Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21-04-2024 11:14
Static task
static1
Behavioral task
behavioral1
Sample
ff275ac9601b4cb507f724b3835e1035_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
ff275ac9601b4cb507f724b3835e1035_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
ff275ac9601b4cb507f724b3835e1035_JaffaCakes118.html
-
Size
3.5MB
-
MD5
ff275ac9601b4cb507f724b3835e1035
-
SHA1
1d962eb9ed3240d610e38cc171dc709a4a535eff
-
SHA256
0f6d5e6a912d169b23e5481a3b4547ab16480ebab2da322bf9f802264452e42d
-
SHA512
c37c179f6e87e1db82ff8ea26a1a3dacb431be84c296cfc806579b889c13ec5d0364408e4475ae376635de153f6451a027183c21dcff12ab70f9edd3a59b59f6
-
SSDEEP
12288:jLZhBVKHfVfitmg11tmg1P16bf7axluxOT6Nyi:jvpjte4tT6si
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1732 msedge.exe 1732 msedge.exe 324 msedge.exe 324 msedge.exe 5020 identity_helper.exe 5020 identity_helper.exe 5136 msedge.exe 5136 msedge.exe 5136 msedge.exe 5136 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 324 msedge.exe 324 msedge.exe 324 msedge.exe 324 msedge.exe 324 msedge.exe 324 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 324 msedge.exe 324 msedge.exe 324 msedge.exe 324 msedge.exe 324 msedge.exe 324 msedge.exe 324 msedge.exe 324 msedge.exe 324 msedge.exe 324 msedge.exe 324 msedge.exe 324 msedge.exe 324 msedge.exe 324 msedge.exe 324 msedge.exe 324 msedge.exe 324 msedge.exe 324 msedge.exe 324 msedge.exe 324 msedge.exe 324 msedge.exe 324 msedge.exe 324 msedge.exe 324 msedge.exe 324 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 324 msedge.exe 324 msedge.exe 324 msedge.exe 324 msedge.exe 324 msedge.exe 324 msedge.exe 324 msedge.exe 324 msedge.exe 324 msedge.exe 324 msedge.exe 324 msedge.exe 324 msedge.exe 324 msedge.exe 324 msedge.exe 324 msedge.exe 324 msedge.exe 324 msedge.exe 324 msedge.exe 324 msedge.exe 324 msedge.exe 324 msedge.exe 324 msedge.exe 324 msedge.exe 324 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 324 wrote to memory of 4584 324 msedge.exe 87 PID 324 wrote to memory of 4584 324 msedge.exe 87 PID 324 wrote to memory of 5104 324 msedge.exe 88 PID 324 wrote to memory of 5104 324 msedge.exe 88 PID 324 wrote to memory of 5104 324 msedge.exe 88 PID 324 wrote to memory of 5104 324 msedge.exe 88 PID 324 wrote to memory of 5104 324 msedge.exe 88 PID 324 wrote to memory of 5104 324 msedge.exe 88 PID 324 wrote to memory of 5104 324 msedge.exe 88 PID 324 wrote to memory of 5104 324 msedge.exe 88 PID 324 wrote to memory of 5104 324 msedge.exe 88 PID 324 wrote to memory of 5104 324 msedge.exe 88 PID 324 wrote to memory of 5104 324 msedge.exe 88 PID 324 wrote to memory of 5104 324 msedge.exe 88 PID 324 wrote to memory of 5104 324 msedge.exe 88 PID 324 wrote to memory of 5104 324 msedge.exe 88 PID 324 wrote to memory of 5104 324 msedge.exe 88 PID 324 wrote to memory of 5104 324 msedge.exe 88 PID 324 wrote to memory of 5104 324 msedge.exe 88 PID 324 wrote to memory of 5104 324 msedge.exe 88 PID 324 wrote to memory of 5104 324 msedge.exe 88 PID 324 wrote to memory of 5104 324 msedge.exe 88 PID 324 wrote to memory of 5104 324 msedge.exe 88 PID 324 wrote to memory of 5104 324 msedge.exe 88 PID 324 wrote to memory of 5104 324 msedge.exe 88 PID 324 wrote to memory of 5104 324 msedge.exe 88 PID 324 wrote to memory of 5104 324 msedge.exe 88 PID 324 wrote to memory of 5104 324 msedge.exe 88 PID 324 wrote to memory of 5104 324 msedge.exe 88 PID 324 wrote to memory of 5104 324 msedge.exe 88 PID 324 wrote to memory of 5104 324 msedge.exe 88 PID 324 wrote to memory of 5104 324 msedge.exe 88 PID 324 wrote to memory of 5104 324 msedge.exe 88 PID 324 wrote to memory of 5104 324 msedge.exe 88 PID 324 wrote to memory of 5104 324 msedge.exe 88 PID 324 wrote to memory of 5104 324 msedge.exe 88 PID 324 wrote to memory of 5104 324 msedge.exe 88 PID 324 wrote to memory of 5104 324 msedge.exe 88 PID 324 wrote to memory of 5104 324 msedge.exe 88 PID 324 wrote to memory of 5104 324 msedge.exe 88 PID 324 wrote to memory of 5104 324 msedge.exe 88 PID 324 wrote to memory of 5104 324 msedge.exe 88 PID 324 wrote to memory of 1732 324 msedge.exe 89 PID 324 wrote to memory of 1732 324 msedge.exe 89 PID 324 wrote to memory of 4768 324 msedge.exe 90 PID 324 wrote to memory of 4768 324 msedge.exe 90 PID 324 wrote to memory of 4768 324 msedge.exe 90 PID 324 wrote to memory of 4768 324 msedge.exe 90 PID 324 wrote to memory of 4768 324 msedge.exe 90 PID 324 wrote to memory of 