Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 02:16
Static task
static1
Behavioral task
behavioral1
Sample
696ad9bed37efb136220292bf617e519_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
696ad9bed37efb136220292bf617e519_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
696ad9bed37efb136220292bf617e519_JaffaCakes118.html
-
Size
4KB
-
MD5
696ad9bed37efb136220292bf617e519
-
SHA1
fefa31dd59a2b6e7b34618c9a46215836096c3a9
-
SHA256
112b2c8c2a018230d01d052384604541abad89aa9f327e8fc27cd7613376024e
-
SHA512
05f0683ca548d1c6585424f9c5d38cc0d1dcaf013fe6a239e9bbe8515f8c8d5e7f0706c281fac35704821b14a62f49af155f49578e4863ce74f359d2e10be38a
-
SSDEEP
96:ziEccZmV4MSEPBDvV0n47ej/hgOKiljSR1QnyneqhQvmRy/qi:zigwV4GD8/h/KiZwQn/qCuRri
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 1376 msedge.exe 1376 msedge.exe 2124 msedge.exe 2124 msedge.exe 2384 identity_helper.exe 2384 identity_helper.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
Processes:
msedge.exepid process 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 2124 wrote to memory of 2596 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 2596 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4060 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4060 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4060 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4060 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4060 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4060 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4060 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4060 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4060 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4060 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4060 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4060 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4060 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4060 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4060 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4060 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4060 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4060 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4060 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4060 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4060 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4060 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4060 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4060 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4060 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4060 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4060 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4060 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4060 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4060 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4060 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4060 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4060 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4060 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4060 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4060 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4060 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4060 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4060 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4060 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 1376 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 1376 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 228 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 228 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 228 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 228 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 228 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 228 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 228 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 228 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 228 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 228 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 228 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 228 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 228 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 228 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 228 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 228 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 228 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 228 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 228 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 228 2124 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\696ad9bed37efb136220292bf617e519_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd6b7d46f8,0x7ffd6b7d4708,0x7ffd6b7d47182⤵PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,1244054560060679821,317838194412493826,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,1244054560060679821,317838194412493826,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,1244054560060679821,317838194412493826,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1244054560060679821,317838194412493826,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1244054560060679821,317838194412493826,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1244054560060679821,317838194412493826,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:12⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1244054560060679821,317838194412493826,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:12⤵PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1244054560060679821,317838194412493826,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,1244054560060679821,317838194412493826,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5488 /prefetch:82⤵PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,1244054560060679821,317838194412493826,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5488 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1244054560060679821,317838194412493826,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1244054560060679821,317838194412493826,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:2740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1244054560060679821,317838194412493826,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:12⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1244054560060679821,317838194412493826,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5724 /prefetch:12⤵PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1244054560060679821,317838194412493826,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2060 /prefetch:12⤵PID:2116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1244054560060679821,317838194412493826,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:12⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,1244054560060679821,317838194412493826,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5612 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2296
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:116
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
5KB
MD5385c8927e6a7ff833f5b71cd94eeda91
SHA165ced477a9405538b795288d2d7ef2aed8c8b9d5
SHA2569527265b34486b9125aa772ab4f5c3bf39a0cb9bd0bc72193ab1e31fc46070e3
SHA51261785ca0cf0a2523fe98fb51dab92e6ea2dfe22a4d7efb07e20f9bb6b4b89130835591204bad94bd8a234630d724e074dd1096749cc34b9604135a83a6c32010
-
Filesize
6KB
MD51a6380fa08c986ddf7915e8c0488bb74
SHA183f5637035e82e5c3a1ce32e6eda86f826bab9d2
SHA25640277f352834c744ee51850da204c7cf3430db5ab79ab88e8481f3eabe806812
SHA512273f2d62b7bce49a48a7704e4f2f5e20171f0f6d18e07c9824d64011b1c0706ab80ce726a4f497982f8f6f546c6697af82c0bba1d7f572dfc7523174d363b2ab
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57be8aab3a660cab1997e26a859618a76
SHA1f42f62e3950747b7aea392f8c3cf7e5b39206e4c
SHA256fb9fc6d28ba5dcce06bb340ed16d06b7b184d9f2fba200b66e2e2f08bf258095
SHA51255b6ad42e71df06ae4c4142474704cdecb483dd2692b559cf4e3687afa42bc49f12b1aa07ea1f6ae6bd8500bf8eb01e7057e08e0cc96354206541e09f0c636e7
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e