Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
27-04-2024 02:09
Static task
static1
Behavioral task
behavioral1
Sample
022d59e90aa5c74536c2559c89742f75_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
022d59e90aa5c74536c2559c89742f75_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
022d59e90aa5c74536c2559c89742f75_JaffaCakes118.html
-
Size
125KB
-
MD5
022d59e90aa5c74536c2559c89742f75
-
SHA1
c14b01d11e6d30ee3ac406b8450c44650d5f0792
-
SHA256
87947304aabb45a0522d36bbce1736e8c06bff47016f3383f3081bf66463c57b
-
SHA512
d476a8bb897592c0073fd5d516642c76c984b0aea23cb54af2e7293b9d2fa437cdfe433a231f5fcc73845560a4fc30aba19da87f07d3344715e4a5590b1873a1
-
SSDEEP
1536:5/Q8XmlgvBlgvzhehtzjT0R1izpPFQiBc2d0DzSpNRDElgTh9GXYU8KLtmv64:JMKBW1izpPFS2d0DGp/igThtU8KLtmr
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1748 msedge.exe 1748 msedge.exe 2324 msedge.exe 2324 msedge.exe 3968 identity_helper.exe 3968 identity_helper.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2812 2324 msedge.exe 84 PID 2324 wrote to memory of 2812 2324 msedge.exe 84 PID 2324 wrote to memory of 4512 2324 msedge.exe 85 PID 2324 wrote to memory of 4512 2324 msedge.exe 85 PID 2324 wrote to memory of 4512 2324 msedge.exe 85 PID 2324 wrote to memory of 4512 2324 msedge.exe 85 PID 2324 wrote to memory of 4512 2324 msedge.exe 85 PID 2324 wrote to memory of 4512 2324 msedge.exe 85 PID 2324 wrote to memory of 4512 2324 msedge.exe 85 PID 2324 wrote to memory of 4512 2324 msedge.exe 85 PID 2324 wrote to memory of 4512 2324 msedge.exe 85 PID 2324 wrote to memory of 4512 2324 msedge.exe 85 PID 2324 wrote to memory of 4512 2324 msedge.exe 85 PID 2324 wrote to memory of 4512 2324 msedge.exe 85 PID 2324 wrote to memory of 4512 2324 msedge.exe 85 PID 2324 wrote to memory of 4512 2324 msedge.exe 85 PID 2324 wrote to memory of 4512 2324 msedge.exe 85 PID 2324 wrote to memory of 4512 2324 msedge.exe 85 PID 2324 wrote to memory of 4512 2324 msedge.exe 85 PID 2324 wrote to memory of 4512 2324 msedge.exe 85 PID 2324 wrote to memory of 4512 2324 msedge.exe 85 PID 2324 wrote to memory of 4512 2324 msedge.exe 85 PID 2324 wrote to memory of 4512 2324 msedge.exe 85 PID 2324 wrote to memory of 4512 2324 msedge.exe 85 PID 2324 wrote to memory of 4512 2324 msedge.exe 85 PID 2324 wrote to memory of 4512 2324 msedge.exe 85 PID 2324 wrote to memory of 4512 2324 msedge.exe 85 PID 2324 wrote to memory of 4512 2324 msedge.exe 85 PID 2324 wrote to memory of 4512 2324 msedge.exe 85 PID 2324 wrote to memory of 4512 2324 msedge.exe 85 PID 2324 wrote to memory of 4512 2324 msedge.exe 85 PID 2324 wrote to memory of 4512 2324 msedge.exe 85 PID 2324 wrote to memory of 4512 2324 msedge.exe 85 PID 2324 wrote to memory of 4512 2324 msedge.exe 85 PID 2324 wrote to memory of 4512 2324 msedge.exe 85 PID 2324 wrote to memory of 4512 2324 msedge.exe 85 PID 2324 wrote to memory of 4512 2324 msedge.exe 85 PID 2324 wrote to memory of 4512 2324 msedge.exe 85 PID 2324 wrote to memory of 4512 2324 msedge.exe 85 PID 2324 wrote to memory of 4512 2324 msedge.exe 85 PID 2324 wrote to memory of 4512 2324 msedge.exe 85 PID 2324 wrote to memory of 4512 2324 msedge.exe 85 PID 2324 wrote to memory of 1748 2324 msedge.exe 86 PID 2324 wrote to memory of 1748 2324 msedge.exe 86 PID 2324 wrote to memory of 3584 2324 msedge.exe 87 PID 2324 wrote to memory of 3584 2324 msedge.exe 87 PID 2324 wrote to memory of 3584 2324 msedge.exe 87 PID 2324 wrote to memory of 3584 2324 msedge.exe 87 PID 2324 wrote to memory of 3584 2324 msedge.exe 87 PID 2324 wrote to memory of 3584 2324 msedge.exe 87 PID 2324 wrote to memory of 3584 2324 msedge.exe 87 PID 2324 wrote to memory of 3584 2324 msedge.exe 87 PID 2324 wrote to memory of 3584 2324 msedge.exe 87 PID 2324 wrote to memory of 3584 2324 msedge.exe 87 PID 2324 wrote to memory of 3584 2324 msedge.exe 