4768 324 msedge.exe 90 PID 324 wrote to memory of 4768 324 msedge.exe 90 PID 324 wrote to memory of 4768 324 msedge.exe 90 PID 324 wrote to memory of 4768 324 msedge.exe 90 PID 324 wrote to memory of 4768 324 msedge.exe 90 PID 324 wrote to memory of 4768 324 msedge.exe 90 PID 324 wrote to memory of 4768 324 msedge.exe 90 PID 324 wrote to memory of 4768 324 msedge.exe 90 PID 324 wrote to memory of 4768 324 msedge.exe 90 PID 324 wrote to memory of 4768 324 msedge.exe 90 PID 324 wrote to memory of 4768 324 msedge.exe 90 PID 324 wrote to memory of 4768 324 msedge.exe 90 PID 324 wrote to memory of 4768 324 msedge.exe 90 PID 324 wrote to memory of 4768 324 msedge.exe 90 PID 324 wrote to memory of 4768 324 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ff275ac9601b4cb507f724b3835e1035_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffc04346f8,0x7fffc0434708,0x7fffc04347182⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,8208236304754229963,40906244108326501,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,8208236304754229963,40906244108326501,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,8208236304754229963,40906244108326501,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8208236304754229963,40906244108326501,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:2192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8208236304754229963,40906244108326501,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,8208236304754229963,40906244108326501,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5548 /prefetch:82⤵PID:2804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,8208236304754229963,40906244108326501,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5548 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8208236304754229963,40906244108326501,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:12⤵PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8208236304754229963,40906244108326501,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:12⤵PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8208236304754229963,40906244108326501,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8208236304754229963,40906244108326501,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5912 /prefetch:12⤵PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,8208236304754229963,40906244108326501,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1768 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5136
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4884
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57b56675b54840d86d49bde5a1ff8af6a
SHA1fe70a1b85f88d60f3ba9fc7bb5f81fc41e150811
SHA25686af7213f410df65d0937f4331f783160f30eaeb088e28a9eef461713b9a3929
SHA51211fc61b83365391efee8084de5c2af7e064f0182b943a0db08d95a0f450d3877bde5b5e6a6b9f008e58b709bb1a34f7b50085c41927f091df1eea78f039402e9
-
Filesize
152B
MD548cff1baabb24706967de3b0d6869906
SHA1b0cd54f587cd4c88e60556347930cb76991e6734
SHA256f6b5fbc610a71b3914753feb2bd4475a7c77d0d785cc36255bf93b3fe3ccb775
SHA512fd0c848f3f9de81aca81af999262f96ea4c1cd1d1f32d304f56c7382f3b1bb604e5fbe9f209ad6e4b38988d92357ef82e9668806d0727f2856c7dc1f07aae2b6
-
Filesize
981B
MD5dbe05f8c061049b0f628eaddbf8a2ae7
SHA16e9557ca7b4aabc126e53f0b6c940ca0bbbf5c47
SHA2560584bb9eaf53afff7189d05d8c43d9047a961c66a3f6b8ba3c8cff47b1d10450
SHA5127e33175a993a600e515b5acb513d38914f55aec7b66ee875614809aa7a0c029310bb97c5e12738bf7c48dddaf871df8f585b9531edb678f0e5c3d7a8be61bdbe
-
Filesize
6KB
MD5b7bcc98af801b131c27b69e1e1e50802
SHA1e301e347bf7dcbdc1526695817df0d91ecd8b361
SHA256f4e54ef8ab57531fe5ccecb50bdc54422b4e22ab6c74a7aca0f92676835d4426
SHA512e6c0ce950a9d61ffd44d32661054f6557c6a04c371ee6a1ce8e8720c8796a0fd83076f36ce2b7a0472d964b8757ceb4bc6c7739604db0e93d1b49243ffbef415
-
Filesize
6KB
MD5ae6784bc8fceac7fc1f02d4d0d3dbe59
SHA17466e3a294de17f0685d06a3d081ea1fbffabafc
SHA25600c0782eca269908c18abec409c5b917e0cb9eedbbbe6277195aa335176d2a63
SHA512438e2d0f49fa15de98fee06887d973c9c4077382099fdda2ea5c41f3bbb02ff3d0779306a38546f47c357bd12d00b738b2d20a0292c23d9cb276dda99fd0e29b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54993aa9594a9543903c152e1e4ebe80c
SHA1b3078fb4816e15b254c969fd74bb6485da41b00f
SHA256074ede61809f36b0acd2110c9256eb3f246d5e5266705fee5a318b7790127356
SHA512dabbdbac71e827a88c9a84b6aa8db5ca2b01d8c54efd59a947a6640d3c0ea5aabcf0149ffbb075326210154e312a3daae35083ed12577b7c0cdc15a04aa3ea42