Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2024, 10:57
Static task
static1
Behavioral task
behavioral1
Sample
2039b754645a632ca85bcec237e5b876_JaffaCakes118.html
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
2039b754645a632ca85bcec237e5b876_JaffaCakes118.html
Resource
win10v2004-20231215-en
General
-
Target
2039b754645a632ca85bcec237e5b876_JaffaCakes118.html
-
Size
13KB
-
MD5
2039b754645a632ca85bcec237e5b876
-
SHA1
0171b82509f1bd9e5225919a4bb3292764ea30cb
-
SHA256
fd304217b5d47e1b42ff17a8232c880a3dd9dedcf8b6caac1bcfaf9140b33ef7
-
SHA512
20b4c45b2ed02abb9c74d764e9f1be2a14fd0743f2647e5b8789bb02e744449bcd149d31364a08622b8d0d8141e1aaf801f176a4bf72292ef5c04234d740a835
-
SSDEEP
192:s6l7vFZ7vqROUxIm73BSc16oJJ46PImmTYm7msMxsi5tYKCnAkTe/da2CrVXIurg:TfoOUn7zJY7msMxj5tzCnx79A5KJmC8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3556 msedge.exe 3556 msedge.exe 5088 msedge.exe 5088 msedge.exe 4556 identity_helper.exe 4556 identity_helper.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5088 wrote to memory of 4804 5088 msedge.exe 87 PID 5088 wrote to memory of 4804 5088 msedge.exe 87 PID 5088 wrote to memory of 5092 5088 msedge.exe 88 PID 5088 wrote to memory of 5092 5088 msedge.exe 88 PID 5088 wrote to memory of 5092 5088 msedge.exe 88 PID 5088 wrote to memory of 5092 5088 msedge.exe 88 PID 5088 wrote to memory of 5092 5088 msedge.exe 88 PID 5088 wrote to memory of 5092 5088 msedge.exe 88 PID 5088 wrote to memory of 5092 5088 msedge.exe 88 PID 5088 wrote to memory of 5092 5088 msedge.exe 88 PID 5088 wrote to memory of 5092 5088 msedge.exe 88 PID 5088 wrote to memory of 5092 5088 msedge.exe 88 PID 5088 wrote to memory of 5092 5088 msedge.exe 88 PID 5088 wrote to memory of 5092 5088 msedge.exe 88 PID 5088 wrote to memory of 5092 5088 msedge.exe 88 PID 5088 wrote to memory of 5092 5088 msedge.exe 88 PID 5088 wrote to memory of 5092 5088 msedge.exe 88 PID 5088 wrote to memory of 5092 5088 msedge.exe 88 PID 5088 wrote to memory of 5092 5088 msedge.exe 88 PID 5088 wrote to memory of 5092 5088 msedge.exe 88 PID 5088 wrote to memory of 5092 5088 msedge.exe 88 PID 5088 wrote to memory of 5092 5088 msedge.exe 88 PID 5088 wrote to memory of 5092 5088 msedge.exe 88 PID 5088 wrote to memory of 5092 5088 msedge.exe 88 PID 5088 wrote to memory of 5092 5088 msedge.exe 88 PID 5088 wrote to memory of 5092 5088 msedge.exe 88 PID 5088 wrote to memory of 5092 5088 msedge.exe 88 PID 5088 wrote to memory of 5092 5088 msedge.exe 88 PID 5088 wrote to memory of 5092 5088 msedge.exe 88 PID 5088 wrote to memory of 5092 5088 msedge.exe 88 PID 5088 wrote to memory of 5092 5088 msedge.exe 88 PID 5088 wrote to memory of 5092 5088 msedge.exe 88 PID 5088 wrote to memory of 5092 5088 msedge.exe 88 PID 5088 wrote to memory of 5092 5088 msedge.exe 88 PID 5088 wrote to memory of 5092 5088 msedge.exe 88 PID 5088 wrote to memory of 5092 5088 msedge.exe 88 PID 5088 wrote to memory of 5092 5088 msedge.exe 88 PID 5088 wrote to memory of 5092 5088 msedge.exe 88 PID 5088 wrote to memory of 5092 5088 msedge.exe 88 PID 5088 wrote to memory of 5092 5088 msedge.exe 88 PID 5088 wrote to memory of 5092 5088 msedge.exe 88 PID 5088 wrote to memory of 5092 5088 msedge.exe 88 PID 5088 wrote to memory of 3556 5088 msedge.exe 89 PID 5088 wrote to memory of 3556 5088 msedge.exe 89 PID 5088 wrote to memory of 1472 5088 msedge.exe 90 PID 5088 wrote to memory of 1472 