Analysis
-
max time kernel
139s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30-05-2024 17:07
Static task
static1
Behavioral task
behavioral1
Sample
84d8f6633d536676f4b7420232983d5e_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
84d8f6633d536676f4b7420232983d5e_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
84d8f6633d536676f4b7420232983d5e_JaffaCakes118.html
-
Size
158KB
-
MD5
84d8f6633d536676f4b7420232983d5e
-
SHA1
e7ef2ebbb44c332844ece48fc5e78a14a074e5ce
-
SHA256
ab8480399880a16a32cb03c06c6371375fe7c88d8dd07460497ac59a506461f3
-
SHA512
0172935d3c2f7c4610aa6a4d81d635d50c179d6276744c5cd3e9d30b38498f438c042601769f0ecbc31224486b5f1fd7a16c1f43d079ceced7eabaccbcab9eb0
-
SSDEEP
1536:izRTCT98aXmMyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusG:idnaWMyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exemsedge.exeidentity_helper.exepid process 1696 msedge.exe 1696 msedge.exe 4900 msedge.exe 4900 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 1680 identity_helper.exe 1680 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4900 wrote to memory of 4532 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 4532 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 3568 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 3568 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 3568 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 3568 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 3568 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 3568 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 3568 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 3568 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 3568 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 3568 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 3568 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 3568 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 3568 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 3568 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 3568 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 3568 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 3568 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 3568 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 3568 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 3568 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 3568 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 3568 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 3568 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 3568 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 3568 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 3568 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 3568 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 3568 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 3568 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 3568 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 3568 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 3568 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 3568 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 3568 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 3568 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 3568 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 3568 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 3568 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 3568 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 3568 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 1696 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 1696 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 1196 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 1196 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 1196 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 1196 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 1196 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 1196 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 1196 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 1196 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 1196 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 1196 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 1196 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 1196 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 1196 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 1196 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 1196 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 1196 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 1196 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 1196 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 1196 4900 msedge.exe msedge.exe PID 4900 wrote to memory of 1196 4900 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\84d8f6633d536676f4b7420232983d5e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff942d846f8,0x7ff942d84708,0x7ff942d847182⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,8010544297558588430,1645963505041164000,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,8010544297558588430,1645963505041164000,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,8010544297558588430,1645963505041164000,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,8010544297558588430,1645963505041164000,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,8010544297558588430,1645963505041164000,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,8010544297558588430,1645963505041164000,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2912 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,8010544297558588430,1645963505041164000,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4616 /prefetch:82⤵PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,8010544297558588430,1645963505041164000,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4616 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,8010544297558588430,1645963505041164000,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,8010544297558588430,1645963505041164000,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,8010544297558588430,1645963505041164000,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4164 /prefetch:12⤵PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,8010544297558588430,1645963505041164000,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6016 /prefetch:12⤵PID:5016
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5036
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
5KB
MD55670b0780e968705cfc751d4dbad98ac
SHA1bd0d74d4977be1b58cff565999342ff9f0954764
SHA2561021d8533eb8e86c90994e3ca906eed72091d76b8c4d8f6789e342cfa203e9ee
SHA5128e9777c14c0dcb636da44944fd920b948f282bfecf5ebe616d49229b950cf9ff03ed2dee3138a0a8df2745b213dc1b923000cd8d0c9aa688c5c07b2fdcb2b860
-
Filesize
6KB
MD514b5f99a6ba871ef34b339e66f945233
SHA1216346020e4b94b46a49dd0b3c39f9c9f79e31d8
SHA2561254bfc6ff797a82e8e4583390b14a9b92990f39c5d26d2013c02d143ce4a2ea
SHA512e7aed5f054cc5d9751288173bd82ff420ae6652b326a7c031565f7ea93c2c74f6222e5ec44167e6e73d81c381aec729ffa3c3aa019ffc0e902dbad09c4e8d70c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD55da385964ef888b24a08922cbbedf517
SHA1384b5dbdf593f99704a34bb17431c50a05d309cd
SHA2562a26788e8f6f9a8b21d0efc6aff0e82eee606808df5db768b50ddbb41e65d46f
SHA5125ecab22258a2afad60e4feac07a47beb272a200007f58e065637e27fddfd60bb0a99ae9486685bfbeed4bef23a5cd2ecf7e3623227b7d6307930eca64a4e3db9
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e