Analysis
-
max time kernel
148s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 04:44
Static task
static1
Behavioral task
behavioral1
Sample
69c248a01899efeaa4248b20e9c90040_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
69c248a01899efeaa4248b20e9c90040_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
69c248a01899efeaa4248b20e9c90040_JaffaCakes118.html
-
Size
35KB
-
MD5
69c248a01899efeaa4248b20e9c90040
-
SHA1
c2938a31abe0be498f5a9189caeebd57baf2dd3b
-
SHA256
779e19ba2a91a072bfb629bd0d27f831358ffab26d2167737c1ed35d4e7f9db2
-
SHA512
bf060c4584985a7cf412811f9d3844f916ca077fb9a4d8b7270b6df654906af527b595dd8f1846162c8780b8780c33b83eaa32cbcce3cb5d8278ad4b86855734
-
SSDEEP
192:uWHEjb5nZuX3nQjxn5Q/tnQieoNnyznQOkEnt3PnQTbn5nQUXCBABskY3xP9YIDT:qQ/w6chr7CzRtiB9sxgJ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3024 msedge.exe 3024 msedge.exe 4420 msedge.exe 4420 msedge.exe 4276 identity_helper.exe 4276 identity_helper.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4420 wrote to memory of 5064 4420 msedge.exe 82 PID 4420 wrote to memory of 5064 4420 msedge.exe 82 PID 4420 wrote to memory of 3956 4420 msedge.exe 83 PID 4420 wrote to memory of 3956 4420 msedge.exe 83 PID 4420 wrote to memory of 3956 4420 msedge.exe 83 PID 4420 wrote to memory of 3956 4420 msedge.exe 83 PID 4420 wrote to memory of 3956 4420 msedge.exe 83 PID 4420 wrote to memory of 3956 4420 msedge.exe 83 PID 4420 wrote to memory of 3956 4420 msedge.exe 83 PID 4420 wrote to memory of 3956 4420 msedge.exe 83 PID 4420 wrote to memory of 3956 4420 msedge.exe 83 PID 4420 wrote to memory of 3956 4420 msedge.exe 83 PID 4420 wrote to memory of 3956 4420 msedge.exe 83 PID 4420 wrote to memory of 3956 4420 msedge.exe 83 PID 4420 wrote to memory of 3956 4420 msedge.exe 83 PID 4420 wrote to memory of 3956 4420 msedge.exe 83 PID 4420 wrote to memory of 3956 4420 msedge.exe 83 PID 4420 wrote to memory of 3956 4420 msedge.exe 83 PID 4420 wrote to memory of 3956 4420 msedge.exe 83 PID 4420 wrote to memory of 3956 4420 msedge.exe 83 PID 4420 wrote to memory of 3956 4420 msedge.exe 83 PID 4420 wrote to memory of 3956 4420 msedge.exe 83 PID 4420 wrote to memory of 3956 4420 msedge.exe 83 PID 4420 wrote to memory of 3956 4420 msedge.exe 83 PID 4420 wrote to memory of 3956 4420 msedge.exe 83 PID 4420 wrote to memory of 3956 4420 msedge.exe 83 PID 4420 wrote to memory of 3956 4420 msedge.exe 83 PID 4420 wrote to memory of 3956 4420 msedge.exe 83 PID 4420 wrote to memory of 3956 4420 msedge.exe 83 PID 4420 wrote to memory of 3956 4420 msedge.exe 83 PID 4420 wrote to memory of 3956 4420 msedge.exe 83 PID 4420 wrote to memory of 3956 4420 msedge.exe 83 PID 4420 wrote to memory of 3956 4420 msedge.exe 83 PID 4420 wrote to memory of 3956 4420 msedge.exe 83 PID 4420 wrote to memory of 3956 4420 msedge.exe 83 PID 4420 wrote to memory of 3956 4420 msedge.exe 83 PID 4420 wrote to memory of 3956 4420 msedge.exe 83 PID 4420 wrote to memory of 3956 4420 msedge.exe 83 PID 4420 wrote to memory of 3956 4420 msedge.exe 83 PID 4420 wrote to memory of 3956 4420 msedge.exe 83 PID 4420 wrote to memory of 3956 4420 msedge.exe 83 PID 4420 wrote to memory of 3956 4420 msedge.exe 83 PID 4420 wrote to memory of 3024 4420 msedge.exe 84 PID 4420 wrote to memory of 3024 4420 msedge.exe 84 PID 4420 wrote to memory of 2452 4420 msedge.exe 85 PID 4420 wrote to memory of 2452 4420 msedge.exe 85 PID 4420 wrote to memory of 2452 4420 msedge.exe 85 PID 4420 wrote to memory of 2452 4420 msedge.exe 85 PID 4420 wrote to memory of 2452 4420 msedge.exe 85 PID 4420 wrote to memory of 2452 4420 