Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23-07-2024 08:52
Static task
static1
Behavioral task
behavioral1
Sample
66e790e78ff87664d2e342cd8035d2fd_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
66e790e78ff87664d2e342cd8035d2fd_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
66e790e78ff87664d2e342cd8035d2fd_JaffaCakes118.html
-
Size
71KB
-
MD5
66e790e78ff87664d2e342cd8035d2fd
-
SHA1
7f4afabed62af118d1842ec5c87bc744568350bc
-
SHA256
667aea1ae7da90c28dc2c7431714d2a434c289aabaf77dd2f621f9bfa8643677
-
SHA512
ba3a4535d53c5f3dd8e2f654bf60c11b6514f62bd696aadf57ef375e2f26fb0ed1944df49a6260b17d2aba9441a1eedacbb689b885089059a07499c59d976b25
-
SSDEEP
1536:pbMjw2fMk1D3O9Pj2fcTD3kHAysYLyGYYcZRg0+4p:slbBLFY
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3708 msedge.exe 3708 msedge.exe 4992 msedge.exe 4992 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4992 msedge.exe 4992 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4992 wrote to memory of 4684 4992 msedge.exe 84 PID 4992 wrote to memory of 4684 4992 msedge.exe 84 PID 4992 wrote to memory of 1940 4992 msedge.exe 85 PID 4992 wrote to memory of 1940 4992 msedge.exe 85 PID 4992 wrote to memory of 1940 4992 msedge.exe 85 PID 4992 wrote to memory of 1940 4992 msedge.exe 85 PID 4992 wrote to memory of 1940 4992 msedge.exe 85 PID 4992 wrote to memory of 1940 4992 msedge.exe 85 PID 4992 wrote to memory of 1940 4992 msedge.exe 85 PID 4992 wrote to memory of 1940 4992 msedge.exe 85 PID 4992 wrote to memory of 1940 4992 msedge.exe 85 PID 4992 wrote to memory of 1940 4992 msedge.exe 85 PID 4992 wrote to memory of 1940 4992 msedge.exe 85 PID 4992 wrote to memory of 1940 4992 msedge.exe 85 PID 4992 wrote to memory of 1940 4992 msedge.exe 85 PID 4992 wrote to memory of 1940 4992 msedge.exe 85 PID 4992 wrote to memory of 1940 4992 msedge.exe 85 PID 4992 wrote to memory of 1940 4992 msedge.exe 85 PID 4992 wrote to memory of 1940 4992 msedge.exe 85 PID 4992 wrote to memory of 1940 4992 msedge.exe 85 PID 4992 wrote to memory of 1940 4992 msedge.exe 85 PID 4992 wrote to memory of 1940 4992 msedge.exe 85 PID 4992 wrote to memory of 1940 4992 msedge.exe 85 PID 4992 wrote to memory of 1940 4992 msedge.exe 85 PID 4992 wrote to memory of 1940 4992 msedge.exe 85 PID 4992 wrote to memory of 1940 4992 msedge.exe 85 PID 4992 wrote to memory of 1940 4992 msedge.exe 85 PID 4992 wrote to memory of 1940 4992 msedge.exe 85 PID 4992 wrote to memory of 1940 4992 msedge.exe 85 PID 4992 wrote to memory of 1940 4992 msedge.exe 85 PID 4992 wrote to memory of 1940 4992 msedge.exe 85 PID 4992 wrote to memory of 1940 4992 msedge.exe 85 PID 4992 wrote to memory of 1940 4992 msedge.exe 85 PID 4992 wrote to memory of 1940 4992 msedge.exe 85 PID 4992 wrote to memory of 1940 4992 msedge.exe 85 PID 4992 wrote to memory of 1940 4992 msedge.exe 85 PID 4992 wrote to memory of 1940 4992 msedge.exe 85 PID 4992 wrote to memory of 1940 4992 msedge.exe 85 PID 4992 wrote to memory of 1940 4992 msedge.exe 85 PID 4992 wrote to memory of 1940 4992 msedge.exe 85 PID 4992 wrote to memory of 1940 4992 msedge.exe 85 PID 4992 wrote to memory of 1940 4992 msedge.exe 85 PID 4992 