Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 01:29
Static task
static1
Behavioral task
behavioral1
Sample
694a49b663e28a73f09c1d1ea6603391_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
694a49b663e28a73f09c1d1ea6603391_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
694a49b663e28a73f09c1d1ea6603391_JaffaCakes118.html
-
Size
978KB
-
MD5
694a49b663e28a73f09c1d1ea6603391
-
SHA1
be2701d3014ea40517c97f9fff5817207e68ab49
-
SHA256
e80996b7c5cbba15df79c98204ac31d8a2599ec588e588c7b2060645c124a428
-
SHA512
cefd888403caaa0181faa1ecce7d8aa963f5040cbbf7491a70a21ee1b55219fdf30f4d5f37359772bb7f1aef4f7557ab0cdc67869726eb50e5681d79f032893a
-
SSDEEP
6144:6w4O9jVsi+aSGklfS4y1IFOKgmbonJn/ZyEvfpLfxgZHZ51g8R:34WklfS4QatBbSd+1g8R
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 3692 msedge.exe 3692 msedge.exe 3216 msedge.exe 3216 msedge.exe 528 identity_helper.exe 528 identity_helper.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3216 wrote to memory of 552 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 552 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4540 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4540 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4540 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4540 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4540 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4540 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4540 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4540 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4540 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4540 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4540 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4540 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4540 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4540 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4540 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4540 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4540 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4540 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4540 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4540 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4540 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4540 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4540 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4540 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4540 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4540 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4540 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4540 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4540 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4540 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4540 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4540 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4540 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4540 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4540 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4540 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4540 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4540 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4540 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 4540 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 3692 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 3692 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 2992 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 2992 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 2992 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 2992 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 2992 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 2992 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 2992 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 2992 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 2992 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 2992 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 2992 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 2992 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 2992 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 2992 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 2992 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 2992 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 2992 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 2992 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 2992 3216 msedge.exe msedge.exe PID 3216 wrote to memory of 2992 3216 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\694a49b663e28a73f09c1d1ea6603391_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff467446f8,0x7fff46744708,0x7fff467447182⤵PID:552
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,16324467235223405282,12879508828470883371,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:4540
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,16324467235223405282,12879508828470883371,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3692 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,16324467235223405282,12879508828470883371,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:2992
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16324467235223405282,12879508828470883371,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:1676
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16324467235223405282,12879508828470883371,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:1332
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,16324467235223405282,12879508828470883371,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵PID:2900
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,16324467235223405282,12879508828470883371,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:528 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16324467235223405282,12879508828470883371,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:4452
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16324467235223405282,12879508828470883371,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:3392
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16324467235223405282,12879508828470883371,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:1820
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16324467235223405282,12879508828470883371,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:12⤵PID:2696
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,16324467235223405282,12879508828470883371,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2536 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1656
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3316
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2664
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
330B
MD51fc289bba8b836d02b500a661f759d11
SHA1f583621ef0fc51e6f146586d8ea04f988c286715
SHA25671dc7ffd08bcb29d8fb8427b059dc39f4b3271368f0541f13a5cdaaedaf7c3fa
SHA512bb360bdb3c2a7bba725c01d62c4f94f1cefda7d66e13972b15f333300d676a5679856bf0882d5d12df3ab47a00ca8d1000555f2410d50598245674313e455409
-
Filesize
5KB
MD5892e5639996b91ec296b48f6cbc298cb
SHA14edc53f46cf626bb20cf05b0eeca7f068bc49df2
SHA2567375faba0761b9bf6985f8a661b1a642a273f0d5976a8242afa03ed5501a6886
SHA5123083938d40b003f494546894e743d9b61e8476584cd517b25a0bcce452fbb7753c92b35252aea43119a8bdde6f76c408e6084edcf709e2b15051e5f63f285e0b
-
Filesize
6KB
MD57d5f9b57bc9604723f376db1a70381ed
SHA162349665f0fbcf507be7c18b4243f5120cdde33c
SHA2568464e19693aaad48f94fa59b412459b2569cdab72bf825c68e7ca37097ea639d
SHA512db881489af811db2abd368e4c6b32237ff56e4459d9522c75d5b675f62c48f9ca4ff775c7b90140504db8553381080c430849b2c33954a97c9b6575174192a9f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ef1a8c3805c74d46984ee012ebd3d38c
SHA10aaff6605d84df7b9df89d571c83acfe714787f8
SHA256d042fbf9d587a20ad7fb99072d729dd77eedabf45f60263109060c496a37029e
SHA5127a189a4c1eeaf495ba2f3fcd76da7d43d743775fbe45107978995fd6465401eaa285b235e849e75f24d006fb90bc4f701b4f6af75429295e23c22d1197863749
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e