Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2024, 22:39
Static task
static1
Behavioral task
behavioral1
Sample
11d25e5fbc182a90559190f0dbab6d0b_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
11d25e5fbc182a90559190f0dbab6d0b_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
11d25e5fbc182a90559190f0dbab6d0b_JaffaCakes118.html
-
Size
202KB
-
MD5
11d25e5fbc182a90559190f0dbab6d0b
-
SHA1
f487fc6872c527218f3310efd4e0803ec4ba31ac
-
SHA256
d6302d32b6a7bc814d64fcb56928fc64e70bbf7f4ad93e2cf14445b9e8fe0d11
-
SHA512
6b827a3ec5de77e2eced5342213b3898eec7fdedc350dfd84161c802bd4eb95fda03e7a69feb09014e48799d3740cbf74585366e638c52962db3af7d2723496b
-
SSDEEP
1536:kaqdjVEES4Gf7IUsGL+5IEWOGvmCDzhJ3CbdlN5GvM:dqS2V
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2708 msedge.exe 2708 msedge.exe 2568 msedge.exe 2568 msedge.exe 4660 identity_helper.exe 4660 identity_helper.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2568 wrote to memory of 988 2568 msedge.exe 85 PID 2568 wrote to memory of 988 2568 msedge.exe 85 PID 2568 wrote to memory of 1864 2568 msedge.exe 86 PID 2568 wrote to memory of 1864 2568 msedge.exe 86 PID 2568 wrote to memory of 1864 2568 msedge.exe 86 PID 2568 wrote to memory of 1864 2568 msedge.exe 86 PID 2568 wrote to memory of 1864 2568 msedge.exe 86 PID 2568 wrote to memory of 1864 2568 msedge.exe 86 PID 2568 wrote to memory of 1864 2568 msedge.exe 86 PID 2568 wrote to memory of 1864 2568 msedge.exe 86 PID 2568 wrote to memory of 1864 2568 msedge.exe 86 PID 2568 wrote to memory of 1864 2568 msedge.exe 86 PID 2568 wrote to memory of 1864 2568 msedge.exe 86 PID 2568 wrote to memory of 1864 2568 msedge.exe 86 PID 2568 wrote to memory of 1864 2568 msedge.exe 86 PID 2568 wrote to memory of 1864 2568 msedge.exe 86 PID 2568 wrote to memory of 1864 2568 msedge.exe 86 PID 2568 wrote to memory of 1864 2568 msedge.exe 86 PID 2568 wrote to memory of 1864 2568 msedge.exe 86 PID 2568 wrote to memory of 1864 2568 msedge.exe 86 PID 2568 wrote to memory of 1864 2568 msedge.exe 86 PID 2568 wrote to memory of 1864 2568 msedge.exe 86 PID 2568 wrote to memory of 1864 2568 msedge.exe 86 PID 2568 wrote to memory of 1864 2568 msedge.exe 86 PID 2568 wrote to memory of 1864 2568 msedge.exe 86 PID 2568 wrote to memory of 1864 2568 msedge.exe 86 PID 2568 wrote to memory of 1864 2568 msedge.exe 86 PID 2568 wrote to memory of 1864 2568 msedge.exe 86 PID 2568 wrote to memory of 1864 2568 msedge.exe 86 PID 2568 wrote to memory of 1864 2568 msedge.exe 86 PID 2568 wrote to memory of 1864 2568 msedge.exe 86 PID 2568 wrote to memory of 1864 2568 msedge.exe 86 PID 2568 wrote to memory of 1864 2568 msedge.exe 86 PID 2568 wrote to memory of 1864 2568 msedge.exe 86 PID 2568 wrote to memory of 1864 2568 msedge.exe 86 PID 2568 wrote to memory of 1864 2568 msedge.exe 86 PID 2568 wrote to memory of 1864 2568 msedge.exe 86 PID 2568 wrote to memory of 1864 2568 msedge.exe 86 PID 2568 wrote to memory of 1864 2568 msedge.exe 86 PID 2568 wrote to memory of 1864 2568 msedge.exe 86 PID 2568 wrote to memory of 1864 2568 msedge.exe 86 PID 2568 wrote to memory of 1864 2568 msedge.exe 86 PID 2568 wrote to memory of 2708 2568 msedge.exe 87 PID 2568 wrote to memory of 2708 2568 msedge.exe 87 PID 2568 wrote to memory of 2016 2568 msedge.exe 88 PID 2568 wrote to memory of 2016 2568 msedge.exe 88 PID 2568 wrote to memory of 2016 2568 msedge.exe 88 PID 2568 wrote to memory of 2016 2568 msedge.exe 88 PID 2568 wrote to memory of 2016 2568 msedge.exe 88 PID 2568 wrote to memory of 2016 2568 msedge.exe 88 PID 2568 wrote to memory of 2016 2568 msedge.exe 88 PID 2568 wrote to memory of 2016 2568 msedge.exe 88 PID 2568 wrote to memory of 2016 2568 msedge.exe 88 PID 2568 wrote to memory of 2016 2568 msedge.exe 88 PID 2568 wrote to memory of 2016 2568 msedge.exe 88 PID 2568 wrote to memory of 2016 2568 msedge.exe 88 PID 2568 wrote to memory of 2016 2568 msedge.exe 88 PID 2568 wrote to memory of 2016 2568 msedge.exe 88 PID 2568 wrote to memory of 2016 2568 msedge.exe 88 PID 2568 wrote to memory of 2016 2568 msedge.exe 88 PID 2568 wrote to memory of 2016 2568 msedge.exe 88 PID 2568 wrote to memory of 2016 2568 msedge.exe 88 PID 2568 wrote to memory of 