Analysis
-
max time kernel
145s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
26-04-2024 20:35
Static task
static1
Behavioral task
behavioral1
Sample
019c4003c3b468ba37df4b5409ade7a4_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
019c4003c3b468ba37df4b5409ade7a4_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
019c4003c3b468ba37df4b5409ade7a4_JaffaCakes118.html
-
Size
27KB
-
MD5
019c4003c3b468ba37df4b5409ade7a4
-
SHA1
acde41c4b21d694c7e031efb84385a40b436f77c
-
SHA256
3f093e86b2987ae6b22a256db786a8a5939f7e6d6cb9654b62d54ee6d157834f
-
SHA512
63f9c958a16926fa339190bdceaacd4adc2a4f38519d4ba3496e0aae60a6f8a8b5a40b18c2de2aebe16a97edb7504caeba0db01f60e75cbc2f3b018a32fc6b9b
-
SSDEEP
192:uw/kb5nBCnQjxn5Q/PEnQie3NnunQOkEntxm2nQTbn1nQ9ez7m6u3FjQl7MBXqnY:AQ/w+NiF6SFuNM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2988 msedge.exe 2988 msedge.exe 4060 msedge.exe 4060 msedge.exe 1896 identity_helper.exe 1896 identity_helper.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4060 wrote to memory of 2068 4060 msedge.exe 80 PID 4060 wrote to memory of 2068 4060 msedge.exe 80 PID 4060 wrote to memory of 4892 4060 msedge.exe 83 PID 4060 wrote to memory of 4892 4060 msedge.exe 83 PID 4060 wrote to memory of 4892 4060 msedge.exe 83 PID 4060 wrote to memory of 4892 4060 msedge.exe 83 PID 4060 wrote to memory of 4892 4060 msedge.exe 83 PID 4060 wrote to memory of 4892 4060 msedge.exe 83 PID 4060 wrote to memory of 4892 4060 msedge.exe 83 PID 4060 wrote to memory of 4892 4060 msedge.exe 83 PID 4060 wrote to memory of 4892 4060 msedge.exe 83 PID 4060 wrote to memory of 4892 4060 msedge.exe 83 PID 4060 wrote to memory of 4892 4060 msedge.exe 83 PID 4060 wrote to memory of 4892 4060 msedge.exe 83 PID 4060 wrote to memory of 4892 4060 msedge.exe 83 PID 4060 wrote to memory of 4892 4060 msedge.exe 83 PID 4060 wrote to memory of 4892 4060 msedge.exe 83 PID 4060 wrote to memory of 4892 4060 msedge.exe 83 PID 4060 wrote to memory of 4892 4060 msedge.exe 83 PID 4060 wrote to memory of 4892 4060 msedge.exe 83 PID 4060 wrote to memory of 4892 4060 msedge.exe 83 PID 4060 wrote to memory of 4892 4060 msedge.exe 83 PID 4060 wrote to memory of 4892 4060 msedge.exe 83 PID 4060 wrote to memory of 4892 4060 msedge.exe 83 PID 4060 wrote to memory of 4892 4060 msedge.exe 83 PID 4060 wrote to memory of 4892 4060 msedge.exe 83 PID 4060 wrote to memory of 4892 4060 msedge.exe 83 PID 4060 wrote to memory of 4892 4060 msedge.exe 83 PID 4060 wrote to memory of 4892 4060 msedge.exe 83 PID 4060 wrote to memory of 4892 4060 msedge.exe 83 PID 4060 wrote to memory of 4892 4060 msedge.exe 83 PID 4060 wrote to memory of 4892 4060 msedge.exe 83 PID 4060 wrote to memory of 4892 4060 msedge.exe 83 PID 4060 wrote to memory of 4892 4060 msedge.exe 83 PID 4060 wrote to memory of 4892 4060 msedge.exe 83 PID 4060 wrote to memory of 4892 4060 msedge.exe 83 PID 4060 wrote to memory of 4892 4060 msedge.exe 83 PID 4060 wrote to memory of 4892 4060 msedge.exe 83 PID 4060 wrote to memory of 4892 4060 msedge.exe 83 PID 4060 wrote to memory of 4892 4060 msedge.exe 83 PID 4060 wrote to memory of 4892 4060 msedge.exe 83 PID 4060 wrote to memory of 4892 4060 msedge.exe 83 PID 4060 wrote to memory of 2988 4060 msedge.exe 84 PID 4060 wrote to memory of 2988 4060 msedge.exe 84 PID 4060 wrote to memory of 2844 4060 msedge.exe 85 PID 4060 wrote to memory of 2844 4060 msedge.exe 85 PID 4060 wrote to memory of 2844 4060 msedge.exe 85 PID 4060 wrote to memory of 2844 4060 msedge.exe 85 PID 4060 wrote to memory of 2844 4060 msedge.exe 85 PID 4060 wrote to