Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2024 23:42
Static task
static1
Behavioral task
behavioral1
Sample
12f3779c48b7ef1cc666f835030665b3_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
12f3779c48b7ef1cc666f835030665b3_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
12f3779c48b7ef1cc666f835030665b3_JaffaCakes118.html
-
Size
45KB
-
MD5
12f3779c48b7ef1cc666f835030665b3
-
SHA1
774983c5f17d0eaf43119ca29ee05ef8dbc694ce
-
SHA256
0c82b8385ff8439fcb6389c64ab77dffc5e543fe04c47d3458ff3bddb211af8d
-
SHA512
2debd1062d314f311fd3801e29e8f6a4385f2f7ffd3017cc7440abdc62814347369ca2ed6220cf7311c81ac22aa8267479244d3a749e5af5e9ea9f5d22e50490
-
SSDEEP
768:74OWVouTql9Ay02dCkV/d+nPRfJECi5HG9MCRfnbhmVRMpDqwFm6cUFvjsi/bBt:74OWVouTqP0yCknaPRfJECi5HwMCRfnN
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 404 msedge.exe 404 msedge.exe 1448 msedge.exe 1448 msedge.exe 4524 identity_helper.exe 4524 identity_helper.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1448 wrote to memory of 776 1448 msedge.exe 86 PID 1448 wrote to memory of 776 1448 msedge.exe 86 PID 1448 wrote to memory of 4416 1448 msedge.exe 88 PID 1448 wrote to memory of 4416 1448 msedge.exe 88 PID 1448 wrote to memory of 4416 1448 msedge.exe 88 PID 1448 wrote to memory of 4416 1448 msedge.exe 88 PID 1448 wrote to memory of 4416 1448 msedge.exe 88 PID 1448 wrote to memory of 4416 1448 msedge.exe 88 PID 1448 wrote to memory of 4416 1448 msedge.exe 88 PID 1448 wrote to memory of 4416 1448 msedge.exe 88 PID 1448 wrote to memory of 4416 1448 msedge.exe 88 PID 1448 wrote to memory of 4416 1448 msedge.exe 88 PID 1448 wrote to memory of 4416 1448 msedge.exe 88 PID 1448 wrote to memory of 4416 1448 msedge.exe 88 PID 1448 wrote to memory of 4416 1448 msedge.exe 88 PID 1448 wrote to memory of 4416 1448 msedge.exe 88 PID 1448 wrote to memory of 4416 1448 msedge.exe 88 PID 1448 wrote to memory of 4416 1448 msedge.exe 88 PID 1448 wrote to memory of 4416 1448 msedge.exe 88 PID 1448 wrote to memory of 4416 1448 msedge.exe 88 PID 1448 wrote to memory of 4416 1448 msedge.exe 88 PID 1448 wrote to memory of 4416 1448 msedge.exe 88 PID 1448 wrote to memory of 4416 1448 msedge.exe 88 PID 1448 wrote to memory of 4416 1448 msedge.exe 88 PID 1448 wrote to memory of 4416 1448 msedge.exe 88 PID 1448 wrote to memory of 4416 1448 msedge.exe 88 PID 1448 wrote to memory of 4416 1448 msedge.exe 88 PID 1448 wrote to memory of 4416 1448 msedge.exe 88 PID 1448 wrote to memory of 4416 1448 msedge.exe 88 PID 1448 wrote to memory of 4416 1448 msedge.exe 88 PID 1448 wrote to memory of 4416 1448 msedge.exe 88 PID 1448 wrote to memory of 4416 1448 msedge.exe 88 PID 1448 wrote to memory of 4416 1448 msedge.exe 88 PID 1448 wrote to memory of 4416 1448 msedge.exe 88 PID 1448 wrote to memory of 4416 1448 msedge.exe 88 PID 1448 wrote to memory of 4416 1448 msedge.exe 88 PID 1448 wrote to memory of 4416 1448 msedge.exe 88 PID 1448 wrote to memory of 4416 1448 msedge.exe 88 PID 1448 wrote to memory of 4416 1448 msedge.exe 88 PID 1448 wrote to memory of 4416 1448 msedge.exe 88 PID 1448 wrote to memory of 4416 1448 msedge.exe 88 PID 1448 wrote to memory of 4416 1448 msedge.exe 88 PID 1448 wrote to memory of 404 1448 msedge.exe 89 PID 1448 wrote to memory of 404 1448 msedge.exe 89 PID 1448 wrote to memory of 4436 1448 msedge.exe 90 PID 1448 wrote to memory of 4436 1448 msedge.exe 90 PID 1448 wrote to memory of 4436 1448 msedge.exe 90 PID 1448 wrote to memory of 4436 1448 msedge.exe 90 PID 1448 wrote to memory of 4436 1448 msedge.exe 90 PID 1448 wrote to memory of 4436 1448 msedge.exe 90 PID 1448 wrote to memory of 4436 1448 msedge.exe 90 PID 1448 wrote to memory of 4436 1448 msedge.exe 90 PID 1448 wrote to memory of 4436 1448 msedge.exe 90 PID 1448 wrote to memory of 4436 1448 msedge.exe 90 PID 1448 wrote to memory of 4436 1448 msedge.exe 90 PID 1448 wrote to memory of 4436 1448 msedge.exe 90 PID 1448 wrote to memory of 4436 1448 msedge.exe 90 PID 1448 wrote to memory of 4436 1448 msedge.exe 90 PID 1448 wrote to memory of 4436 1448 msedge.exe 90 PID 1448 wrote to memory of 4436 1448 msedge.exe 90 PID 1448 wrote to memory of 4436 1448 msedge.exe 90 PID 1448 wrote to memory of 4436 1448 msedge.exe 