Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11-04-2024 02:45
Static task
static1
Behavioral task
behavioral1
Sample
ec835f8c63cd0d8b6dda3f684220a8b1_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
ec835f8c63cd0d8b6dda3f684220a8b1_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
ec835f8c63cd0d8b6dda3f684220a8b1_JaffaCakes118.html
-
Size
3KB
-
MD5
ec835f8c63cd0d8b6dda3f684220a8b1
-
SHA1
4a87671bdff1b0d7d850576464c6299e4d335902
-
SHA256
1807e8f43d707c0c6ae48852a2176b8706723c7598b7c91571f52f6492a88cd1
-
SHA512
d8682642dd8d5cdeab8955c7e4b74d84907b76bf92c93aa5115f94dc324b55c2a0c53b3243090a930cb7bd2e297e78514c14afd91eaddfc5431409bd061a5c95
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 776 msedge.exe 776 msedge.exe 1576 msedge.exe 1576 msedge.exe 636 identity_helper.exe 636 identity_helper.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1576 wrote to memory of 3196 1576 msedge.exe 83 PID 1576 wrote to memory of 3196 1576 msedge.exe 83 PID 1576 wrote to memory of 2772 1576 msedge.exe 84 PID 1576 wrote to memory of 2772 1576 msedge.exe 84 PID 1576 wrote to memory of 2772 1576 msedge.exe 84 PID 1576 wrote to memory of 2772 1576 msedge.exe 84 PID 1576 wrote to memory of 2772 1576 msedge.exe 84 PID 1576 wrote to memory of 2772 1576 msedge.exe 84 PID 1576 wrote to memory of 2772 1576 msedge.exe 84 PID 1576 wrote to memory of 2772 1576 msedge.exe 84 PID 1576 wrote to memory of 2772 1576 msedge.exe 84 PID 1576 wrote to memory of 2772 1576 msedge.exe 84 PID 1576 wrote to memory of 2772 1576 msedge.exe 84 PID 1576 wrote to memory of 2772 1576 msedge.exe 84 PID 1576 wrote to memory of 2772 1576 msedge.exe 84 PID 1576 wrote to memory of 2772 1576 msedge.exe 84 PID 1576 wrote to memory of 2772 1576 msedge.exe 84 PID 1576 wrote to memory of 2772 1576 msedge.exe 84 PID 1576 wrote to memory of 2772 1576 msedge.exe 84 PID 1576 wrote to memory of 2772 1576 msedge.exe 84 PID 1576 wrote to memory of 2772 1576 msedge.exe 84 PID 1576 wrote to memory of 2772 1576 msedge.exe 84 PID 1576 wrote to memory of 2772 1576 msedge.exe 84 PID 1576 wrote to memory of 2772 1576 msedge.exe 84 PID 1576 wrote to memory of 2772 1576 msedge.exe 84 PID 1576 wrote to memory of 2772 1576 msedge.exe 84 PID 1576 wrote to memory of 2772 1576 msedge.exe 84 PID 1576 wrote to memory of 2772 1576 msedge.exe 84 PID 1576 wrote to memory of 2772 1576 msedge.exe 84 PID 1576 wrote to memory of 2772 1576 msedge.exe 84 PID 1576 wrote to memory of 2772 1576 msedge.exe 84 PID 1576 wrote to memory of 2772 1576 msedge.exe 84 PID 1576 wrote to memory of 2772 1576 msedge.exe 84 PID 1576 wrote to memory of 2772 1576 msedge.exe 84 PID 1576 wrote to memory of 2772 1576 msedge.exe 84 PID 1576 wrote to memory of 2772 1576 msedge.exe 84 PID 1576 wrote to memory of 2772 1576 msedge.exe 84 PID 1576 wrote to memory of 2772 1576 msedge.exe 84 PID 1576 wrote to memory of 2772 1576 msedge.exe 84 PID 1576 wrote to memory of 2772 1576 msedge.exe 84 PID 1576 wrote to memory of 2772 1576 msedge.exe 84 PID 1576 wrote to memory of 2772 1576 msedge.exe 84 PID 1576 wrote to memory of 776 1576 msedge.exe 85 PID 1576 wrote to memory of 776 1576 msedge.exe 85 PID 1576 wrote to memory of 2472 1576 msedge.exe 86 PID 1576 wrote to memory of 2472 1576 msedge.exe 86 PID 1576 wrote to memory of 2472 1576 msedge.exe 86 PID 1576 wrote to memory of 2472 1576 msedge.exe 86 PID 1576 wrote to memory of 2472 1576 msedge.exe 86 PID 1576 wrote to memory of 2472 1576 msedge.exe 86 PID 1576 wrote to memory of 2472 1576 msedge.exe 86 PID 1576 wrote to memory of 2472 1576 msedge.exe 86 PID 1576 wrote to memory of 2472 1576 msedge.exe 86 PID 1576 wrote to memory of 2472 1576 msedge.exe 86 PID 1576 wrote to memory of 2472 1576 msedge.exe 86 PID 1576 wrote to memory of 2472 1576 msedge.exe 86 PID 1576 wrote to memory of 2472 1576 msedge.exe 86 PID 1576 wrote to memory of 2472 1576 msedge.exe 86 PID 1576 wrote to memory of 2472 1576 msedge.exe 86 PID 1576 wrote to memory of 2472 1576 msedge.exe 86 PID 