Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 01:55
Static task
static1
Behavioral task
behavioral1
Sample
695cb4f0358f49775afc1c34f94d2a95_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
695cb4f0358f49775afc1c34f94d2a95_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
695cb4f0358f49775afc1c34f94d2a95_JaffaCakes118.html
-
Size
23KB
-
MD5
695cb4f0358f49775afc1c34f94d2a95
-
SHA1
9f3ec0a717dc0757e39c137ba8652587e488964d
-
SHA256
e805c194f8eb92dafec9fe2b123499f815867a0227b306b0a7d0fa2a29124834
-
SHA512
7403dc2fb93c81251277ddc07c091407497be030edddd7acb804100d3b4a29f6fe66912ae7de5f4174dbb56adc51e36143a7e4d9be5f3791de31fb4845fddf54
-
SSDEEP
192:N+6oG1zb5nwnQjLntQ/rnQie7nPnQOkrntpqnQTbnanQ0anQtQMBnFnQ7XndnQTg:06oIhQ/V1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 3092 msedge.exe 3092 msedge.exe 212 msedge.exe 212 msedge.exe 576 identity_helper.exe 576 identity_helper.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 212 wrote to memory of 224 212 msedge.exe msedge.exe PID 212 wrote to memory of 224 212 msedge.exe msedge.exe PID 212 wrote to memory of 560 212 msedge.exe msedge.exe PID 212 wrote to memory of 560 212 msedge.exe msedge.exe PID 212 wrote to memory of 560 212 msedge.exe msedge.exe PID 212 wrote to memory of 560 212 msedge.exe msedge.exe PID 212 wrote to memory of 560 212 msedge.exe msedge.exe PID 212 wrote to memory of 560 212 msedge.exe msedge.exe PID 212 wrote to memory of 560 212 msedge.exe msedge.exe PID 212 wrote to memory of 560 212 msedge.exe msedge.exe PID 212 wrote to memory of 560 212 msedge.exe msedge.exe PID 212 wrote to memory of 560 212 msedge.exe msedge.exe PID 212 wrote to memory of 560 212 msedge.exe msedge.exe PID 212 wrote to memory of 560 212 msedge.exe msedge.exe PID 212 wrote to memory of 560 212 msedge.exe msedge.exe PID 212 wrote to memory of 560 212 msedge.exe msedge.exe PID 212 wrote to memory of 560 212 msedge.exe msedge.exe PID 212 wrote to memory of 560 212 msedge.exe msedge.exe PID 212 wrote to memory of 560 212 msedge.exe msedge.exe PID 212 wrote to memory of 560 212 msedge.exe msedge.exe PID 212 wrote to memory of 560 212 msedge.exe msedge.exe PID 212 wrote to memory of 560 212 msedge.exe msedge.exe PID 212 wrote to memory of 560 212 msedge.exe msedge.exe PID 212 wrote to memory of 560 212 msedge.exe msedge.exe PID 212 wrote to memory of 560 212 msedge.exe msedge.exe PID 212 wrote to memory of 560 212 msedge.exe msedge.exe PID 212 wrote to memory of 560 212 msedge.exe msedge.exe PID 212 wrote to memory of 560 212 msedge.exe msedge.exe PID 212 wrote to memory of 560 212 msedge.exe msedge.exe PID 212 wrote to memory of 560 212 msedge.exe msedge.exe PID 212 wrote to memory of 560 212 msedge.exe msedge.exe PID 212 wrote to memory of 560 212 msedge.exe msedge.exe PID 212 wrote to memory of 560 212 msedge.exe msedge.exe PID 212 wrote to memory of 560 212 msedge.exe msedge.exe PID 212 wrote to memory of 560 212 msedge.exe msedge.exe PID 212 wrote to memory of 560 212 msedge.exe msedge.exe PID 212 wrote to memory of 560 212 msedge.exe msedge.exe PID 212 wrote to memory of 560 212 msedge.exe msedge.exe PID 212 wrote to memory of 560 212 msedge.exe msedge.exe PID 212 wrote to memory of 560 212 msedge.exe msedge.exe PID 212 wrote to memory of 560 212 msedge.exe msedge.exe PID 212 wrote to memory of 560 212 msedge.exe msedge.exe PID 212 wrote to memory of 3092 212 msedge.exe msedge.exe PID 212 wrote to memory of 3092 212 msedge.exe msedge.exe PID 212 wrote to memory of 1720 212 msedge.exe msedge.exe PID 212 wrote to memory of 1720 212 msedge.exe msedge.exe PID 212 wrote to memory of 1720 212 msedge.exe msedge.exe PID 212 wrote to memory of 1720 212 msedge.exe msedge.exe PID 212 wrote to memory of 1720 212 msedge.exe msedge.exe PID 212 wrote to memory of 1720 212 msedge.exe msedge.exe PID 212 wrote to memory of 1720 212 msedge.exe msedge.exe PID 212 wrote to memory of 1720 212 msedge.exe msedge.exe PID 212 wrote to memory of 1720 212 