87 PID 2324 wrote to memory of 3584 2324 msedge.exe 87 PID 2324 wrote to memory of 3584 2324 msedge.exe 87 PID 2324 wrote to memory of 3584 2324 msedge.exe 87 PID 2324 wrote to memory of 3584 2324 msedge.exe 87 PID 2324 wrote to memory of 3584 2324 msedge.exe 87 PID 2324 wrote to memory of 3584 2324 msedge.exe 87 PID 2324 wrote to memory of 3584 2324 msedge.exe 87 PID 2324 wrote to memory of 3584 2324 msedge.exe 87 PID 2324 wrote to memory of 3584 2324 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\022d59e90aa5c74536c2559c89742f75_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcd1bc46f8,0x7ffcd1bc4708,0x7ffcd1bc47182⤵PID:2812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,13856595618728151981,17375779430636421790,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,13856595618728151981,17375779430636421790,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,13856595618728151981,17375779430636421790,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:3584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13856595618728151981,17375779430636421790,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13856595618728151981,17375779430636421790,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,13856595618728151981,17375779430636421790,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4944 /prefetch:82⤵PID:1340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,13856595618728151981,17375779430636421790,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4944 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13856595618728151981,17375779430636421790,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4588 /prefetch:12⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13856595618728151981,17375779430636421790,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13856595618728151981,17375779430636421790,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13856595618728151981,17375779430636421790,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,13856595618728151981,17375779430636421790,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4336 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3904
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4984
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dbac49e66219979194c79f1cf1cb3dd1
SHA14ef87804a04d51ae1fac358f92382548b27f62f2
SHA256f24ed6c5bf4b734a9af4d64e14a80a160bea569f50849f70bf7b7277c4f48562
SHA512bb314d61f53cf7774f6dfb6b772c72f5daf386bc3d27d2bb7a14c65848ee86e6c48e9c5696693ded31846b69b9372a530175df48494e3d61a228e49d43401ad1
-
Filesize
152B
MD5a9e55f5864d6e2afd2fd84e25a3bc228
SHA1a5efcff9e3df6252c7fe8535d505235f82aab276
SHA2560f4df3120e4620555916be8e51c29be8d600d68ae5244efad6a0268aabc8c452
SHA51212f45fa73a6de6dfe17acc8b52b60f2d79008da130730b74cc138c1dcd73ccc99487165e3c8c90dc247359fde272f1ec6b3cf2c5fcb04e5093936144d0558b75
-
Filesize
6KB
MD57f48b1a45db07154730b41f221eb412b
SHA15c89d6f6ac2c3c5ddfc4b219e2a18b9f0fe06a37
SHA256d24f94bdad771a5c29faa2cd7b61b345ad2cd60aab8ed79f633a84b35cc56aa6
SHA512c6588bef597958a6e5f493137fb09a16bfe65a573728ed56193ada94aad5ef4335f40b63fa507ef25377066313b598895155ec9f03a795abe6c5fc00ae2b5056
-
Filesize
6KB
MD59f74e082cd4bc71f5cd245533f8a7d9d
SHA17031cb0078f1970304d915c40d1cc7e8541cd9fd
SHA2565622d8e8760bbd3609f11fef7047c3f864ebcc0a9dce408e1d655d9f487cbaa3
SHA512003f758b8eac83b15da22cc9645f3098271b18d75f7cdc99746b70ecb8f6193ce8c9185a29d113440498d28cd67c768f57aff4bcdede6149589b9a04d032f342
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5383aaf87e062bc6cbf6c2ffdb705f10a
SHA1a13b33b58e8726a5ba363d7fce43b799f99fe00f
SHA25607aa9a38463f1b43d5be3a12c5ea20d29fd2285a7386291d0db798f55dea5e70
SHA51287da02aa259a84d60dafaddb26c03aa5bf612695d6617c539ca4b9651d27634dfb0259c6841172a19b2707aa3eac22c6089576bc688be58579a01ae9df25b6ee