90 PID 1448 wrote to memory of 4436 1448 msedge.exe 90 PID 1448 wrote to memory of 4436 1448 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\12f3779c48b7ef1cc666f835030665b3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff511b46f8,0x7fff511b4708,0x7fff511b47182⤵PID:776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,16558982712610993748,15125751090144386072,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,16558982712610993748,15125751090144386072,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,16558982712610993748,15125751090144386072,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16558982712610993748,15125751090144386072,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16558982712610993748,15125751090144386072,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:1280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,16558982712610993748,15125751090144386072,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6052 /prefetch:82⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,16558982712610993748,15125751090144386072,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6052 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16558982712610993748,15125751090144386072,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6012 /prefetch:12⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16558982712610993748,15125751090144386072,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16558982712610993748,15125751090144386072,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4108 /prefetch:12⤵PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16558982712610993748,15125751090144386072,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3588 /prefetch:12⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,16558982712610993748,15125751090144386072,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4880 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3276
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3144
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f35bb0615bb9816f562b83304e456294
SHA11049e2bd3e1bbb4cea572467d7c4a96648659cb4
SHA25605e80abd624454e5b860a08f40ddf33d672c3fed319aac180b7de5754bc07b71
SHA512db9100f3e324e74a9c58c7d9f50c25eaa4c6c4553c93bab9b80c6f7bef777db04111ebcd679f94015203b240fe9f4f371cae0d4290ec891a4173c746ff4b11c1
-
Filesize
152B
MD51eb86108cb8f5a956fdf48efbd5d06fe
SHA17b2b299f753798e4891df2d9cbf30f94b39ef924
SHA2561b53367e0041d54af89e7dd59733231f5da1393c551ed2b943c89166c0baca40
SHA512e2a661437688a4a01a6eb3b2bd7979ecf96b806f5a487d39354a7f0d44cb693a3b1c2cf6b1247b04e4106cc816105e982569572042bdddb3cd5bec23b4fce29d
-
Filesize
731B
MD51676b7f30f795a3d7b95c097d4628211
SHA170621dec3d6363e8989615fbc32d9b9ef4f8d094
SHA256b42c2a6fee94c7cf67e171cdee1aadee49e117eeada073fc9d361891223d12dd
SHA512b2d88b855eefa7820e0f0948002fc8adcfadcd805e02b9af0be1ea478502f64521f2ce4a3832e93ea0c0b6523d96443fe9ab77cf09f9b05e4a3bcb9c7e3c9c56
-
Filesize
6KB
MD5a4664abb469b397fd009a8bda6790b93
SHA1ab6798094ea6d7bf706019b28e57258e054e1327
SHA2563297a75f8d1e005b4013a7a64d95c9db7ae150cb9d4cdac8b3a48d16591d7c63
SHA5121536915919f3aa7bb8d950347fe08e35ff758c981d14be88a94500284e1fa30b3604dd345fe760e60a4f0fb0c098b3a31daa61637f3a8e9365459382d66236bb
-
Filesize
6KB
MD5f67afc182437a13afcebdaa54dde39ad
SHA10dc76df741578d8a23ca3c2228b0cdcb5e83102e
SHA256d889ecf1ea742c45d3500b9952b9bb6355a97fdeb861f465bbaa8114460f0857
SHA51250f81bed530d60ddafd0102153ecb4d0d4800e7cd9e1308427e73d581983e12b8771be20d49b363e0aa0776acf5ac4c9ec0640ef3be29b8d6ef1aaa3a3948fdc
-
Filesize
6KB
MD52fd0abc79c536dcb734c95ceeb78f73a
SHA13698477443db5bb3f4cbed5ec0b945498e593193
SHA2566d5aa4b6e07e8d5b1125874d027c2e566fda3bed794b6aaf537f2286c18c94d4
SHA51297ae23e4465d883a34ddbb44c44de18d95aa2b8138003427095c3d19c16b7ab75ee2a99b4026958f40ab7fdff7645af50efd75b118894c029286058f294ed119
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a4d9323dcc5ac5800e8428f22c73cfed
SHA1ebef4dea2e70c51fb45a859715df52a34679419d
SHA256ed81b110e05f887b7eb724ba2b2df1c3cac1fb7357ec80b0c8fd59ec3083e315
SHA512dbaf31ab104be453c61e1c676d5d1e50d600dcf86f147b5546cf883f1a1ff593bb9c11baac78384c7802c6c326c97615214e9f0bb49e9e91b62013a6725a30af