Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 03:01
Static task
static1
Behavioral task
behavioral1
Sample
70a67f074193b1aee6c84c5344250b80_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
70a67f074193b1aee6c84c5344250b80_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
70a67f074193b1aee6c84c5344250b80_JaffaCakes118.html
-
Size
22KB
-
MD5
70a67f074193b1aee6c84c5344250b80
-
SHA1
9d6d606eab25090295ec88f4927aa116357a3138
-
SHA256
7c9da4c885a4d303e275cb9590cb277d6faa344085476a082b3100f797a3195d
-
SHA512
8a37a7458cb3ef9005c03ee2c31a736da1ad5c3c0b1acac9fb5b017ee7451b81f99a673fab61682cd4bb6170d228a3822263a2068b9ba876942d17dc222fc6db
-
SSDEEP
384:omOH9iJzPMrGqi+fErlub/fQ/JvgShb909v06k9zY6LvFvjUfdsYOwP:omOH9iJzPMrGqi+fErlub/cvgShb90wm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3712 msedge.exe 3712 msedge.exe 2616 msedge.exe 2616 msedge.exe 5096 identity_helper.exe 5096 identity_helper.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2616 wrote to memory of 2624 2616 msedge.exe 84 PID 2616 wrote to memory of 2624 2616 msedge.exe 84 PID 2616 wrote to memory of 3592 2616 msedge.exe 85 PID 2616 wrote to memory of 3592 2616 msedge.exe 85 PID 2616 wrote to memory of 3592 2616 msedge.exe 85 PID 2616 wrote to memory of 3592 2616 msedge.exe 85 PID 2616 wrote to memory of 3592 2616 msedge.exe 85 PID 2616 wrote to memory of 3592 2616 msedge.exe 85 PID 2616 wrote to memory of 3592 2616 msedge.exe 85 PID 2616 wrote to memory of 3592 2616 msedge.exe 85 PID 2616 wrote to memory of 3592 2616 msedge.exe 85 PID 2616 wrote to memory of 3592 2616 msedge.exe 85 PID 2616 wrote to memory of 3592 2616 msedge.exe 85 PID 2616 wrote to memory of 3592 2616 msedge.exe 85 PID 2616 wrote to memory of 3592 2616 msedge.exe 85 PID 2616 wrote to memory of 3592 2616 msedge.exe 85 PID 2616 wrote to memory of 3592 2616 msedge.exe 85 PID 2616 wrote to memory of 3592 2616 msedge.exe 85 PID 2616 wrote to memory of 3592 2616 msedge.exe 85 PID 2616 wrote to memory of 3592 2616 msedge.exe 85 PID 2616 wrote to memory of 3592 2616 msedge.exe 85 PID 2616 wrote to memory of 3592 2616 msedge.exe 85 PID 2616 wrote to memory of 3592 2616 msedge.exe 85 PID 2616 wrote to memory of 3592 2616 msedge.exe 85 PID 2616 wrote to memory of 3592 2616 msedge.exe 85 PID 2616 wrote to memory of 3592 2616 msedge.exe 85 PID 2616 wrote to memory of 3592 2616 msedge.exe 85 PID 2616 wrote to memory of 3592 2616 msedge.exe 85 PID 2616 wrote to memory of 3592 2616 msedge.exe 85 PID 2616 wrote to memory of 3592 2616 msedge.exe 85 PID 2616 wrote to memory of 3592 2616 msedge.exe 85 PID 2616 wrote to memory of 3592 2616 msedge.exe 85 PID 2616 wrote to memory of 3592 2616 msedge.exe 85 PID 2616 wrote to memory of 3592 2616 msedge.exe 85 PID 2616 wrote to memory of 3592 2616 msedge.exe 85 PID 2616 wrote to memory of 3592 2616 msedge.exe 85 PID 2616 wrote to memory of 3592 2616 msedge.exe 85 PID 2616 wrote to memory of 3592 2616 msedge.exe 85 PID 2616 wrote to memory of 3592 2616 msedge.exe 85 PID 2616 wrote to memory of 3592 2616 msedge.exe 85 PID 2616 wrote to memory of 3592 2616 msedge.exe 85 PID 2616 wrote to memory of 3592 2616 msedge.exe 85 PID 2616 wrote to memory of 3712 2616 msedge.exe 86 PID 2616 wrote to memory of 3712 2616 msedge.exe 86 PID 2616 wrote to memory of 3856 2616 msedge.exe 87 PID 2616 wrote to memory of 3856 2616 msedge.exe 87 PID 2616 wrote to memory of 3856 2616 msedge.exe 87 PID 2616 wrote to memory of 3856 2616 msedge.exe 87 PID 2616 wrote to memory of 3856 2616 msedge.exe 87 PID 2616 wrote to memory of 3856 2616 msedge.exe 87 PID 2616 wrote to memory of 3856 