Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 00:17
Static task
static1
Behavioral task
behavioral1
Sample
691d8a95dd5616a17b2c113cd66bf1d8_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
691d8a95dd5616a17b2c113cd66bf1d8_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
691d8a95dd5616a17b2c113cd66bf1d8_JaffaCakes118.html
-
Size
18KB
-
MD5
691d8a95dd5616a17b2c113cd66bf1d8
-
SHA1
1b7b9552968e13b0be7e66bf2669d44e8397c4c9
-
SHA256
2acc81f46fdb01d291faca0e426535356849a79b9a43107bfbe28ce312ff8950
-
SHA512
e1e9bb403e56d0fbec6ee4ee5fd4691d63b7b0e5fc7ca657a6e35d607f78b8d1737bfd6a8be2a3e66844b31d16c126df7f4eeabc0d337bc3e3c926c3498d9c6a
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAI+44zUnjBh0O82qDB8:SIMd0I5nvHLsv09xDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
msedge.exemsedge.exemsedge.exepid process 5036 msedge.exe 5036 msedge.exe 2448 msedge.exe 2448 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
msedge.exepid process 2448 msedge.exe 2448 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 2448 wrote to memory of 4112 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 4112 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 4076 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 4076 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 4076 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 4076 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 4076 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 4076 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 4076 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 4076 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 4076 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 4076 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 4076 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 4076 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 4076 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 4076 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 4076 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 4076 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 4076 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 4076 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 4076 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 4076 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 4076 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 4076 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 4076 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 4076 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 4076 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 4076 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 4076 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 4076 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 4076 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 4076 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 4076 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 4076 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 4076 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 4076 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 4076 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 4076 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 4076 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 4076 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 4076 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 4076 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 5036 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 5036 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 3256 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 3256 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 3256 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 3256 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 3256 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 3256 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 3256 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 3256 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 3256 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 3256 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 3256 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 3256 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 3256 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 3256 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 3256 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 3256 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 3256 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 3256 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 3256 2448 msedge.exe msedge.exe PID 2448 wrote to memory of 3256 2448 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\691d8a95dd5616a17b2c113cd66bf1d8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffe4ac46f8,0x7fffe4ac4708,0x7fffe4ac47182⤵PID:4112
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,3037202047619725438,17157833116475389555,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:4076
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,3037202047619725438,17157833116475389555,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5036 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,3037202047619725438,17157833116475389555,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:3256
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,3037202047619725438,17157833116475389555,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:1972
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,3037202047619725438,17157833116475389555,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:980
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,3037202047619725438,17157833116475389555,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4164 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1440
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2052
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
5KB
MD5ae40964aca1dc947a8b59f26c83fa8f7
SHA1654e1701f96be5e54a8e666d11a570a77f2337fd
SHA256c96184b279a49b723a189f344cfded0d6c9c9fd485d183a96697b7443b6cb0e1
SHA512aa2303bdea66397b97bceef94a499f0aa3fbc76b47fc0dcf0074cbd05432eaab2ee1b94ebba9e0cb734e6a7dfd8f02cd243a6bf66e431cb5bfb04fb9c8afe1d5
-
Filesize
6KB
MD5cddd29cf9c3eb4c5566090e137b77f40
SHA1b77262be587de8f4bc3fe76ee027b2bb8d27f304
SHA2569b893df17b01fa819f8d24204e8e12e252421ea28532cf174da12b2dd5e15421
SHA512d31b44330970d518f070ea5f6903b83c620ebe4bc1bcff54170257ca3f081921110dd9287daf023160a75c849a89217cc384ce9a3b50cbd0325b8464f713fa60
-
Filesize
6KB
MD5bca5f89bfdc4ba6c1224ebe064c75583
SHA12d42690983c3ed6ba1c4fb925237448b06ffa3a5
SHA2564441809984e4e341488b810f6bf3669d1d973aeb3d3c8c51f6f2f69362972775
SHA512fa53c530e7b442be3e2439ee592cb0a0c9ad995600840a4da5076e2b4cf11109097d4305056fac1ae861907067a386bbe6633037d36c51194e9039750ac8a55e
-
Filesize
11KB
MD5cccf59627cbca8995adba3329c12e3f9
SHA182e604dd07d7522c603af20282c676e826de6380
SHA256a2893a316622a6a421065f8ac0f68bc7f819cb27b2609998dc039911bcbaa01f
SHA51290723bc9e71cda3dbd7fe06df39beaf03bd5edf4ac581c3b609d2e9fe68cdce90f54bc63c090dd3c414aeac666ed7c5bba65c0159674fab030f07448dd742a87
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e