Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21-04-2024 11:46
Static task
static1
Behavioral task
behavioral1
Sample
ff34983a02bb4fa2d6893ecf40b405f6_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ff34983a02bb4fa2d6893ecf40b405f6_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
ff34983a02bb4fa2d6893ecf40b405f6_JaffaCakes118.html
-
Size
21KB
-
MD5
ff34983a02bb4fa2d6893ecf40b405f6
-
SHA1
b893411910d81619f025f9e237991fda690827de
-
SHA256
29fab8469c59bb4b7b18c78285f28e5eb089c8acbdf30fa7228a9211c4c8b8da
-
SHA512
41beb968a7c7a781a1a6dbb4fda7468bef81a7f0f5191b186c53a96d3582f2fee9be19fe5cafa0f5e2b4fc17e59b85d885513f59ca20047e5e79da8a6d6e2c24
-
SSDEEP
384:pM8cC6t9lR/uEKWGBGqkFFtHwDTDmBKAoXu9+ObI+uZ80pzcSpjLJ5RVIMxu5YYl:p/at9lR/UDmFtHwDTaaXmnu20pzcSpjC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3124 msedge.exe 3124 msedge.exe 5092 msedge.exe 5092 msedge.exe 4180 identity_helper.exe 4180 identity_helper.exe 5256 msedge.exe 5256 msedge.exe 5256 msedge.exe 5256 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3124 wrote to memory of 4032 3124 msedge.exe 85 PID 3124 wrote to memory of 4032 3124 msedge.exe 85 PID 3124 wrote to memory of 5084 3124 msedge.exe 86 PID 3124 wrote to memory of 5084 3124 msedge.exe 86 PID 3124 wrote to memory of 5084 3124 msedge.exe 86 PID 3124 wrote to memory of 5084 3124 msedge.exe 86 PID 3124 wrote to memory of 5084 3124 msedge.exe 86 PID 3124 wrote to memory of 5084 3124 msedge.exe 86 PID 3124 wrote to memory of 5084 3124 msedge.exe 86 PID 3124 wrote to memory of 5084 3124 msedge.exe 86 PID 3124 wrote to memory of 5084 3124 msedge.exe 86 PID 3124 wrote to memory of 5084 3124 msedge.exe 86 PID 3124 wrote to memory of 5084 3124 msedge.exe 86 PID 3124 wrote to memory of 5084 3124 msedge.exe 86 PID 3124 wrote to memory of 5084 3124 msedge.exe 86 PID 3124 wrote to memory of 5084 3124 msedge.exe 86 PID 3124 wrote to memory of 5084 3124 msedge.exe 86 PID 3124 wrote to memory of 5084 3124 msedge.exe 86 PID 3124 wrote to memory of 5084 3124 msedge.exe 86 PID 3124 wrote to memory of 5084 3124 msedge.exe 86 PID 3124 wrote to memory of 5084 3124 msedge.exe 86 PID 3124 wrote to memory of 5084 3124 msedge.exe 86 PID 3124 wrote to memory of 5084 3124 msedge.exe 86 PID 3124 wrote to memory of 5084 3124 msedge.exe 86 PID 3124 wrote to memory of 5084 3124 msedge.exe 86 PID 3124 wrote to memory of 5084 3124 msedge.exe 86 PID 3124 wrote to memory of 5084 3124 msedge.exe 86 PID 3124 wrote to memory of 5084 3124 msedge.exe 86 PID 3124 wrote to memory of 5084 3124 msedge.exe 86 PID 3124 wrote to memory of 5084 3124 msedge.exe 86 PID 3124 wrote to memory of 5084 3124 msedge.exe 86 PID 3124 wrote to memory of 5084 3124 msedge.exe 86 PID 3124 wrote to memory of 5084 3124 msedge.exe 86 PID 3124 wrote to memory of 5084 3124 msedge.exe 86 PID 3124 wrote to memory of 5084 3124 msedge.exe 86 PID 3124 wrote to memory of 5084 3124 msedge.exe 86 PID 3124 wrote to memory of 5084 3124 msedge.exe 86 PID 3124 wrote to memory of 5084 3124 msedge.exe 86 PID 3124 wrote to memory of 5084 3124 msedge.exe 86 PID 3124 wrote to memory of 5084 3124 msedge.exe 86 PID 3124 wrote to memory of 5084 3124 msedge.exe 86 PID 3124 wrote to memory of 5084 3124 msedge.exe 86 PID 3124 wrote to memory of 5092 3124 msedge.exe 87 PID 3124 wrote to memory of 5092 3124 msedge.exe 87 PID 3124 wrote to memory of 3048 3124 msedge.exe 88 PID 3124 wrote to memory of 3048 3124 msedge.exe 88 PID 3124 wrote to memory of 3048 3124 msedge.exe 88 PID 3124 wrote to memory of 3048 3124 msedge.exe 88 PID 3124 wrote to memory of 3048 3124 msedge.exe 88 PID 3124 wrote to memory of 3048 3124 msedge.exe 88 PID 3124 wrote to memory of 3048 3124 msedge.exe 88 PID 3124 wrote to memory of 3048 3124 msedge.exe 88 PID 3124 wrote to memory of 3048 3124 msedge.exe 88 PID 3124 wrote to memory of 3048 3124 msedge.exe 88 PID 3124 wrote to memory of 3048 3124 msedge.exe 88 PID 3124 wrote to memory of 3048 3124 msedge.exe 88 PID 3124 wrote to memory of 3048 3124 msedge.exe 88 PID 3124 wrote to memory of 3048 3124 msedge.exe 88 PID 3124 wrote to memory of 3048 3124 msedge.exe 88 PID 3124 wrote to memory of 3048 3124 msedge.exe 88 PID 3124 wrote to memory of 3048 3124 msedge.exe 88 PID 3124 wrote to memory of 3048 3124 msedge.exe 88 PID 3124 wrote to