wrote to memory of 3708 4992 msedge.exe 86 PID 4992 wrote to memory of 3708 4992 msedge.exe 86 PID 4992 wrote to memory of 3652 4992 msedge.exe 87 PID 4992 wrote to memory of 3652 4992 msedge.exe 87 PID 4992 wrote to memory of 3652 4992 msedge.exe 87 PID 4992 wrote to memory of 3652 4992 msedge.exe 87 PID 4992 wrote to memory of 3652 4992 msedge.exe 87 PID 4992 wrote to memory of 3652 4992 msedge.exe 87 PID 4992 wrote to memory of 3652 4992 msedge.exe 87 PID 4992 wrote to memory of 3652 4992 msedge.exe 87 PID 4992 wrote to memory of 3652 4992 msedge.exe 87 PID 4992 wrote to memory of 3652 4992 msedge.exe 87 PID 4992 wrote to memory of 3652 4992 msedge.exe 87 PID 4992 wrote to memory of 3652 4992 msedge.exe 87 PID 4992 wrote to memory of 3652 4992 msedge.exe 87 PID 4992 wrote to memory of 3652 4992 msedge.exe 87 PID 4992 wrote to memory of 3652 4992 msedge.exe 87 PID 4992 wrote to memory of 3652 4992 msedge.exe 87 PID 4992 wrote to memory of 3652 4992 msedge.exe 87 PID 4992 wrote to memory of 3652 4992 msedge.exe 87 PID 4992 wrote to memory of 3652 4992 msedge.exe 87 PID 4992 wrote to memory of 3652 4992 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\66e790e78ff87664d2e342cd8035d2fd_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffde74e46f8,0x7ffde74e4708,0x7ffde74e47182⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,12815243664700552848,8394402605074573434,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2032 /prefetch:22⤵PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2012,12815243664700552848,8394402605074573434,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2012,12815243664700552848,8394402605074573434,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,12815243664700552848,8394402605074573434,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,12815243664700552848,8394402605074573434,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,12815243664700552848,8394402605074573434,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1308 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1532
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4796
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4896
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
Filesize
5KB
MD5f235f4cda6536d58686cdf080e1c415d
SHA160ff895be7dedab46ff0ffffe8f6360b9812deb4
SHA2561408a00050ca54d3b233bc1be3ba81c2e847264ea3bdbbf40dbf6a73d4d2032c
SHA512a1ede4cbe3a932ecf9f2b12774f5b89a31c4d3999b573a245ffeb8ccd1e80b01074bc7220216b1d2bbc2ebdc240373cc421239163fd6f4bab4d3f5000769aaeb
-
Filesize
6KB
MD57d5b4df67fa7df7115ad55c4ef6aefd7
SHA13f3d3c845b278a2563f19056a1e0d61b5fa5d223
SHA2565976f94352151b557048a10f4cc1dad846b768e6c3c67203a992e1bf3aa77bb6
SHA512b475ec94ed183b837c080b06e09e0c9932a1247bfbf4c3f96aa23bbdc0d3dec6f3d257049ed2b74205fc7e485f460510a1048f67ef78901dc90494568f7b4f68
-
Filesize
10KB
MD584b4409e007fff9b54a3b8fdc97fb94e
SHA10dcae56d338a43dce2aaa09a1adbcfeb60549fc8
SHA2560f272e48a31f20e41af3dbd25a164437862ee9498b5614e6025cdd31ac633d65
SHA512b3cf7c9c9e4096d811b127bfbab3d93dde1268aabdc4eb8cb6880a633745cf90d652d7f30dee1c20740adfe2e6d8b386ad2e0f327b1a001d1bcbb265cdbced8c