Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 00:21
Static task
static1
Behavioral task
behavioral1
Sample
691f825eec0a5bf1f8ca341fd894ee70_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
691f825eec0a5bf1f8ca341fd894ee70_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
691f825eec0a5bf1f8ca341fd894ee70_JaffaCakes118.html
-
Size
905KB
-
MD5
691f825eec0a5bf1f8ca341fd894ee70
-
SHA1
e147bf8f4e371bdffcfccd878b14554125daddaf
-
SHA256
bebf5a4ebf3bfdcbf159bd4973600d660336d3d2af6ca89dcd1de9ac2b8df2a5
-
SHA512
735db3cea3501a6b2f36f15f37b10f54603dd22e4b6eec6477d725af3fa17496ee5accf3af795f0b682a22b68e218f6b57cc9fdb5feeef3ec2406853d50c3dc2
-
SSDEEP
3072:HpP32szA0N/Gd7ZXtjgrJBdYPVeef0xOMQfw/M32szA0N/Gd7ZXtjgrJBdYPVeeO:8sM2BdYPYQMLsM2BdYPYQMpb
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 2304 msedge.exe 2304 msedge.exe 4628 msedge.exe 4628 msedge.exe 2624 identity_helper.exe 2624 identity_helper.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4628 wrote to memory of 4944 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4944 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4240 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4240 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4240 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4240 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4240 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4240 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4240 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4240 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4240 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4240 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4240 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4240 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4240 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4240 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4240 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4240 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4240 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4240 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4240 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4240 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4240 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4240 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4240 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4240 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4240 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4240 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4240 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4240 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4240 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4240 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4240 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4240 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4240 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4240 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4240 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4240 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4240 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4240 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4240 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4240 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 2304 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 2304 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4020 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4020 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4020 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4020 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4020 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4020 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4020 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4020 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4020 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4020 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4020 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4020 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4020 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4020 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4020 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4020 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4020 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4020 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4020 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 4020 4628 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\691f825eec0a5bf1f8ca341fd894ee70_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbe6c446f8,0x7ffbe6c44708,0x7ffbe6c447182⤵PID:4944
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,1936007451299549677,2677009566573057448,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:4240
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,1936007451299549677,2677009566573057448,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2304 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,1936007451299549677,2677009566573057448,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:4020
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,1936007451299549677,2677009566573057448,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4792
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,1936007451299549677,2677009566573057448,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2220
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,1936007451299549677,2677009566573057448,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5836 /prefetch:82⤵PID:228
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,1936007451299549677,2677009566573057448,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5836 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2624 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,1936007451299549677,2677009566573057448,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:12⤵PID:4116
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,1936007451299549677,2677009566573057448,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:5024
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,1936007451299549677,2677009566573057448,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3488 /prefetch:12⤵PID:4592
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,1936007451299549677,2677009566573057448,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:3872
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,1936007451299549677,2677009566573057448,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3068 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3736
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1408
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
512B
MD5b2403d2e66086ab784cba7579ff2a22a
SHA1f69699db4232c1da573a7fb98593c4cfc2ae5a2b
SHA2568a7f42a7e0e90e75dd06538c1a0317f211b8b476860f6c18fec4c08f453b64b7
SHA51209b45d00997ad9862d51c95e6ee0c7dc343dc3ce3f52799c86e8dd4597c2ec16a81c8d4447b0b452196de83abda1b0a808174a39aa9fa51c3bf0c0b8d38361e4
-
Filesize
6KB
MD5960ac059735a0fad7094c50d5d62ca16
SHA1dcee3fd4dd1356e850a5d00375b54a46fa7aa463
SHA256824ed610c253b663119d9298ab292715b4163b6c56b2d88c4668e74ae39f82de
SHA51215aaf9125df240ea2e90833fe259d40941ad954c6f923388c971313bf0f936410d531c81977add1f1c8c577c32bdee5c43eda3424df4f1c4a138316677cf7e55
-
Filesize
6KB
MD5b6a1a90c1b6af9dd6783c08969463232
SHA176d730cb69ef56cf10fa8bb8792f021a6fba6eb1
SHA25635fd3ee2fa8f0d4b75f9b87a939b26666d1bd0527aca945b39cb6bd77bd16f72
SHA512cc4c9a6fc8b3481ea4579c965134efb4d65e3da1c3b51deb38ec8bf089baa0ea42cb6758696cf72b7ddb4ddb70ebdb53093063cd8339ba65f4739ccfc82c9ee4
-
Filesize
6KB
MD5ec6fd2ca77ea739948a3891e7ffa60a6
SHA1d3a9e924b10000632db3b5f49080a02aa1a51117
SHA2566021366e77fa8bbbbbab6b9c1342931d06b1d06885b513a9d58849feb1c67891
SHA5126a07300206bcf2174f6d7ab27152ea88cfccd6d7b574d3f6c4930e78d165ddf3defacab18c6e494b4ce84f4a5386517caa726fa6cef058f8f333db9a3ad93df6
-
Filesize
371B
MD564fd79e59812c6796fb43a6e6fe2e993
SHA1f92a64f1f662ac6731f5d88bed3b5b4332a5e74c
SHA256c7edf7c6832d419f5064d056082345a2ffc0a5ec4f471c874540b83d3ffa2ead
SHA512eb4731dd8e4712824266cdfeb0b0f5bb49ec0f9e52f0b3aa69af663c22c085ab637b58f71bf507973dbe0ffea1ee8ca85fd853287b4ba795279a25d05b610404
-
Filesize
204B
MD5ebafcacb306cb0851d2573fb4e827b07
SHA1fde196e6fc757218316157881611defbe4497890
SHA2560902ad092cc9767939155fbc88c76b1e5f84287a21fe334a6e8b7b925bafea5b
SHA512bbb2740f76b9c5290a91cbf91fa66be8c2b32f94874b0920229b6dce17d1d5f5b0a82dd494bf561336fb47680e79ed4a9d54fc915a534bcabff2e1e17b92a4c0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a0d3f1a5e19f77b6a131df67c43010af
SHA108e92c1d0cdd905ff3c40163bc801f0ea26b1b41
SHA2566112f6d8c3c7603695e70fd2ed1dbdd986f992235594cf498b40f2acd13882cb
SHA512622f3292349c86d8faf5f1dcf8b84b50e901d3523622698a87a59e9c324431c1e42c686c7e90fc1e629512c9365faa6e116c8e00968fd1b8e9562e1914ae7cc2
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e