5088 msedge.exe 90 PID 5088 wrote to memory of 1472 5088 msedge.exe 90 PID 5088 wrote to memory of 1472 5088 msedge.exe 90 PID 5088 wrote to memory of 1472 5088 msedge.exe 90 PID 5088 wrote to memory of 1472 5088 msedge.exe 90 PID 5088 wrote to memory of 1472 5088 msedge.exe 90 PID 5088 wrote to memory of 1472 5088 msedge.exe 90 PID 5088 wrote to memory of 1472 5088 msedge.exe 90 PID 5088 wrote to memory of 1472 5088 msedge.exe 90 PID 5088 wrote to memory of 1472 5088 msedge.exe 90 PID 5088 wrote to memory of 1472 5088 msedge.exe 90 PID 5088 wrote to memory of 1472 5088 msedge.exe 90 PID 5088 wrote to memory of 1472 5088 msedge.exe 90 PID 5088 wrote to memory of 1472 5088 msedge.exe 90 PID 5088 wrote to memory of 1472 5088 msedge.exe 90 PID 5088 wrote to memory of 1472 5088 msedge.exe 90 PID 5088 wrote to memory of 1472 5088 msedge.exe 90 PID 5088 wrote to memory of 1472 5088 msedge.exe 90 PID 5088 wrote to memory of 1472 5088 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2039b754645a632ca85bcec237e5b876_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffbb0846f8,0x7fffbb084708,0x7fffbb0847182⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,11236858714023748585,7477758936623636046,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,11236858714023748585,7477758936623636046,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,11236858714023748585,7477758936623636046,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2936 /prefetch:82⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,11236858714023748585,7477758936623636046,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3148 /prefetch:12⤵PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,11236858714023748585,7477758936623636046,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:1220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,11236858714023748585,7477758936623636046,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5968 /prefetch:82⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,11236858714023748585,7477758936623636046,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5968 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,11236858714023748585,7477758936623636046,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,11236858714023748585,7477758936623636046,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4252 /prefetch:12⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,11236858714023748585,7477758936623636046,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:12⤵PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,11236858714023748585,7477758936623636046,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3476 /prefetch:12⤵PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,11236858714023748585,7477758936623636046,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4236 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4952
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3368
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4256
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54d6e17218d9a99976d1a14c6f6944c96
SHA19e54a19d6c61d99ac8759c5f07b2f0d5faab447f
SHA25632e343d2794af8bc6f2f7c905b5df11d53db4ad8922b92ad5e7cc9c856509d93
SHA5123fa166b3e2d1236298d8dda7071a6fcf2bde283f181b8b0a07c0bb8ba756d6f55fa8a847ca5286d4dbabc6dace67e842a118866320ac01bd5f93cccd3a032e47
-
Filesize
337B
