Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2024, 13:36
Static task
static1
Behavioral task
behavioral1
Sample
f12dbd92ed3f287b4e85d7fe8973339e_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f12dbd92ed3f287b4e85d7fe8973339e_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f12dbd92ed3f287b4e85d7fe8973339e_JaffaCakes118.html
-
Size
44KB
-
MD5
f12dbd92ed3f287b4e85d7fe8973339e
-
SHA1
803e62131ab862c28f1cc2811f37d36be2156e4a
-
SHA256
451e925a74a5548ea1dcd9730b79babce7ca218542e96fc8e1c3ec2d759b86f2
-
SHA512
3772a826805be26baf06e8d7e7e9a8415a889ddba7393b5019533786695842be5fe5a0bf2ea84e0d468027e0ab8dfb8c9313496082252294ba9a354800fd458c
-
SSDEEP
768:mwS0l/sGVLsk8ejW4mTNn2oVtelgBSJL4eUxk:mZJt3telgBA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4908 msedge.exe 4908 msedge.exe 2472 msedge.exe 2472 msedge.exe 372 identity_helper.exe 372 identity_helper.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2472 wrote to memory of 4444 2472 msedge.exe 85 PID 2472 wrote to memory of 4444 2472 msedge.exe 85 PID 2472 wrote to memory of 5004 2472 msedge.exe 86 PID 2472 wrote to memory of 5004 2472 msedge.exe 86 PID 2472 wrote to memory of 5004 2472 msedge.exe 86 PID 2472 wrote to memory of 5004 2472 msedge.exe 86 PID 2472 wrote to memory of 5004 2472 msedge.exe 86 PID 2472 wrote to memory of 5004 2472 msedge.exe 86 PID 2472 wrote to memory of 5004 2472 msedge.exe 86 PID 2472 wrote to memory of 5004 2472 msedge.exe 86 PID 2472 wrote to memory of 5004 2472 msedge.exe 86 PID 2472 wrote to memory of 5004 2472 msedge.exe 86 PID 2472 wrote to memory of 5004 2472 msedge.exe 86 PID 2472 wrote to memory of 5004 2472 msedge.exe 86 PID 2472 wrote to memory of 5004 2472 msedge.exe 86 PID 2472 wrote to memory of 5004 2472 msedge.exe 86 PID 2472 wrote to memory of 5004 2472 msedge.exe 86 PID 2472 wrote to memory of 5004 2472 msedge.exe 86 PID 2472 wrote to memory of 5004 2472 msedge.exe 86 PID 2472 wrote to memory of 5004 2472 msedge.exe 86 PID 2472 wrote to memory of 5004 2472 msedge.exe 86 PID 2472 wrote to memory of 5004 2472 msedge.exe 86 PID 2472 wrote to memory of 5004 2472 msedge.exe 86 PID 2472 wrote to memory of 5004 2472 msedge.exe 86 PID 2472 wrote to memory of 5004 2472 msedge.exe 86 PID 2472 wrote to memory of 5004 2472 msedge.exe 86 PID 2472 wrote to memory of 5004 2472 msedge.exe 86 PID 2472 wrote to memory of 5004 2472 msedge.exe 86 PID 2472 wrote to memory of 5004 2472 msedge.exe 86 PID 2472 wrote to memory of 5004 2472 msedge.exe 86 PID 2472 wrote to memory of 5004 2472 msedge.exe 86 PID 2472 wrote to memory of 5004 2472 msedge.exe 86 PID 2472 wrote to memory of 5004 2472 msedge.exe 86 PID 2472 wrote to memory of 5004 2472 msedge.exe 86 PID 2472 wrote to memory of 5004 2472 msedge.exe 86 PID 2472 wrote to memory of 5004 2472 msedge.exe 86 PID 2472 wrote to memory of 5004 2472 msedge.exe 86 PID 2472 wrote to memory of 5004 2472 msedge.exe 86 PID 2472 wrote to memory of 5004 2472 msedge.exe 86 PID 2472 wrote to memory of 5004 2472 msedge.exe 86 PID 2472 wrote to memory of 5004 2472 msedge.exe 86 PID 2472 wrote to memory of 5004 2472 msedge.exe 86 PID 2472 wrote to memory of 4908 2472 msedge.exe 87 PID 2472 wrote to memory of 4908 2472 msedge.exe 87 PID 2472 wrote to memory of 2468 2472 msedge.exe 88 PID 2472 wrote to memory of 2468 2472 msedge.exe 88 PID 2472 wrote to memory of 2468 2472 msedge.exe 88 PID 2472 wrote to memory of 2468 2472 msedge.exe 88 PID 2472 wrote to memory of 2468 2472 msedge.exe 88 PID 2472 wrote to memory of 2468 2472 msedge.exe 88 PID 2472 wrote to memory of 2468 2472 msedge.exe 88 PID 2472 wrote to memory of 2468 2472 msedge.exe 88 PID 2472 wrote to memory of 2468 2472 msedge.exe 88 PID 2472 wrote to memory of 2468 2472 msedge.exe 88 PID 2472 wrote to memory of 2468 2472 msedge.exe 88 PID 2472 wrote to memory of 2468 2472 msedge.exe 88 PID 2472 wrote to memory of 2468 2472 msedge.exe 88 PID 2472 wrote