Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16/04/2024, 05:19
Static task
static1
Behavioral task
behavioral1
Sample
f2c59f7620f5acea594f256574d1d77c_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
f2c59f7620f5acea594f256574d1d77c_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f2c59f7620f5acea594f256574d1d77c_JaffaCakes118.html
-
Size
14KB
-
MD5
f2c59f7620f5acea594f256574d1d77c
-
SHA1
59ee11106a29da4d156cea52749cd945e8f9277c
-
SHA256
e5a31d20d17ea1bd9e18107370a9693177c535e589900bcceab35513a9a1c0b3
-
SHA512
49c9a5a723a8edb19e6489701c3db6311b52788408d5664e9cfefbe448f14ac1c990370e01a0391f22487bd73f86a9673a39a6a74fde40d2d0bd642bc839c691
-
SSDEEP
192:+yEioELD/ZmXg8oWllefMJkZQ3wf1vkmlKt6DvE:aioWD/ZmXg8SZQ9mlXrE
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4804 msedge.exe 4804 msedge.exe 5044 msedge.exe 5044 msedge.exe 4628 identity_helper.exe 4628 identity_helper.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5044 wrote to memory of 4068 5044 msedge.exe 84 PID 5044 wrote to memory of 4068 5044 msedge.exe 84 PID 5044 wrote to memory of 4792 5044 msedge.exe 85 PID 5044 wrote to memory of 4792 5044 msedge.exe 85 PID 5044 wrote to memory of 4792 5044 msedge.exe 85 PID 5044 wrote to memory of 4792 5044 msedge.exe 85 PID 5044 wrote to memory of 4792 5044 msedge.exe 85 PID 5044 wrote to memory of 4792 5044 msedge.exe 85 PID 5044 wrote to memory of 4792 5044 msedge.exe 85 PID 5044 wrote to memory of 4792 5044 msedge.exe 85 PID 5044 wrote to memory of 4792 5044 msedge.exe 85 PID 5044 wrote to memory of 4792 5044 msedge.exe 85 PID 5044 wrote to memory of 4792 5044 msedge.exe 85 PID 5044 wrote to memory of 4792 5044 msedge.exe 85 PID 5044 wrote to memory of 4792 5044 msedge.exe 85 PID 5044 wrote to memory of 4792 5044 msedge.exe 85 PID 5044 wrote to memory of 4792 5044 msedge.exe 85 PID 5044 wrote to memory of 4792 5044 msedge.exe 85 PID 5044 wrote to memory of 4792 5044 msedge.exe 85 PID 5044 wrote to memory of 4792 5044 msedge.exe 85 PID 5044 wrote to memory of 4792 5044 msedge.exe 85 PID 5044 wrote to memory of 4792 5044 msedge.exe 85 PID 5044 wrote to memory of 4792 5044 msedge.exe 85 PID 5044 wrote to memory of 4792 5044 msedge.exe 85 PID 5044 wrote to memory of 4792 5044 msedge.exe 85 PID 5044 wrote to memory of 4792 5044 msedge.exe 85 PID 5044 wrote to memory of 4792 5044 msedge.exe 85 PID 5044 wrote to memory of 4792 5044 msedge.exe 85 PID 5044 wrote to memory of 4792 5044 msedge.exe 85 PID 5044 wrote to memory of 4792 5044 msedge.exe 85 PID 5044 wrote to memory of 4792 5044 msedge.exe 85 PID 5044 wrote to memory of 4792 5044 msedge.exe 85 PID 5044 wrote to memory of 4792 5044 msedge.exe 85 PID 5044 wrote to memory of 4792 5044 msedge.exe 85 PID 5044 wrote to memory of 4792 5044 msedge.exe 85 PID 5044 wrote to memory of 4792 5044 msedge.exe 85 PID 5044 wrote to memory of 4792 5044 msedge.exe 85 PID 5044 wrote to memory of 4792 5044 msedge.exe 85 PID 5044 wrote to memory of 4792 5044 msedge.exe 85 PID 5044 wrote to memory of 4792 5044 msedge.exe 85 PID 5044 wrote to memory of 4792 5044 msedge.exe 85 PID 5044 wrote to memory of 4792 5044 msedge.exe 85 PID 5044 wrote to memory of 4804 5044 msedge.exe 86 PID 5044 wrote to memory of 4804 5044 msedge.exe 86 PID 5044 wrote to memory of 3868 5044 msedge.exe 87 PID 5044 wrote to memory of 3868 5044 msedge.exe 87 PID 5044 wrote to memory of 3868 5044 msedge.exe 87 PID 5044 wrote to memory of 3868 5044 msedge.exe 87 PID 5044 wrote to memory of 3868 5044 msedge.exe 87 PID 5044 wrote to memory of 3868 5044 msedge.exe 87 PID 5044 wrote to memory of 3868 5044 msedge.exe 87 PID 5044 wrote to memory of 3868 5044 msedge.exe 87 PID 5044 wrote to memory of 3868 5044 msedge.exe 87 PID 5044 wrote to memory of 3868 5044 msedge.exe 87 