msedge.exe msedge.exe PID 212 wrote to memory of 1720 212 msedge.exe msedge.exe PID 212 wrote to memory of 1720 212 msedge.exe msedge.exe PID 212 wrote to memory of 1720 212 msedge.exe msedge.exe PID 212 wrote to memory of 1720 212 msedge.exe msedge.exe PID 212 wrote to memory of 1720 212 msedge.exe msedge.exe PID 212 wrote to memory of 1720 212 msedge.exe msedge.exe PID 212 wrote to memory of 1720 212 msedge.exe msedge.exe PID 212 wrote to memory of 1720 212 msedge.exe msedge.exe PID 212 wrote to memory of 1720 212 msedge.exe msedge.exe PID 212 wrote to memory of 1720 212 msedge.exe msedge.exe PID 212 wrote to memory of 1720 212 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\695cb4f0358f49775afc1c34f94d2a95_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed41746f8,0x7ffed4174708,0x7ffed41747182⤵PID:224
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,4357767370633219657,11458536359214891073,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:560
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1980,4357767370633219657,11458536359214891073,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3092 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1980,4357767370633219657,11458536359214891073,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2720 /prefetch:82⤵PID:1720
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,4357767370633219657,11458536359214891073,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:4968
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,4357767370633219657,11458536359214891073,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:1076
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1980,4357767370633219657,11458536359214891073,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5068 /prefetch:82⤵PID:2884
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1980,4357767370633219657,11458536359214891073,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5068 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:576 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,4357767370633219657,11458536359214891073,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4076 /prefetch:12⤵PID:736
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,4357767370633219657,11458536359214891073,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:3760
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,4357767370633219657,11458536359214891073,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:12⤵PID:2328
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,4357767370633219657,11458536359214891073,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:744
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,4357767370633219657,11458536359214891073,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2516 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3156
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4536
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD583540e993a27e851f3267a422a2242d3
SHA1a74956f7e3cd9677f6f7f3f85e1da8ada19d4ff5
SHA256a80fd112217300837de8092f9191254c3a8393abb74ae9687c50d79b86021202
SHA5120168ffeef74e9c13570bd05c23153d4c0f7c1ce0c169e03be947f77126cb44cf82d467ba7e04b34dec616c72b51b72058e4857ed6749c3443cd25363c50eaa0b
-
Filesize
6KB
MD581b336146773ec576ec34a35c29d0cae
SHA189d161404de5ebd0088271fb6dc575a641ce76f0
SHA25630ba61f936a0694cde5cfd9e698b67f2a295f9c665e5bb4662813a5cdc5353eb
SHA5129c68c65d451f7ec8c4328b435e945071cf71415843e80cd530cc1ebe3795742235ac70839b67a8651ad64a7698232f822a81d85cf6ff30e6a4d3d9eb25dee314
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5db7f684bb97603fd1543c363171ced3f
SHA1f68862cacd717487111569116d2aba3bf6b3c350
SHA256a890c8fab1d58a99fd701843808d818842b031734eb5bf43cf222b27cda76394
SHA512d2719578b785119ac00f8fabe74633b21feb122ec6be071dbcf0394aa4731e4e7e1d9507359f3b8f353bccec3edfd6a0ca2072489aaa322ecde2ea2632c3f14b
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e