Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2024, 07:12
Static task
static1
Behavioral task
behavioral1
Sample
f08d2b860169d1c0d8b9f2e5a44a7362_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f08d2b860169d1c0d8b9f2e5a44a7362_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f08d2b860169d1c0d8b9f2e5a44a7362_JaffaCakes118.html
-
Size
9KB
-
MD5
f08d2b860169d1c0d8b9f2e5a44a7362
-
SHA1
67109f35fdfc780cf46565c4660adfef68d8abbd
-
SHA256
cbd90dcef6be25eaf111da8109ae331672c9bff97cb2fcd822053727b984d7fe
-
SHA512
08cac76df48241e08bb4873d933e932b8d7910ea0f2c679c6af1b390c2527ff4b54e6134a55225d9bca4f569a36d5ea1d32246bff8cfc08b847908b2696421ab
-
SSDEEP
192:WhsxnPz6u4PCEZ0CaR1kvcbRZy0cVsOjNtKrGh0+u:fr5i4mvyy0cBjo
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 640 msedge.exe 640 msedge.exe 2520 msedge.exe 2520 msedge.exe 3020 identity_helper.exe 3020 identity_helper.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2116 2520 msedge.exe 85 PID 2520 wrote to memory of 2116 2520 msedge.exe 85 PID 2520 wrote to memory of 2892 2520 msedge.exe 86 PID 2520 wrote to memory of 2892 2520 msedge.exe 86 PID 2520 wrote to memory of 2892 2520 msedge.exe 86 PID 2520 wrote to memory of 2892 2520 msedge.exe 86 PID 2520 wrote to memory of 2892 2520 msedge.exe 86 PID 2520 wrote to memory of 2892 2520 msedge.exe 86 PID 2520 wrote to memory of 2892 2520 msedge.exe 86 PID 2520 wrote to memory of 2892 2520 msedge.exe 86 PID 2520 wrote to memory of 2892 2520 msedge.exe 86 PID 2520 wrote to memory of 2892 2520 msedge.exe 86 PID 2520 wrote to memory of 2892 2520 msedge.exe 86 PID 2520 wrote to memory of 2892 2520 msedge.exe 86 PID 2520 wrote to memory of 2892 2520 msedge.exe 86 PID 2520 wrote to memory of 2892 2520 msedge.exe 86 PID 2520 wrote to memory of 2892 2520 msedge.exe 86 PID 2520 wrote to memory of 2892 2520 msedge.exe 86 PID 2520 wrote to memory of 2892 2520 msedge.exe 86 PID 2520 wrote to memory of 2892 2520 msedge.exe 86 PID 2520 wrote to memory of 2892 2520 msedge.exe 86 PID 2520 wrote to memory of 2892 2520 msedge.exe 86 PID 2520 wrote to memory of 2892 2520 msedge.exe 86 PID 2520 wrote to memory of 2892 2520 msedge.exe 86 PID 2520 wrote to memory of 2892 2520 msedge.exe 86 PID 2520 wrote to memory of 2892 2520 msedge.exe 86 PID 2520 wrote to memory of 2892 2520 msedge.exe 86 PID 2520 wrote to memory of 2892 2520 msedge.exe 86 PID 2520 wrote to memory of 2892 2520 msedge.exe 86 PID 2520 wrote to memory of 2892 2520 msedge.exe 86 PID 2520 wrote to memory of 2892 2520 msedge.exe 86 PID 2520 wrote to memory of 2892 2520 msedge.exe 86 PID 2520 wrote to memory of 2892 2520 msedge.exe 86 PID 2520 wrote to memory of 2892 2520 msedge.exe 86 PID 2520 wrote to memory of 2892 2520 msedge.exe 86 PID 2520 wrote to memory of 2892 2520 msedge.exe 86 PID 2520 wrote to memory of 2892 2520 msedge.exe 86 PID 2520 wrote to memory of 2892 2520 msedge.exe 86 PID 2520 wrote to memory of 2892 2520 msedge.exe 86 PID 2520 wrote to memory of 2892 2520 msedge.exe 86 PID 2520 wrote to memory of 2892 2520 msedge.exe 86 PID 2520 wrote to memory of 2892 2520 msedge.exe 86 PID 2520 wrote to memory of 640 2520 msedge.exe 87 PID 2520 wrote to memory of 640 2520 msedge.exe 87 PID 2520 wrote to memory of 2172 2520 msedge.exe 88 PID 2520 wrote to memory of 2172 2520 msedge.exe 88 PID 2520 wrote to memory of 2172 2520 msedge.exe 88 PID 2520 wrote to memory of 2172 2520 msedge.exe 88 PID 2520 wrote to memory of 2172 2520 msedge.exe 88 PID 2520 wrote to memory of 2172 2520 msedge.exe 88 PID 2520 wrote to memory of 2172 2520 msedge.exe 88 PID 2520 wrote to memory of 2172 2520 msedge.exe 88 PID 2520 wrote to memory of 2172 2520 msedge.exe 88 PID 2520 wrote to memory of 2172 2520 msedge.exe 88 PID 2520 wrote to memory of 2172 2520 msedge.exe 88 PID 2520 wrote to memory of 2172 2520 msedge.exe 88 PID 2520 wrote to memory of 2172 2520 msedge.exe 88 PID 2520 wrote to memory of 2172 2520 msedge.exe 88 PID 2520 wrote to memory of 2172 2520 msedge.exe 88 PID 2520 wrote to memory of 2172 2520 msedge.exe 88 PID 2520 wrote to memory of 2172 2520 msedge.exe 88 PID 2520 wrote to memory of 2172 2520 msedge.exe 88 PID 2520 wrote to memory of 2172 2520 msedge.exe 88 PID 2520 