Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 00:32
Static task
static1
Behavioral task
behavioral1
Sample
69273eab5a93b9dfed6963c1fa8cc39b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
69273eab5a93b9dfed6963c1fa8cc39b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
69273eab5a93b9dfed6963c1fa8cc39b_JaffaCakes118.html
-
Size
27KB
-
MD5
69273eab5a93b9dfed6963c1fa8cc39b
-
SHA1
e7c889680ade009174ff11d2ecea3b53cf038477
-
SHA256
1e443cd139ebe220d5a8fa78d78d84febd7d4138622d6cba100ea9f7acc88f73
-
SHA512
3fbe9e0d557d9c3b863a8aa344ce6030afb13fe3c2195656a39c87c41fd4d1e3f21f5c4f448a72c8e684d76908ed58adc7e7a832e45f650a3162df5e6a24fc47
-
SSDEEP
192:uwDkb5na+nQjxn5Q/dnQieoNnunQOkEntLPXnQTbnpnQ9eu8m6uFkmQl7MBIqnYx:HQ/yDkUkxSyzz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 2848 msedge.exe 2848 msedge.exe 2188 msedge.exe 2188 msedge.exe 1032 identity_helper.exe 1032 identity_helper.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 2188 wrote to memory of 3444 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 3444 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 3032 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 3032 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 3032 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 3032 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 3032 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 3032 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 3032 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 3032 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 3032 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 3032 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 3032 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 3032 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 3032 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 3032 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 3032 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 3032 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 3032 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 3032 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 3032 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 3032 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 3032 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 3032 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 3032 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 3032 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 3032 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 3032 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 3032 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 3032 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 3032 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 3032 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 3032 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 3032 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 3032 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 3032 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 3032 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 3032 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 3032 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 3032 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 3032 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 3032 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 2848 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 2848 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 1368 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 1368 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 1368 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 1368 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 1368 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 1368 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 1368 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 1368 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 1368 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 1368 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 1368 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 1368 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 1368 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 1368 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 1368 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 1368 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 1368 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 1368 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 1368 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 1368 2188 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\69273eab5a93b9dfed6963c1fa8cc39b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaef7f46f8,0x7ffaef7f4708,0x7ffaef7f47182⤵PID:3444
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,5160613635600932147,11215082952544924160,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:22⤵PID:3032
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2220,5160613635600932147,11215082952544924160,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2848 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2220,5160613635600932147,11215082952544924160,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:1368
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,5160613635600932147,11215082952544924160,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3052
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,5160613635600932147,11215082952544924160,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3516
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,5160613635600932147,11215082952544924160,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5240 /prefetch:82⤵PID:3556
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,5160613635600932147,11215082952544924160,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5240 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1032 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,5160613635600932147,11215082952544924160,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2292 /prefetch:12⤵PID:2664
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,5160613635600932147,11215082952544924160,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:12⤵PID:3736
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,5160613635600932147,11215082952544924160,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3916 /prefetch:12⤵PID:2928
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,5160613635600932147,11215082952544924160,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:3676
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,5160613635600932147,11215082952544924160,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1988 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:744
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4328
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
6KB
MD5a61b95efbe8aaf0b9ae0a1e0a29699f1
SHA1f8864a95badfd2a39d172ffcf6da121b9182c791
SHA2566b8c504fe8cab2fefa4f96e7e1809a8efc3b552918f72ca64bef60b936007acf
SHA51230dac52a909e450a1f582ef5ecf5ee8201cc85d7d57a212e6b0e4263cc92ba3991c7f02b6b39ba576571ec0bef8104601c8505e9b0d688a55a55baa78c328d8a
-
Filesize
6KB
MD55bfbd81ea56d00ca6ae21d8c771ea09a
SHA1cb9df4c530d798ac82056967cf8ecb056f248af0
SHA256e019bd0be7d1174dfda7bdb11107a92e9fd55cdccb77b12c9bf62ba8856189de
SHA51292549b9d7125d99d228cefb3a48529e7ddb9a21d336bd27652a07e82165c9d00c3bb9013f57f0ad8ee071acbee33b01ab943234ef554c3e8956b838a21bdc196
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f163df57ec23b76e8c515634de57a4d3
SHA1bb5e26f3cc689dc3975500903b2497d71fef822a
SHA256822c6e67c8bdb02fda82aab1c3ae58149af003472a09e4f8450095a232b4459d
SHA5121384525f07b975e31537ce47e6ceb380fd7f8cbc8ba3e5a9bfe336526de16793d3c0fb7104b689fb11a76edcfdf7c3ca886ca4667302332afcbe495a0ec3b4db
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e