Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 00:17
Static task
static1
Behavioral task
behavioral1
Sample
691d28244b1838bab344cc21b89dd4d2_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
691d28244b1838bab344cc21b89dd4d2_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
691d28244b1838bab344cc21b89dd4d2_JaffaCakes118.html
-
Size
460KB
-
MD5
691d28244b1838bab344cc21b89dd4d2
-
SHA1
e7dac931f62e68de18e1eb8e9d725428ff67095a
-
SHA256
feaed5c7641f5e7b73277191bfc30f28c64ed0b16df7cc2e7dde52304b5d3c54
-
SHA512
9e6b97c2fafe15634ce70695503c3667ce094ab036e247e7e41e46b28e13710599bbc46eeb369edbb72788ddfea3dab57f32ef8e57a089549d87ede0712131aa
-
SSDEEP
6144:SEsMYod+X3oI+YMsMYod+X3oI+YVzsMYod+X3oI+YLsMYod+X3oI+YQ:H5d+X3g5d+X37H5d+X315d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 1120 msedge.exe 1120 msedge.exe 1008 msedge.exe 1008 msedge.exe 3384 identity_helper.exe 3384 identity_helper.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1008 wrote to memory of 4056 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 4056 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1616 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1616 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1616 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1616 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1616 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1616 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1616 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1616 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1616 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1616 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1616 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1616 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1616 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1616 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1616 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1616 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1616 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1616 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1616 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1616 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1616 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1616 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1616 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1616 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1616 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1616 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1616 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1616 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1616 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1616 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1616 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1616 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1616 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1616 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1616 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1616 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1616 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1616 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1616 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1616 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1120 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1120 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1124 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1124 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1124 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1124 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1124 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1124 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1124 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1124 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1124 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1124 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1124 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1124 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1124 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1124 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1124 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1124 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1124 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1124 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1124 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1124 1008 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\691d28244b1838bab344cc21b89dd4d2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa445a46f8,0x7ffa445a4708,0x7ffa445a47182⤵PID:4056
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,18310551160856201817,4182360656373619659,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:22⤵PID:1616
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2224,18310551160856201817,4182360656373619659,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2424 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1120 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2224,18310551160856201817,4182360656373619659,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:1124
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,18310551160856201817,4182360656373619659,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:736
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,18310551160856201817,4182360656373619659,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2428
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,18310551160856201817,4182360656373619659,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵PID:548
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,18310551160856201817,4182360656373619659,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3384 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,18310551160856201817,4182360656373619659,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4092 /prefetch:12⤵PID:4420
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,18310551160856201817,4182360656373619659,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:4436
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,18310551160856201817,4182360656373619659,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:992
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,18310551160856201817,4182360656373619659,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:2852
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,18310551160856201817,4182360656373619659,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1056 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4696
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3612
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
6KB
MD53a665bbf5f3246eacf411cb517786e11
SHA1ee7f61ce65a0e0211578cc245145c9c3e58f49e9
SHA25642bbc9e4f9c96a1cbbb274826a880d7160824563edfb276b1016e2632d0c5f32
SHA51280356317539599be0f0aa53d0ff44e67fa9e1a1b79854e473e1975fcf9a103611c9c0c13aade0a62c8d8868a28624314cb5508538bd9275c43365b6650254dca
-
Filesize
5KB
MD5ad0cbece04389e75f0ab1306c1cf8e96
SHA13f789c73e874e4700a7987f9a7c6e9d20d62aeec
SHA256457855cc2d5b3c3ba348855dc3b4a16f519b29d911cb95b19a89bfb51911558b
SHA51231e8c955e0cde2c7af42f4a83a2bb38222ea135a134ed209d98e21089ee5aef54a073057981f34ff87954b6e6c007403c7ec819bb814142de7238381f41fc0ac
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5525dd89b5314d7a9c18208d009cd9696
SHA153b1fbcef60283aa7a942d0accf6aac36200319e
SHA256d31c582a9d608739c39435691abef20839dd81ad39ab6f9e4f713f594d9dcb91
SHA512ff05f3f1f915262d6d669e56179c6911e0ef7f00a1177ba265e74dae5f0fb72c321433dda1fb98bcd234fb7a16660a35f3580f1125c8820f8f7e9789aca23b85
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e