to memory of 2468 2472 msedge.exe 88 PID 2472 wrote to memory of 2468 2472 msedge.exe 88 PID 2472 wrote to memory of 2468 2472 msedge.exe 88 PID 2472 wrote to memory of 2468 2472 msedge.exe 88 PID 2472 wrote to memory of 2468 2472 msedge.exe 88 PID 2472 wrote to memory of 2468 2472 msedge.exe 88 PID 2472 wrote to memory of 2468 2472 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f12dbd92ed3f287b4e85d7fe8973339e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff4f9d46f8,0x7fff4f9d4708,0x7fff4f9d47182⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,10347511458863683465,5099710673681873991,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,10347511458863683465,5099710673681873991,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,10347511458863683465,5099710673681873991,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,10347511458863683465,5099710673681873991,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,10347511458863683465,5099710673681873991,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,10347511458863683465,5099710673681873991,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4236 /prefetch:12⤵PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,10347511458863683465,5099710673681873991,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 /prefetch:82⤵PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,10347511458863683465,5099710673681873991,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,10347511458863683465,5099710673681873991,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5928 /prefetch:12⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,10347511458863683465,5099710673681873991,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5916 /prefetch:12⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,10347511458863683465,5099710673681873991,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,10347511458863683465,5099710673681873991,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:12⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,10347511458863683465,5099710673681873991,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3604 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:620
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2896
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2156
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e36b219dcae7d32ec82cec3245512f80
SHA16b2bd46e4f6628d66f7ec4b5c399b8c9115a9466
SHA25616bc6f47bbfbd4e54c3163dafe784486b72d0b78e6ea3593122edb338448a27b
SHA512fc539c461d87141a180cf71bb6a636c75517e5e7226e76b71fd64e834dcacc88fcaaa92a9a00999bc0afc4fb93b7304b068000f14653c05ff03dd7baef3f225c
-
Filesize
152B
MD5559ff144c30d6a7102ec298fb7c261c4
SHA1badecb08f9a6c849ce5b30c348156b45ac9120b9
SHA2565444032cb994b90287c0262f2fba16f38e339073fd89aa3ab2592dfebc3e6f10
SHA5123a45661fc29e312aa643a12447bffdab83128fe5124077a870090081af6aaa4cf0bd021889ab1df5cd40f44adb055b1394b31313515c2929f714824c89fd0f04
-
Filesize
6KB
MD54192f5c852f2da09d2b186b63a204e32
SHA1240c7ceb6ce95e0ba48cbb0e387690fd59837b19
SHA25691786eae6be09c4dfc0879b6f0d8f65dc96060d422becb381407bd93ad275942
SHA5121a204f485a918f5a85a4ad7d1057ac4c1cc0098ff3d64331d4f304b245f7d80de3ac7138d4123d3a85a87e582eee5d088b03c3f5ac31afdac90e69db9e2718b9
-
Filesize
6KB
MD5ae65284868fe9319bf80b78355834390
SHA1dc245ce237d30df8b77ede04231b0e2b69a0e326
SHA256eccc91e155979ac054e85ac2f3ae7d2a65b3fa805fe9e633455c4286d73a4b27
SHA5125e486f3934206320a067b8a8a3443d66c04ec52433a4b0c693aef932a6730efb179e07beaf7ab4f6d6783c7ff2b39a0e270b8703da6fb2775434f47e31548fbf
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a7fb9b96fe21e49e3f54ef6f9a6d3826
SHA160165885f67699ad6a519a089c0a3d550fffd540
SHA2569719155ae4e988474ecd85c92d15a818ba0d14691585280c78c3de4587db9c72
SHA512380acce14f72f72f5bfd649837c2c29d79bbb4af1b24cef7d7451323c65d91e091d5566e1b29ae857713053ee947ae47d7c422c2f41c1bcad1740f5681ffda87