memory of 3048 3124 msedge.exe 88 PID 3124 wrote to memory of 3048 3124 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ff34983a02bb4fa2d6893ecf40b405f6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9872f46f8,0x7ff9872f4708,0x7ff9872f47182⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,7546305815171181940,3541612226048497963,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,7546305815171181940,3541612226048497963,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2340 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,7546305815171181940,3541612226048497963,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2588 /prefetch:82⤵PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,7546305815171181940,3541612226048497963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2956 /prefetch:12⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,7546305815171181940,3541612226048497963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2972 /prefetch:12⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,7546305815171181940,3541612226048497963,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5332 /prefetch:82⤵PID:2760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,7546305815171181940,3541612226048497963,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5332 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,7546305815171181940,3541612226048497963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,7546305815171181940,3541612226048497963,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,7546305815171181940,3541612226048497963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4160 /prefetch:12⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,7546305815171181940,3541612226048497963,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3556 /prefetch:12⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,7546305815171181940,3541612226048497963,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4616 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5256
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1696
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57b56675b54840d86d49bde5a1ff8af6a
SHA1fe70a1b85f88d60f3ba9fc7bb5f81fc41e150811
SHA25686af7213f410df65d0937f4331f783160f30eaeb088e28a9eef461713b9a3929
SHA51211fc61b83365391efee8084de5c2af7e064f0182b943a0db08d95a0f450d3877bde5b5e6a6b9f008e58b709bb1a34f7b50085c41927f091df1eea78f039402e9
-
Filesize
152B
MD548cff1baabb24706967de3b0d6869906
SHA1b0cd54f587cd4c88e60556347930cb76991e6734
SHA256f6b5fbc610a71b3914753feb2bd4475a7c77d0d785cc36255bf93b3fe3ccb775
SHA512fd0c848f3f9de81aca81af999262f96ea4c1cd1d1f32d304f56c7382f3b1bb604e5fbe9f209ad6e4b38988d92357ef82e9668806d0727f2856c7dc1f07aae2b6
-
Filesize
254B
MD527552b1b6b87c8a6bc7aad870ac95728
SHA11307d54e8f7cdba05b4e4a4e0a986a64fc614f8e
SHA256b66ce62748ef5a1b0fd5e331eac0daca544145e61521f7b5d3143602984d230c
SHA51200008519c8b05dcf90fcf6535fed741c9e92ef316a13bf968109638ad7bc76c2b79c217dfc368187ad246a21679e86abcdbd620f45e62239ac5d952e13bacf91
-
Filesize
6KB
MD549cb0ccdd2eeec227838a16e527012f7
SHA1f262cf639f1698178b5887b596008386bd7520cd
SHA25667dae621b47258ee286e83347ea058fb381b45bf46bf6d4a333c9c15174ed069
SHA5123a3c4908c9978cf8f3ed6e68fb7194ba399587c306534b043c8ba3b2e7500e092e0f88583ecb40a22d88d3769d5fc7dab802df384f7e76a5975755855b191380
-
Filesize
6KB
MD59dba706b1ba422389ed021732744a8bf
SHA171d654302801322c3895c1b91c066570f2a1202f
SHA2562f9aae496106b11016d6b07392591221df43ba6b53a84c320f76559a01df0060
SHA5126578481745ed17f0029d26fd2f17574c48e25ebcc64f07681c8a1c19416077614206185cf0f648c2bcb5250a83897b6c7cdd1006229992525322bca5efaa2e7b
-
Filesize
6KB
MD59dc9dc9e8caf67f6958f2d97fba9eb51
SHA14b7935ef2016a67cd20cc4503e4cc206730e6e83
SHA256fcac4a3a3e568abe46f7a7bfe2de81fc80da9b51b09d5ddcc6b5d8b948a3b35c
SHA512ab9b23af1782384843108288fe4dcce1198683d0ee59270addb4baad02500813812c8b2a2d86b891e0c77a62cd55a23c6ac24154cd85e02e30db8476d1edcc8c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5423641777a24f500c13b22994a8b5632
SHA1ef4bf4d100028a614ab88ae7174fd5c99f1e1e99
SHA256cd0c751a4d17f29cee7e8be83b39c42b733c5af4c7f3495c14ccf67bf78c86ae
SHA5127e3ff5acc76af84d24ec81585fda7de2c96df6783377c8d545f481ae8609ad53b441d46a591ee2010ede8e3653c7dd65902ab76abc0772ecffcd898607e6507f