wrote to memory of 2172 2520 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f08d2b860169d1c0d8b9f2e5a44a7362_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffef37346f8,0x7ffef3734708,0x7ffef37347182⤵PID:2116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,5875602832611140486,12357526058245305330,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,5875602832611140486,12357526058245305330,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,5875602832611140486,12357526058245305330,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,5875602832611140486,12357526058245305330,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:2732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,5875602832611140486,12357526058245305330,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:3356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,5875602832611140486,12357526058245305330,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5764 /prefetch:12⤵PID:1776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,5875602832611140486,12357526058245305330,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3652 /prefetch:12⤵PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,5875602832611140486,12357526058245305330,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6084 /prefetch:82⤵PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,5875602832611140486,12357526058245305330,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6084 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,5875602832611140486,12357526058245305330,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4164 /prefetch:12⤵PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,5875602832611140486,12357526058245305330,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:12⤵PID:848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,5875602832611140486,12357526058245305330,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,5875602832611140486,12357526058245305330,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,5875602832611140486,12357526058245305330,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1848 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4476
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1972
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3896
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5cff358b013d6f9f633bc1587f6f54ffa
SHA16cb7852e096be24695ff1bc213abde42d35bb376
SHA25639205cdf989e3a86822b3f473c5fc223d7290b98c2a3fb7f75e366fc8e3ecbe9
SHA5128831c223a1f0cf5f71fa851cdd82f4a9f03e5f267513e05b936756c116997f749ffa563623b4724de921d049de34a8f277cc539f58997cda4d178ea205be2259
-
Filesize
152B
MD5dc629a750e345390344524fe0ea7dcd7
SHA15f9f00a358caaef0321707c4f6f38d52bd7e0399
SHA25638b634f3fedcf2a9dc3280aa76bd1ea93e192200b8a48904664fac5c9944636a
SHA5122a941fe90b748d0326e011258fa9b494dc2f47ac047767455ed16a41d523f04370f818316503a5bad0ff5c5699e92a0aaf3952748b09287c5328354bfa6cc902
-
Filesize
6KB
MD5bd4f98fabe8cd1e0a5c00dd54ba5c034
SHA1003a6261448082eb4103ced133b7381c14321b70
SHA2563ab479b0e431b05986209c876597aa862e324350abdea5f0df6941fda25d9ec4
SHA5129317d7ae93e6528fe92b9980579cb13a7a7b30d0803ffe42ed96b37618e7bb6211658c39eba10846a45e7156d694dfd6d0e562e1b8f5e2677059c888eaa1702e
-
Filesize
6KB
MD55db26abe03a5aa42416bee07677b67b5
SHA119e0c66d25ae18809f78b003f1e84207d181261b
SHA256ec7f18bb206bd3e54c135e2d3855e99f63851bed3222ed9ed1bf00cdae9d9973
SHA512d4ae6017427b8c14bfc8ad91fdf6c032d2f72ba352ae67d612c2f13fb74e537253ba9836c739a1ee7f919585b63948cf68786518bc9e8a2d11e063dcaa88da50
-
Filesize
6KB
MD50622ed5859a26f47c0e71cc01564759b
SHA13b9b687236d5b114ee926b0f4b0377bc53c9ad2a
SHA256c724ab6305d5695899d58952356941cb36c1b57c5300a1ad9f7599122eb0d019
SHA512f6ea69edf4cd682431709137d6be0509cef5f036a96590885a85aa04dd864115a9b2a399956fb710075940f5adc05290066c61ad45039421a7e2c1ae3ccd2699
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58cd13dbf915916415e542a1be4088f64
SHA1cbebd11526fd14267f7371e23c07a75ec0a2a7a7
SHA256c07dae20cecc0d046dae865b14eaff710b344db3138e055908769c9ad6f0a319
SHA512a30da8eb776c34dbb4cd1ec463e27037c3a0bb2825f7610b5f83894e9d71057dde83b6f5ca336a0828ee25a507605412b2c1896aa7aab283920b2d0baf80c778