PID 5044 wrote to memory of 3868 5044 msedge.exe 87 PID 5044 wrote to memory of 3868 5044 msedge.exe 87 PID 5044 wrote to memory of 3868 5044 msedge.exe 87 PID 5044 wrote to memory of 3868 5044 msedge.exe 87 PID 5044 wrote to memory of 3868 5044 msedge.exe 87 PID 5044 wrote to memory of 3868 5044 msedge.exe 87 PID 5044 wrote to memory of 3868 5044 msedge.exe 87 PID 5044 wrote to memory of 3868 5044 msedge.exe 87 PID 5044 wrote to memory of 3868 5044 msedge.exe 87 PID 5044 wrote to memory of 3868 5044 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f2c59f7620f5acea594f256574d1d77c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffac73846f8,0x7ffac7384708,0x7ffac73847182⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,17398716220000174048,5746252255017100832,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,17398716220000174048,5746252255017100832,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,17398716220000174048,5746252255017100832,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17398716220000174048,5746252255017100832,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17398716220000174048,5746252255017100832,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,17398716220000174048,5746252255017100832,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 /prefetch:82⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,17398716220000174048,5746252255017100832,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17398716220000174048,5746252255017100832,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17398716220000174048,5746252255017100832,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17398716220000174048,5746252255017100832,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:3380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17398716220000174048,5746252255017100832,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,17398716220000174048,5746252255017100832,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4840 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2768
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4148
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:556
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5120a75f233314ba1fe34e9d6c09f30b9
SHA1a9f92f2d3f111eaadd9bcf8fceb3c9553753539c
SHA256e04101215c3534dbc77c0b5df2e1d1ff74c277d2946f391f939c9a7948a22dd0
SHA5123c4eb93e425b50e8bcc1712f4cc2be11888a0273c3a619fc6bf72ccab876a427158f661bfc80d0c1e47ef4116febf76a3aaa31a60ec662eae0e51c7f1d3d89b3
-
Filesize
152B
MD5bc2edd0741d97ae237e9f00bf3244144
SHA17c1e5d324f5c7137a3c4ec85146659f026c11782
SHA256dbce3287c7ae69ccbd1d780c39f3ffa3c98bd4609a939fff8ee9c99f14265041
SHA51200f505a0b4ea0df626175bf9d39a205f18f9754b62e4dba6fbb5b4a716b3539e7809723e1596bcfe1ba3041e22342e3a9cbaad88e84ce9c8c6531331bbc25093
-
Filesize
6KB
MD52339034c3178463fd5e7a10ad932e5c1
SHA19c05a6a4bc0632ef58f16d28cff693ea8acb3829
SHA256753c264711c519fc5b9cb7fea31e19d77d6df486ba19b687785426752976c0db
SHA5128108779d21d99b1e873fd1b47fa5d3e7850f7d9372ba487d7dca8c822ee8e718d102a98cbd9d704af742aad8302f8d2f675927264ff72fafbdd7448619ac86d9
-
Filesize
6KB
MD5977cc87855ea4031f1937f08c9b65a7a
SHA1b671ad2ba535f36f544ed079b4cb3d51adf41d16
SHA25609cf014b5195aef0c4a7dbd11235662248d3e14f2f01ff8a5564440b166df944
SHA51224ad8762e6bafe8d69ab4929fa09352c161b00d3e2ca789013b85ae1290736a9a6581f8b5e4917d2e5d347d93d7100c8669d0a241e62345ad9fb20027bede4cb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD594c28aad37da87214d02c0e6843b961d
SHA1867b763f1a0982ebebe54eba62c8e81ceb29758c
SHA256850aee17c218f55176e0044aadf63373193b8ccfe3d962dceddc525dfc21b928
SHA512c002c214b3f814fe51956df4218639acaa9f1e19eeda42a0c71460b34c1ae87a6e0e0a437064ba0b612210906145232c4adab8198ba0332b376fb958540a8003