MD537ace122ad5a4d4543d08c59c564bafd
SHA1427e3948bc0460243591419589923e4bdf6c23e1
SHA25651be82cff3f6814f73646a2904b2e3b4d4b49a0b70f91efe8d7e8cc8fc4b0a3c
SHA512a37eb46afa22c02e7c766229fbd54bf6c3675d4a7d761b076fcc153df33f02d3699098bead090266688432279adbcba899406afab7a03eebc2e8ce30ce1034f5
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
560B
MD57a758124b9ade04d0b17d90e303a4f52
SHA1dbc9c62998b90b3afe0e8332ef87749083da2f3d
SHA256700e54593b6c357da993fd7640698bd432513eb05b74924e0fa1ace14338c4c4
SHA5126b104e0a7844a4d50e5f6fb8ab6a31831aefe141a5155f3ed16b457b1ecefad7562412cabbc5defbf87bc95edf2669139aa069c029cb1d24b9534f7bbc6ebff5
-
Filesize
5KB
MD533921a68c8470461473f416bf8f8e054
SHA1b3286cbfd0d36bfd3e476444735765a1022f5d0e
SHA256f97a3fc324042fbfac86732950de67a906409aad74b8c305a28fde76fa7bf066
SHA512031c60f079399a78792f4aed098432892dad3d24e8625e9db693bd6faacc2d5c1938aba7b4ad6599cfa1630810a932573b81a06ab202d3a246ff2b21130c921f
-
Filesize
5KB
MD5e99de627e032aec96909afa669c482b4
SHA13dd6916a43199d0b295d4ad785ddd7f31683d2cb
SHA2560800096c9b5dd0d31c1fbc28c73e7bc298104b709a3288ae3493bbc18f9a2335
SHA512b3349a7887c89f20c05ec82e2f6f107df81540328f1c341603fffbaae1735f31fca45593fe32471979c72c2fa0808bafbed896a791177f327f739781bdd0115c
-
Filesize
6KB
MD51cdc2954420dd32696965b94907c8047
SHA15c5a0eb637ae90026ae0571ea0bf8789008fe797
SHA25678b6dd3bb001c981684f42f5a4802f8571b2e9ec97b41de28a0ac08df38cc941
SHA5129d3b615f3cb778eea86fb49d07eecec6a3df9739872894710a4f98bfd625a2527f29d82ae9ac23cf1642203129e94541d916cc26c7b5b1a86d733b8555c6a9e0
-
Filesize
24KB
MD5c2ef1d773c3f6f230cedf469f7e34059
SHA1e410764405adcfead3338c8d0b29371fd1a3f292
SHA256185450d538a894e4dcf55b428f506f3d7baa86664fbbc67afd6c255b65178521
SHA5122ef93803da4d630916bed75d678382fd1c72bff1700a1a72e2612431c6d5e11410ced4eaf522b388028aeadb08e8a77513e16594e6ab081f6d6203e4caa7d549
-
Filesize
540B
MD5c45ffe4f0798c429c3b07d82a4cce9b9
SHA13050529215ca46b2d79043613283555d99b52587
SHA256e73fc09a085ae6719867efb5003befb9d35fbd27670b40f9475e4e79bb41b1e9
SHA512747c1cc216fda5d06ebef167d6b972f6454ca70809dcca960f1c967868f7153f5a30af98d9f6f4227401dc3efee158655aedf5dfbfde9460ac828dd522ffad41
-
Filesize
538B
MD5738d616cd219c2153c6797955072b977
SHA189eb3ecea304aa887a9f13b98a2ceac1b364edfb
SHA256c8fd58f19514b08499022ceb53161103736c7c58c3790c2b739a68d6e67e908e
SHA5122848ad2279d99811e191fc4c00586848cb9dd1cf2029504bc4c84030ad47dbdb721eb303daba66db2a1f8bf06127810c2e11e1a4b8bf2438db2d50195b33b257
-
Filesize
538B
MD581e4123f650838d3f8ce924114549c73
SHA18a2f7ff2f528950c78e0fb213fab2731ed90c6c4
SHA256d4dc6e60df0054fb33806d8084ae872cc19dcd8be0bd8dcaf510bd5d34ffd567
SHA512f26d0a09d1d4b42c4e7138c609a745df1c8210b1fcb22c70831e6efd986e12d48a1309113374e8092f9385c4aee01e6de3724a15f6046990d11ff713bdb53576
-
Filesize
204B
MD5488f648e712a4aa4c886cee8c4deea21
SHA14d644a3ad8eb5626f50e77a158f3db7249f046d1
SHA2569a61068a3820bdc77fd44d79ec9739f2f09eb7016323b965ad14491e1994047b
SHA51287f28102ed377edb59de1969e165e9cec9bb9d2dcbb89b62c21813bc02fc4f9a1ebe63ede69b875dc0b81eed17c2587152157511221e4bb7e49efc7d8ce026e5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD583d42600e357dce7fc927574798a7a1c
SHA16ce18e2d1a6dc44870af6211d6288ab39ded7702
SHA256a1fe57cfbf8e04aa76c65298ece2f313c9377a2aa56eb5bda9c7d097e9451f7e
SHA512a431d89e688cbdb54666a52ac09a033f279770669b0d756fe83436b8ec69f7136dbc42c6e9cfa165d5f2eb8aca9c913fdb4732d729a0596b7dc8b765153729af