Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2024, 10:59
Static task
static1
Behavioral task
behavioral1
Sample
ff2083ea296fac63480e39fc534d4f0e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ff2083ea296fac63480e39fc534d4f0e_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
ff2083ea296fac63480e39fc534d4f0e_JaffaCakes118.html
-
Size
28KB
-
MD5
ff2083ea296fac63480e39fc534d4f0e
-
SHA1
bcb4efe8128ef4699543a08ba6e6f4ac8a204c12
-
SHA256
5496d53089a9e4ec71bc9a17d7a88be85a398b730cc1259d74dd2d74f1e67651
-
SHA512
3ecedc08e0dc9145d71e247bfd440e8f37d8aa45faea55723d38911934a26ea3384708781ac1b0706b7284dad0b249278b834ac4efe8aa089268a0dc3b5b827a
-
SSDEEP
384:dOEZAWbxnT0EipB0Jx4zujodlAhh1IP9PWPtPOt6AJIF36rbDASxlbXiQLgu3kb:dPT0EipBkxRod2h4VWFOtsWDI
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1592 msedge.exe 1592 msedge.exe 4716 msedge.exe 4716 msedge.exe 5956 identity_helper.exe 5956 identity_helper.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4716 wrote to memory of 512 4716 msedge.exe 86 PID 4716 wrote to memory of 512 4716 msedge.exe 86 PID 4716 wrote to memory of 4480 4716 msedge.exe 87 PID 4716 wrote to memory of 4480 4716 msedge.exe 87 PID 4716 wrote to memory of 4480 4716 msedge.exe 87 PID 4716 wrote to memory of 4480 4716 msedge.exe 87 PID 4716 wrote to memory of 4480 4716 msedge.exe 87 PID 4716 wrote to memory of 4480 4716 msedge.exe 87 PID 4716 wrote to memory of 4480 4716 msedge.exe 87 PID 4716 wrote to memory of 4480 4716 msedge.exe 87 PID 4716 wrote to memory of 4480 4716 msedge.exe 87 PID 4716 wrote to memory of 4480 4716 msedge.exe 87 PID 4716 wrote to memory of 4480 4716 msedge.exe 87 PID 4716 wrote to memory of 4480 4716 msedge.exe 87 PID 4716 wrote to memory of 4480 4716 msedge.exe 87 PID 4716 wrote to memory of 4480 4716 msedge.exe 87 PID 4716 wrote to memory of 4480 4716 msedge.exe 87 PID 4716 wrote to memory of 4480 4716 msedge.exe 87 PID 4716 wrote to memory of 4480 4716 msedge.exe 87 PID 4716 wrote to memory of 4480 4716 msedge.exe 87 PID 4716 wrote to memory of 4480 4716 msedge.exe 87 PID 4716 wrote to memory of 4480 4716 msedge.exe 87 PID 4716 wrote to memory of 4480 4716 msedge.exe 87 PID 4716 wrote to memory of 4480 4716 msedge.exe 87 PID 4716 wrote to memory of 4480 4716 msedge.exe 87 PID 4716 wrote to memory of 4480 4716 msedge.exe 87 PID 4716 wrote to memory of 4480 4716 msedge.exe 87 PID 4716 wrote to memory of 4480 4716 msedge.exe 87 PID 4716 wrote to memory of 4480 4716 msedge.exe 87 PID 4716 wrote to memory of 4480 4716 msedge.exe 87 PID 4716 wrote to memory of 4480 4716 msedge.exe 87 PID 4716 wrote to memory of 4480 4716 msedge.exe 87 PID 4716 wrote to memory of 4480 4716 msedge.exe 87 PID 4716 wrote to memory of 4480 4716 msedge.exe 87 PID 4716 wrote to memory of 4480 4716 msedge.exe 87 PID 4716 wrote to memory of 4480 4716 msedge.exe 87 PID 4716 wrote to memory of 4480 4716 msedge.exe 87 PID 4716 wrote to memory of 4480 4716 msedge.exe 87 PID 4716 wrote to memory of 4480 4716 msedge.exe 87 PID 4716 wrote to memory of 4480 4716 msedge.exe 87 PID 4716 wrote to memory of 4480 4716 msedge.exe 87 PID 4716 wrote to memory of 4480 4716 msedge.exe 87 PID 4716 wrote to memory of 1592 4716 msedge.exe 88 PID 4716 wrote to memory of 1592 4716 msedge.exe 88 PID 4716 wrote to memory of 4452 4716 msedge.exe 89 PID 4716 wrote to memory of 4452 4716 msedge.exe 89 PID 4716 wrote to memory of 4452 4716 msedge.exe 89 PID 4716 wrote to memory of 4452 4716 msedge.exe 89 PID 4716 wrote to memory of 4452 4716 msedge.exe 89 PID 4716 wrote to memory of 4452 4716 msedge.exe 89 PID 4716 wrote to memory of 4452 4716 msedge.exe 89 PID 4716 wrote to memory of 4452 4716 msedge.exe 89 PID 4716 wrote to memory of 4452 4716 msedge.exe 89 PID 4716 wrote to memory of 4452 4716 msedge.exe 89 PID 4716 wrote to memory of 4452 4716 msedge.exe 89 PID 4716 wrote to memory of 4452 4716 msedge.exe 89 PID 4716 wrote to memory of 4452 4716 msedge.exe 89 PID 4716 wrote to memory of 4452 4716 msedge.exe 89 PID 4716 wrote to memory of 4452 4716 msedge.exe 89 PID 4716 wrote to memory of 4452 4716 msedge.exe 89 PID 4716 wrote to memory of 4452 4716 msedge.exe 89 PID 4716 wrote to memory of 4452 4716 msedge.exe 89 PID 4716 wrote to memory of 4452 4716 msedge.exe 89 PID 4716 wrote to memory of 4452 4716 