memory of 2844 4060 msedge.exe 85 PID 4060 wrote to memory of 2844 4060 msedge.exe 85 PID 4060 wrote to memory of 2844 4060 msedge.exe 85 PID 4060 wrote to memory of 2844 4060 msedge.exe 85 PID 4060 wrote to memory of 2844 4060 msedge.exe 85 PID 4060 wrote to memory of 2844 4060 msedge.exe 85 PID 4060 wrote to memory of 2844 4060 msedge.exe 85 PID 4060 wrote to memory of 2844 4060 msedge.exe 85 PID 4060 wrote to memory of 2844 4060 msedge.exe 85 PID 4060 wrote to memory of 2844 4060 msedge.exe 85 PID 4060 wrote to memory of 2844 4060 msedge.exe 85 PID 4060 wrote to memory of 2844 4060 msedge.exe 85 PID 4060 wrote to memory of 2844 4060 msedge.exe 85 PID 4060 wrote to memory of 2844 4060 msedge.exe 85 PID 4060 wrote to memory of 2844 4060 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\019c4003c3b468ba37df4b5409ade7a4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa604a46f8,0x7ffa604a4708,0x7ffa604a47182⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,1452463128776613782,9087232258713206464,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,1452463128776613782,9087232258713206464,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2528 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,1452463128776613782,9087232258713206464,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1452463128776613782,9087232258713206464,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:1324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1452463128776613782,9087232258713206464,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:1208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,1452463128776613782,9087232258713206464,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,1452463128776613782,9087232258713206464,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1452463128776613782,9087232258713206464,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1452463128776613782,9087232258713206464,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1452463128776613782,9087232258713206464,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:12⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1452463128776613782,9087232258713206464,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3456 /prefetch:12⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,1452463128776613782,9087232258713206464,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2508 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4208
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1996
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
6KB
MD5d19c5c68dcb4a37547f18083383247cf
SHA1b6152cae805145e72b994a4f6e0c772d61da2474
SHA2564c4cd96c2705150ba0a4b864ef8e76addd169b02672ab9a7595deced8f0bc743
SHA51289664cb8367bb9ea5f9426d07367f9716fd421ff9e38b911fe2dbd705f5afeabd09018d6b295560432eb1b411abdbcddb48b13836c63e87893d19a5f6c3101a9
-
Filesize
6KB
MD5c59529cc725d65eb6227613d5aab4461
SHA1e53fc772962746de1ef4013f6cb2ba31f1a95441
SHA25660f69881e32de9fc37cb3eba667bf73ac3f287548412d3cf9bc968c592e078e9
SHA5127ebd7c1498124441ac4ea90c9301b51a14211e1b8cc318893bda0cda9ee7240b72a823b2953efdd86943175790d19615b6710281dcbe763d15c839a488c547d7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5df454d53c514e07c7bc8dc067ef5666c
SHA10827e9f94f1b67dfaaeffa23393979271668d87e
SHA2563dd2a874a72b2ee5d49e22a2ab49bc440219b0189b52fe8320ced5b459317878
SHA51278f466c7db4b18da67541088693fdd8703f6bc99efcc3138304b19295f937171c97d5fc85a663b9ab1ccb9990d2e80b441b16f4515e2d4a5523746c298318570
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e