2016 2568 msedge.exe 88 PID 2568 wrote to memory of 2016 2568 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\11d25e5fbc182a90559190f0dbab6d0b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe62d346f8,0x7ffe62d34708,0x7ffe62d347182⤵PID:988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,6894099438222507236,263142558697522109,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,6894099438222507236,263142558697522109,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,6894099438222507236,263142558697522109,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6894099438222507236,263142558697522109,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6894099438222507236,263142558697522109,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6894099438222507236,263142558697522109,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,6894099438222507236,263142558697522109,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6020 /prefetch:82⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,6894099438222507236,263142558697522109,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6020 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6894099438222507236,263142558697522109,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5968 /prefetch:12⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6894099438222507236,263142558697522109,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6894099438222507236,263142558697522109,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:1080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6894099438222507236,263142558697522109,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:12⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,6894099438222507236,263142558697522109,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5096 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:976
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:888
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1832
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59ffb5f81e8eccd0963c46cbfea1abc20
SHA1a02a610afd3543de215565bc488a4343bb5c1a59
SHA2563a654b499247e59e34040f3b192a0069e8f3904e2398cbed90e86d981378e8bc
SHA5122d21e18ef3f800e6e43b8cf03639d04510433c04215923f5a96432a8aa361fdda282cd444210150d9dbf8f028825d5bc8a451fd53bd3e0c9528eeb80d6e86597
-
Filesize
152B
MD5e1b45169ebca0dceadb0f45697799d62
SHA1803604277318898e6f5c6fb92270ca83b5609cd5
SHA2564c0224fb7cc26ccf74f5be586f18401db57cce935c767a446659b828a7b5ee60
SHA512357965b8d5cfaf773dbd9b371d7e308d1c86a6c428e542adbfe6bac34a7d2061d0a2f59e84e5b42768930e9b109e9e9f2a87e95cf26b3a69cbff05654ee42b4e
-
Filesize
255B
MD584b28e8ffed9fa0b8f6a91b5b31b308d
SHA1efaf4dff37c34966c481eef0caf7dacee9e2a78c
SHA256cf81f066b1ba1e869f5551bbc61c497d91035e2afcb750c3e63d5c7644b0b29c
SHA512a838f81d13c5ecf02aedcdc60159f4b3f6e22e1f14c566ee3b2765e5645fe0eebabe24124ac018ea64986261c904e5bb50512708babe39bde76d7a5ab9280ea9
-
Filesize
6KB
MD568eab7ef57e7ce689c42a8e3dd68c8ca
SHA1f4ad06839c79abaa6554efa96b4cd29095c5dc82
SHA25666c23667bd74b5aecaf13e65fbf220ce79942034d91f23a6b1ed9a9f2fe8c34e
SHA5128b4744d481793d7e44824b13c039790825106f9b9dbb04221b3e6d19379682ac6996f9021369e4d4cc7168b4f79a70c49a6e6d259e6fa9f2302ccc2fc6fe1a34
-
Filesize
6KB
MD5aad85a60402611ee98239eae5cb832f1
SHA195f4a35f5e57637101741321e48c5f513ecc4866
SHA25629c9e176b604f09dad4e2b1b6d9ab1fd7a125682a7f8e379c1ccead200f8df51
SHA5125e3d59cd4eb3ff74f34d4eae8aab64971f011267f411423abd00aaa22d94dc731bf6a286fe1cdf482b60ec8733f44b760696155d39a1c486cdbd2cdde81c18cb
-
Filesize
6KB
MD56b4eb7af472ea9d2e730c776757ef7bd
SHA1202871b20b5cb19e58526e9d7ba7e468c7f5465e
SHA25678d721b14ed0364a8ebd871fc6decb6b0c8b872f31c30c631a22aca80d7e5312
SHA512f753ac1673761a8a23c5807f3af286bf1e7186e0315633cf69fb7a1eeec0d8ecd9dbccac1edc53d3c200926524f229f38bcabf8bdc4f7a977c211d9ab53e2627
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54e874f8e1af9dbfb1d13f8ea18f3d519
SHA12f9f4bcb04659974159363f516b9e4270f62af09
SHA256c057054c1cde24905353b67913997230414dd52244efa36cbd50fef4d202a904
SHA512d3cfb8156d919715ae0dfa2ac67dd47ebda1ed4d126b893ab81ee6ac31d842180795968cdfae43d073543888008e629bba9118c140afca5f2e1973ffb7cbca24