Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 02:12
Static task
static1
Behavioral task
behavioral1
Sample
69685826b7c2bea4e485e18ea962bd04_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
69685826b7c2bea4e485e18ea962bd04_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
69685826b7c2bea4e485e18ea962bd04_JaffaCakes118.html
-
Size
46KB
-
MD5
69685826b7c2bea4e485e18ea962bd04
-
SHA1
d0741b8ceda45a2772150ca207e4500b245f9314
-
SHA256
7c1214e51fc965376f072035e8a58843b56877312b6ac9b3c5f4132e4e5fc535
-
SHA512
0d23f38254f758b6c6e5f79fe61f9c2b0fe8e1a903be6f9c1723078960b3ef45e476dbb1365957429771da43c310970b65bfdf2e5bca8c683186ac50410b7c42
-
SSDEEP
768:clJywbudfuoyZuctwvfOfTlu8QGjSrTwE9X7kDJywqu+9n0J1SrTwE9X7kkv2t6z:DrG07vXOh0h4Fzq
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 3360 msedge.exe 3360 msedge.exe 5080 msedge.exe 5080 msedge.exe 4680 identity_helper.exe 4680 identity_helper.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 5080 wrote to memory of 4516 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 4516 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 3944 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 3944 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 3944 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 3944 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 3944 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 3944 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 3944 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 3944 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 3944 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 3944 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 3944 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 3944 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 3944 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 3944 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 3944 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 3944 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 3944 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 3944 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 3944 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 3944 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 3944 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 3944 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 3944 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 3944 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 3944 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 3944 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 3944 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 3944 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 3944 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 3944 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 3944 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 3944 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 3944 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 3944 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 3944 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 3944 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 3944 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 3944 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 3944 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 3944 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 3360 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 3360 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 1040 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 1040 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 1040 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 1040 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 1040 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 1040 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 1040 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 1040 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 1040 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 1040 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 1040 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 1040 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 1040 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 1040 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 1040 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 1040 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 1040 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 1040 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 1040 5080 msedge.exe msedge.exe PID 5080 wrote to memory of 1040 5080 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\69685826b7c2bea4e485e18ea962bd04_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff936df46f8,0x7ff936df4708,0x7ff936df47182⤵PID:4516
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,13764543533878299614,15072019510837966607,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:3944
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,13764543533878299614,15072019510837966607,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3360 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,13764543533878299614,15072019510837966607,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2540 /prefetch:82⤵PID:1040
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13764543533878299614,15072019510837966607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:1840
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13764543533878299614,15072019510837966607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4564
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13764543533878299614,15072019510837966607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4896 /prefetch:12⤵PID:1596
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,13764543533878299614,15072019510837966607,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5916 /prefetch:82⤵PID:2100
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,13764543533878299614,15072019510837966607,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5916 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4680 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13764543533878299614,15072019510837966607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:2688
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13764543533878299614,15072019510837966607,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:4264
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13764543533878299614,15072019510837966607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:2080
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13764543533878299614,15072019510837966607,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:3068
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,13764543533878299614,15072019510837966607,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5884 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4788
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3064
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
701B
MD526a09a55bf3984e343dc9401f87850ad
SHA132f1cc184f8aa78edb818b6e125dffeb333cf197
SHA256821ccab86d25fcb6a2e34fa3e04a0b6f8106ab66c423ee92ed4ff42b027f3564
SHA51256171ba1cae16381f313f015fb92a9d098455bce318a2096061c4a351fbe382e89e6aa3f0c6a3cca3f8046faf933ab79389e748cecdd2709e81b3a649626a635
-
Filesize
5KB
MD5a640c2037349c960fcebb7f007e00233
SHA196b37bc680f2f547d437cad9a77c4c385a5ae801
SHA256b1b96649f000e6989093f3e10e7355b3e3c7d81ececca986e2fd4c73fb2e79d6
SHA51268d726e8c100107835b9d43f0fcd495a16d6a8c3587ad87914d5c2a1f62b7868c1aa5f64949b6a7bc60ef2fef2977b34c12038f69af373e4aa0395d94ff3d8b5
-
Filesize
6KB
MD57df8f7561b8160aa7e7685891e5f3127
SHA1f9ff44bfe632833750a4ed058f427a4c83880402
SHA256bba727a50cf26d677b55975c9de2b7a9d1b401000f7f77f5356b9b7963743695
SHA512340a6f1ba5c60f1d3bafdacb3da36c76498b93584db66d0ce74e1701d647b83047bb8719ead9a8938a14149dd5edb2a40dac0f08e837950bca91e95a835a85f3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ea536913ef0f51111bb106fc63fa9dcf
SHA1b97f643b735c8edf5c3aaed4d20377c7128be4c3
SHA2561822dd96a036f98d1d678f0ea5907f8e18ea4854f0807cd1d4ab27c4ee61a180
SHA5122e89baf47e64d8da9495937606cd1c8142bf0d0dbe0a750e957576c6767de0922cac314749fec8c72effb96e25fdbd991bfa9e2b4cce2dd5740e86a236e026f1
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e