Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 01:24
Static task
static1
Behavioral task
behavioral1
Sample
69472b01b21219a639e9e41844642474_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
69472b01b21219a639e9e41844642474_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
69472b01b21219a639e9e41844642474_JaffaCakes118.html
-
Size
19KB
-
MD5
69472b01b21219a639e9e41844642474
-
SHA1
1a4ee360ae9d341e1a5d53a0f89a3a9d6c824a86
-
SHA256
dc60c2fd6ca69cfa1ba11d2ad7b4dbdf25fa86511d5d60d71fd26daa8d9184c2
-
SHA512
f6646f04ab7763be74e339059b8ec39f2ea5ca6c557c9a0865f8bbede91a5a9cb91d449c1cd21f2e1943ef54e7d4d86290fcbb7b8dbe4ce621d12e437dc54701
-
SSDEEP
192:9K/y7UhruiqEWSBLTgE9d3LtvMpbjQpCwhP3MlUx9V6cxjb79DXSwiFDiC:4/yWruilBLXf1MQpRvp55iwi1iC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exepid process 3132 msedge.exe 3132 msedge.exe 4388 msedge.exe 4388 msedge.exe 3616 identity_helper.exe 3616 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4388 wrote to memory of 3840 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3840 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3516 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3516 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3516 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3516 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3516 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3516 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3516 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3516 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3516 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3516 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3516 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3516 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3516 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3516 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3516 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3516 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3516 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3516 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3516 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3516 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3516 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3516 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3516 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3516 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3516 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3516 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3516 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3516 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3516 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3516 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3516 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3516 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3516 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3516 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3516 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3516 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3516 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3516 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3516 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3516 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3132 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 3132 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 1416 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 1416 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 1416 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 1416 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 1416 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 1416 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 1416 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 1416 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 1416 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 1416 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 1416 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 1416 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 1416 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 1416 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 1416 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 1416 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 1416 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 1416 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 1416 4388 msedge.exe msedge.exe PID 4388 wrote to memory of 1416 4388 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\69472b01b21219a639e9e41844642474_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8c0ef46f8,0x7ff8c0ef4708,0x7ff8c0ef47182⤵PID:3840
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,7715464764121775620,2683213160586727330,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:3516
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,7715464764121775620,2683213160586727330,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3132 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,7715464764121775620,2683213160586727330,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:1416
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,7715464764121775620,2683213160586727330,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:436
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,7715464764121775620,2683213160586727330,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:2204
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,7715464764121775620,2683213160586727330,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:4416
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,7715464764121775620,2683213160586727330,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5812 /prefetch:82⤵PID:4696
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,7715464764121775620,2683213160586727330,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5812 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3616 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,7715464764121775620,2683213160586727330,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:2112
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,7715464764121775620,2683213160586727330,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:3656
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,7715464764121775620,2683213160586727330,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:12⤵PID:2560
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,7715464764121775620,2683213160586727330,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:4984
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,7715464764121775620,2683213160586727330,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4844 /prefetch:22⤵PID:2792
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2824
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
1KB
MD58b461c221c0bd3c3db49845a95e715b5
SHA1d5a76466d9053185612d4b8d5bce9d78efff327a
SHA256837f9e50988bd6a37c7ae4b5610b7d092fd7fb92fbf6adbfe3d7dfa4970259f0
SHA512a9bb5ccee53dedca13ec49d59fb0e195445be6960d803507e0591bda1ae75f6f1975d98724fa57315e371c0cf2127fafa348b98c8b79f6d43e9568019a2db7b7
-
Filesize
5KB
MD56ff3ff151d4efb4ad3458cf7e9047522
SHA1a759f9a3624300d00a14c46e4e0be359af36eb22
SHA25600e70f7af25c4fc1c5100ae93af529be0ae053b3a59d5497eacb6557e5c76ce9
SHA5128aebccd64951886a8961f8c9e50e9a275715e759e0540a9af5a90c4e647b6c1e71660684a2d9f5109e9167b0bce672a32f853094fcf43e574937490c839e1ee6
-
Filesize
6KB
MD50004bfb8b461e6c586a5304aed4e799a
SHA17e9bd496504d570ab9d37146522e5a89a0ccd7b5
SHA256aad9c25ae390896d8e8751d2a06992c24210650b6fe881006aa59c5f62e936b7
SHA5121543036c98b7985f913cb219411562af2aefe776c7152a608901a8f008b6cf6385d7cdbbcf3fb53f7de7d3c49fe3e47f4419da3d207a416ee86c484cb254acae
-
Filesize
6KB
MD5f70e907f58c96ee20be500a255fc12e2
SHA1c6f8ad9befe2277e9af2dccd08550aff53d5caa4
SHA256f166922a0405734f6326050567f31fbfd19e168acc7a398e0f8a446abfa8b425
SHA512fae72286098d61ca47575c1c7c853dbeabe7fa673020882ddaec2f6af91add8899e50b2097df11143fbe309194d64102b6b91548653604b6b6c3305ef2ece4a2
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD575e12c80aab9af756a49556f62837586
SHA17599da8ac4836a2ebfda5361421dc74d5b12f960
SHA25642d1fda68f8356f47c993c2dda87b354fe6b456960617f45560f5e2f9900c084
SHA512545053d358c0692d78be6772646f6bbe986221fd00adda3cc76793fce52f311dbcdf840a1873dc7f5490e06a872b3a9acc1abef4de72f18cd73245111b144ee1
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e