msedge.exe 85 PID 4420 wrote to memory of 2452 4420 msedge.exe 85 PID 4420 wrote to memory of 2452 4420 msedge.exe 85 PID 4420 wrote to memory of 2452 4420 msedge.exe 85 PID 4420 wrote to memory of 2452 4420 msedge.exe 85 PID 4420 wrote to memory of 2452 4420 msedge.exe 85 PID 4420 wrote to memory of 2452 4420 msedge.exe 85 PID 4420 wrote to memory of 2452 4420 msedge.exe 85 PID 4420 wrote to memory of 2452 4420 msedge.exe 85 PID 4420 wrote to memory of 2452 4420 msedge.exe 85 PID 4420 wrote to memory of 2452 4420 msedge.exe 85 PID 4420 wrote to memory of 2452 4420 msedge.exe 85 PID 4420 wrote to memory of 2452 4420 msedge.exe 85 PID 4420 wrote to memory of 2452 4420 msedge.exe 85 PID 4420 wrote to memory of 2452 4420 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\69c248a01899efeaa4248b20e9c90040_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffea93746f8,0x7ffea9374708,0x7ffea93747182⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,11131219077351775777,9604188106943964021,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,11131219077351775777,9604188106943964021,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2448 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,11131219077351775777,9604188106943964021,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11131219077351775777,9604188106943964021,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11131219077351775777,9604188106943964021,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,11131219077351775777,9604188106943964021,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4960 /prefetch:82⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,11131219077351775777,9604188106943964021,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4960 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11131219077351775777,9604188106943964021,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4964 /prefetch:12⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11131219077351775777,9604188106943964021,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11131219077351775777,9604188106943964021,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11131219077351775777,9604188106943964021,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:3328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,11131219077351775777,9604188106943964021,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2248 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4856
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4852
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:940
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
5KB
MD55ee99d24878b3c93cb203f11db66ffaf
SHA1dae4f63a557bf9d2b5b257b0a9b7335535ba6d0c
SHA2565cef18eee216ea55d5552ba8c6f4cf6aea9b378d15256c2300e2d9467575157a
SHA5126453343d7fbb3b2cfa5fafc406f1a0498e27dc3f3d78b4bee946d1f35d3d03692a8e9bd46581a84e0fefb9ee3b928028c0561645d269ebf6d43774650866e251
-
Filesize
6KB
MD5ec42043e2f88f9d4f25633b5bafa737b
SHA1315339b21e1e316fd9a07ae872b3db9e8bff8f42
SHA25675cbe2ffbb7ebc313bdfb7f785d9172f8213b9d257165483f9d7ae22727d6a6a
SHA512131aaefaec6879808fd3ef49cd1f717518af1e1b4eafc79a69237c3bbc2d2f08082c3ac786cb9b974ee9d71f21d0131acab6665d9e09383946395f0f93c33dce
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5dc35b7040b734653fe264768be0a0cc7
SHA1cbbfdf0c27df8e181d48e866dd04a28c7b27f8ec
SHA2566bcd6448f6f13142172d9aadc6e2051b99e0959693727471818f6dec7f2c83cd
SHA512b15212d1926f15552bc5f03b3278227cc5b22e755db9cf0e134396306ec6580bf6f2dbde1a25bb32593a62355321d1b177af1cef7dd8a05bd0b1a7e76a0f7c3f