb672bae90cf3791d636afa6088a20d072eb83eb1311340e0d3d
SHA5127494a7cacb2382ec632265e8dee4bf3a15a06985ebfab4913ed8689531ddc1b8c6cd0489fb585e09d2351a918f0f96a65fae5d375a50d900fde30fe957bb3e0d
-
Filesize
6KB
MD56026bb379e33cd745d124b3727d8c75b
SHA125bf08d830ffc8e05477a8b591205656d717b85d
SHA25685abc0a78f7ff8d28d534e11de80d050aed9fa9f40f35deebb30c60da65c3da0
SHA51254a205693cefa6337c933f1c6f2bb5b21393b87540d6ba3722e989da6de856d294e1f69a9aec3d32b0c60a094ab6c16eab5bc452dd7cb1784e2fc3d3dfb2da1f
-
Filesize
6KB
MD587460a7d016957d64272a78e86b2426a
SHA1ef8ef374b3e0f6a17fe3df0da110b22622bce0ef
SHA256dd665ebe43319f877d24a6fd6354b25251f8b8b82cc299c89f1e51baba29da55
SHA512499f44351279c8b9642f9a6222978e1468c229db09f58cd88a335ff6b43ff347f58684451328c4d4eaa27a674bdf2aad0a81714549d04e76941e57783781365d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD58e1259ae8729eb4a5672a5ed51ebeae7
SHA113dd3d05bc941e547b82132896403ffa059f8f78
SHA256646107209414febb53068678eeb6114de7a443233cc251ec8a115b59687206ac
SHA512eab90001f5cf6a89988373e065cce57f543e8f37f0ca9a6289ad1a0238c48bc70207b3e43d9c78082e17992b83d6d3d59b6d29bd883016ce1d65ed77113bf1f6
-
Filesize
11KB
MD5b959aa0a67db08bc89c5486ca761ca91
SHA1271cf77d63cc1865a2057374847d69a0eb45f52c
SHA2563053393be5b80efb035ba27bb676b9e3cf458359b94757926dcd0236097098d8
SHA512db3c7599031d063a49156630231320adec9f0d09dafd96c4a7933ce125a15e692034d222fa6f2e6743a58631c949db7dfda36b347bd40ebc721d0279087552be
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e