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ff2083ea296fac63480e39fc534d4f0e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff80d6b46f8,0x7ff80d6b4708,0x7ff80d6b47182⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,16737537457741213462,12712622216109917494,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,16737537457741213462,12712622216109917494,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,16737537457741213462,12712622216109917494,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16737537457741213462,12712622216109917494,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16737537457741213462,12712622216109917494,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16737537457741213462,12712622216109917494,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4624 /prefetch:12⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16737537457741213462,12712622216109917494,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16737537457741213462,12712622216109917494,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:3196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,16737537457741213462,12712622216109917494,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5936 /prefetch:82⤵PID:5824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,16737537457741213462,12712622216109917494,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5936 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16737537457741213462,12712622216109917494,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:12⤵PID:5968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16737537457741213462,12712622216109917494,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5764 /prefetch:12⤵PID:5980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16737537457741213462,12712622216109917494,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4076 /prefetch:12⤵PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16737537457741213462,12712622216109917494,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3528 /prefetch:12⤵PID:2776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,16737537457741213462,12712622216109917494,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5324 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3408
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2312
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e36b219dcae7d32ec82cec3245512f80
SHA16b2bd46e4f6628d66f7ec4b5c399b8c9115a9466
SHA25616bc6f47bbfbd4e54c3163dafe784486b72d0b78e6ea3593122edb338448a27b
SHA512fc539c461d87141a180cf71bb6a636c75517e5e7226e76b71fd64e834dcacc88fcaaa92a9a00999bc0afc4fb93b7304b068000f14653c05ff03dd7baef3f225c
-
Filesize
152B
MD5559ff144c30d6a7102ec298fb7c261c4
SHA1badecb08f9a6c849ce5b30c348156b45ac9120b9
SHA2565444032cb994b90287c0262f2fba16f38e339073fd89aa3ab2592dfebc3e6f10
SHA5123a45661fc29e312aa643a12447bffdab83128fe5124077a870090081af6aaa4cf0bd021889ab1df5cd40f44adb055b1394b31313515c2929f714824c89fd0f04
-
Filesize
394B
MD5add0ef610d46f08de199fa94b8305ca1
SHA1f94b9869cc4f7d4f698ecb70fe4ba5ab056d69f2
SHA256b78e21aaeb5fae95bbd9b6285dd9b3564d880dde00dcbaa459aae337627381a0
SHA51273ccba20ec846b4082682482a7f45d6cba08496261f193a9981ccf43d46d0a78a9ffa873ca501017d8d5ba28a75adc7f23d38bbf23d60e862d1f2cc8d1b882ac
-
Filesize
6KB
MD53df20d83d410b01992dc9c34f10e6956
SHA13e696cb4b8dc485f4a029b72010c1756e48442cd
SHA256a78a8489486c2d3b399b7b8c3db53fc47870bdda06df6aa11d23993d70c721b4
SHA512bf56e35e064df580fa0cddd7c179c2fb49e4b808a52a848ce5a997259f651473504a5d06c987902b32811232c49c4cde62d0726be4cc2b606e691ac4b318a67b
-
Filesize
6KB
MD5d00058f026e77597f6beaac5318a1d92
SHA15313a0d192dd5d11e2d2aecd37a7478bdb9e49db
SHA256444f4430490055644298e9a3bfb1c71dc068ce95f8d4b4f82c00023930eddeca
SHA512050e711e4c0b0575bcb034b2788a9ccf6e9cfe2971fb0fea89390418f392b84e22a132b281c6d6fb121859f70672fce14a87211c621b088d2afdd94957768b76
-
Filesize
6KB
MD5d31659730d78c6f92f21d871dc5d9aae
SHA1e9322a3c71a79db528476d98b3034b54bc6cf680
SHA25692508cf446bac155d3d93e273564400ea2fe033ed256636db1a68a553df0edfc
SHA512be1a7e19f7c37744cb13aad775844e15831682bbb5b3ec1bedf8ed37443504ae5e67cbe934036f82235348b6c881faf71b55b3f48ce4053d4b9e362edadc5c2b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54e5c1436de2a8143ec3d3437a09016a4
SHA1610e67a2a903407611a558a66a56722795235462
SHA2567f5d1e9030d16daa861245e58132d9c0f0e6798170663ec57cd562130973d26a
SHA51284c6d1eebff8c90a097d642c04af5e470b7f126d344e471663038b27c4f867c1f13fdc86f8841e74c4da4d0a8f3a7d09c3ade11a27cd26ac1eb3bafa56e6cbba