2616 msedge.exe 87 PID 2616 wrote to memory of 3856 2616 msedge.exe 87 PID 2616 wrote to memory of 3856 2616 msedge.exe 87 PID 2616 wrote to memory of 3856 2616 msedge.exe 87 PID 2616 wrote to memory of 3856 2616 msedge.exe 87 PID 2616 wrote to memory of 3856 2616 msedge.exe 87 PID 2616 wrote to memory of 3856 2616 msedge.exe 87 PID 2616 wrote to memory of 3856 2616 msedge.exe 87 PID 2616 wrote to memory of 3856 2616 msedge.exe 87 PID 2616 wrote to memory of 3856 2616 msedge.exe 87 PID 2616 wrote to memory of 3856 2616 msedge.exe 87 PID 2616 wrote to memory of 3856 2616 msedge.exe 87 PID 2616 wrote to memory of 3856 2616 msedge.exe 87 PID 2616 wrote to memory of 3856 2616 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\70a67f074193b1aee6c84c5344250b80_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff90ff846f8,0x7ff90ff84708,0x7ff90ff847182⤵PID:2624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,16007787405760889049,8168787788239684734,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2180,16007787405760889049,8168787788239684734,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2180,16007787405760889049,8168787788239684734,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16007787405760889049,8168787788239684734,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16007787405760889049,8168787788239684734,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,16007787405760889049,8168787788239684734,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,16007787405760889049,8168787788239684734,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16007787405760889049,8168787788239684734,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16007787405760889049,8168787788239684734,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3908 /prefetch:12⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16007787405760889049,8168787788239684734,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16007787405760889049,8168787788239684734,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,16007787405760889049,8168787788239684734,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3892 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4512
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4476
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2184
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
5KB
MD5731c3d78ae6c41ffec26c4a45892aa5e
SHA1c616348f8b7cf3bd76b582c69a5154c4a500a36d
SHA256e7eea9ae06dcbda861e4d8a172b2665d6942e8da45a4f939e472b986fc735d27
SHA5127bede5311689cc45c9258f2d8ac53246f41d36fd5a819a6a2de51caab16fde9dd8f74e7be1b979e25e7a129d4dc89a9b70864b706056a4041d988475f7142a0c
-
Filesize
6KB
MD57d561c77deb9e01fa52eb2e13f3c01f3
SHA1b5af492b4916cff2aed84585e59cce32b3bf9ccf
SHA2562a37cd35f26a9203946962e2c15fda350bf375bbe4cb92a9fdaa55bc78400d41
SHA5120ad648c0c5ea19574f89f47f86d16fa28250d8b4e57bf4e784c6491e4a4efd0a11ff073df90a33564d14799c875fdcb5491603f1bd8c69d6a29f4b6f09a2dce9
-
Filesize
6KB
MD525acff3616e0eb00bd8a5ef8e9a01b34
SHA1548513c5d264710fc89f52e6df11f5a8a28aca2d
SHA256188c71331619be25c71d956e8e20d29881edd452c2bd69bd3bea1be20ab25ee4
SHA5120679a95aa440ea0b604d20d206af23cd556de64451ecea875886ae3fc966e0cc1887677f8e2b9a6e15e28b7230932ae497bf058edec42c00cd618fbabf21aaad
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57467b6610c71cc41f5647a47c5a0af11
SHA118f41cfc46eff4e8011cd67ad2e2ca0bba88e22a
SHA25673706427571d335867b3820ad3b327bb7c31222e229870679c205459211d9079
SHA51230d0572de8c7066ca2ee99c67427880390c84d39c5ee818535da01c866a662fee32fcf2950e1dbf43390693e8d2214f0701402fa159f4c18a005c54f301cddf3