1576 wrote to memory of 2472 1576 msedge.exe 86 PID 1576 wrote to memory of 2472 1576 msedge.exe 86 PID 1576 wrote to memory of 2472 1576 msedge.exe 86 PID 1576 wrote to memory of 2472 1576 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ec835f8c63cd0d8b6dda3f684220a8b1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdb45046f8,0x7ffdb4504708,0x7ffdb45047182⤵PID:3196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1972,9017464258266765842,941137820295613372,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:22⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1972,9017464258266765842,941137820295613372,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1972,9017464258266765842,941137820295613372,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:2472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,9017464258266765842,941137820295613372,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,9017464258266765842,941137820295613372,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,9017464258266765842,941137820295613372,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4600 /prefetch:12⤵PID:380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1972,9017464258266765842,941137820295613372,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1972,9017464258266765842,941137820295613372,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,9017464258266765842,941137820295613372,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,9017464258266765842,941137820295613372,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,9017464258266765842,941137820295613372,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5792 /prefetch:12⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,9017464258266765842,941137820295613372,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1972,9017464258266765842,941137820295613372,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3884 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1736
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4052
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2204
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f35bb0615bb9816f562b83304e456294
SHA11049e2bd3e1bbb4cea572467d7c4a96648659cb4
SHA25605e80abd624454e5b860a08f40ddf33d672c3fed319aac180b7de5754bc07b71
SHA512db9100f3e324e74a9c58c7d9f50c25eaa4c6c4553c93bab9b80c6f7bef777db04111ebcd679f94015203b240fe9f4f371cae0d4290ec891a4173c746ff4b11c1
-
Filesize
152B
MD51eb86108cb8f5a956fdf48efbd5d06fe
SHA17b2b299f753798e4891df2d9cbf30f94b39ef924
SHA2561b53367e0041d54af89e7dd59733231f5da1393c551ed2b943c89166c0baca40
SHA512e2a661437688a4a01a6eb3b2bd7979ecf96b806f5a487d39354a7f0d44cb693a3b1c2cf6b1247b04e4106cc816105e982569572042bdddb3cd5bec23b4fce29d
-
Filesize
276B
MD563e94862b42530f86676ad4d8dad984d
SHA13fd2230f79711e641c7d8bc1fc8f6d671319aec8
SHA25602bd271fbf1d8f8cfeb229ec24d7bfb1c261116853c2e66a3f5d0b3536f59a25
SHA5128f57ba1d96f3a97a7867f7eb43efd22baea3a78766fd88e87affcbc1e2e1699de833cbe9d78d22fa784ebf9602bd2006ee315ea13aebbcb79b56ec137c7a5aff
-
Filesize
6KB
MD5c5080cfb0868a4d626df94044e05e03f
SHA1c114618490c8c1fd4994ee520397a4a20a2104c2
SHA256026c2a427c7472e34abd98183d147cd7f62ceeb2abc88151af9f976bd4c489c0
SHA5126d77141c9ab0c6c59ecffabacff70777f3c80e342fd02c1be454efa11c28f2229181234402707417affbb5df4985e56b9e14f28e071d3ff2704dcafd0811cab8
-
Filesize
6KB
MD53d8ac559e6906217eb221d8bf9df6a9b
SHA182d0127dbc712145c8f6380811dee4e3aac19f96
SHA2565e4183afbc6dd083f9300e1859c2169f103bf04c4f2a44e64fd78428b53572ce
SHA5125dd1189a9da19fa96109b33361baab6f411457d14b710c735e1aa5e26829ae0a44bac844af8b3c02a45446e024d4e4a20a88b4ac9bc44e61ca3423406b802ffc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54e6e8363213454d658e429001559deb3
SHA158266750b5a18a361e5ff9a810be5331e76af5a0
SHA2561d8b50ea04dac41a7cc2bee9c42a46b21068b64f52fae678a5fd367975a704b2
SHA5125cc1a75c22c7d9211b44a28c256d0bc56ecb724692fbbaaef03246571a339d92f3bb016b51d364a712752efd39e11bf55b0e9fa5c14569693c20fb6acf1e82cd