Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
29-04-2024 01:59
Static task
static1
Behavioral task
behavioral1
Sample
0691e4678b3c1b6253056a14531067ad_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0691e4678b3c1b6253056a14531067ad_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
0691e4678b3c1b6253056a14531067ad_JaffaCakes118.html
-
Size
2KB
-
MD5
0691e4678b3c1b6253056a14531067ad
-
SHA1
518205bbda90a53f49c96f82f29f27c182da8c58
-
SHA256
d20414c37df5ff06844bd3d5dafc7f2cd1ac6cfc6e0cafbe4b0847462a671ebe
-
SHA512
b4f87aa30d9b223c22e5d9fae70948dab16c9e2aa27779cb82e378b46e48806094095f59b6d139313b957bcd568118ee23dba69bc7a78a3bb6ba3c890503e314
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2352 msedge.exe 2352 msedge.exe 1200 msedge.exe 1200 msedge.exe 4360 identity_helper.exe 4360 identity_helper.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1200 wrote to memory of 4828 1200 msedge.exe 84 PID 1200 wrote to memory of 4828 1200 msedge.exe 84 PID 1200 wrote to memory of 1904 1200 msedge.exe 85 PID 1200 wrote to memory of 1904 1200 msedge.exe 85 PID 1200 wrote to memory of 1904 1200 msedge.exe 85 PID 1200 wrote to memory of 1904 1200 msedge.exe 85 PID 1200 wrote to memory of 1904 1200 msedge.exe 85 PID 1200 wrote to memory of 1904 1200 msedge.exe 85 PID 1200 wrote to memory of 1904 1200 msedge.exe 85 PID 1200 wrote to memory of 1904 1200 msedge.exe 85 PID 1200 wrote to memory of 1904 1200 msedge.exe 85 PID 1200 wrote to memory of 1904 1200 msedge.exe 85 PID 1200 wrote to memory of 1904 1200 msedge.exe 85 PID 1200 wrote to memory of 1904 1200 msedge.exe 85 PID 1200 wrote to memory of 1904 1200 msedge.exe 85 PID 1200 wrote to memory of 1904 1200 msedge.exe 85 PID 1200 wrote to memory of 1904 1200 msedge.exe 85 PID 1200 wrote to memory of 1904 1200 msedge.exe 85 PID 1200 wrote to memory of 1904 1200 msedge.exe 85 PID 1200 wrote to memory of 1904 1200 msedge.exe 85 PID 1200 wrote to memory of 1904 1200 msedge.exe 85 PID 1200 wrote to memory of 1904 1200 msedge.exe 85 PID 1200 wrote to memory of 1904 1200 msedge.exe 85 PID 1200 wrote to memory of 1904 1200 msedge.exe 85 PID 1200 wrote to memory of 1904 1200 msedge.exe 85 PID 1200 wrote to memory of 1904 1200 msedge.exe 85 PID 1200 wrote to memory of 1904 1200 msedge.exe 85 PID 1200 wrote to memory of 1904 1200 msedge.exe 85 PID 1200 wrote to memory of 1904 1200 msedge.exe 85 PID 1200 wrote to memory of 1904 1200 msedge.exe 85 PID 1200 wrote to memory of 1904 1200 msedge.exe 85 PID 1200 wrote to memory of 1904 1200 msedge.exe 85 PID 1200 wrote to memory of 1904 1200 msedge.exe 85 PID 1200 wrote to memory of 1904 1200 msedge.exe 85 PID 1200 wrote to memory of 1904 1200 msedge.exe 85 PID 1200 wrote to memory of 1904 1200 msedge.exe 85 PID 1200 wrote to memory of 1904 1200 msedge.exe 85 PID 1200 wrote to memory of 1904 1200 msedge.exe 85 PID 1200 wrote to memory of 1904 1200 msedge.exe 85 PID 1200 wrote to memory of 1904 1200 msedge.exe 85 PID 1200 wrote to memory of 1904 1200 msedge.exe 85 PID 1200 wrote to memory of 1904 1200 msedge.exe 85 PID 1200 wrote to memory of 2352 1200 msedge.exe 86 PID 1200 wrote to memory of 2352 1200 msedge.exe 86 PID 1200 wrote to memory of 3592 1200 msedge.exe 87 PID 1200 wrote to memory of 3592 1200 msedge.exe 87 PID 1200 wrote to memory of 3592 1200 msedge.exe 87 PID 1200 wrote to memory of 3592 1200 msedge.exe 87 PID 1200 wrote to memory of 3592 1200 msedge.exe 87 PID 1200 wrote to memory of 3592 1200 msedge.exe 87 PID 1200 wrote to memory of 3592 1200 msedge.exe 87 PID 1200 wrote to memory of 3592 1200 msedge.exe 87 PID 1200 wrote to memory of 3592 1200 msedge.exe 87 PID 1200 wrote to memory of 3592 1200 msedge.exe 87 PID 1200 wrote to memory of 3592 1200 msedge.exe 87 PID 1200 wrote to memory of 3592 1200 msedge.exe 87 PID 1200 wrote to memory of 3592 1200 msedge.exe 87 PID 1200 wrote to memory of 3592 1200 msedge.exe 87 PID 1200 wrote to memory of 3592 1200 msedge.exe 87 PID 1200 wrote to memory of 3592 1200 msedge.exe 87 PID 1200 wrote to memory of 3592 1200 msedge.exe 87 PID 1200 wrote to memory of 3592 1200 msedge.exe 87 PID 1200 wrote to memory of 3592 1200 msedge.exe 87 PID 1200 wrote to memory of 3592 1200 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0691e4678b3c1b6253056a14531067ad_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff935e46f8,0x7fff935e4708,0x7fff935e47182⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1844,354420288051867667,1394777725072531746,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1844,354420288051867667,1394777725072531746,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1844,354420288051867667,1394777725072531746,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,354420288051867667,1394777725072531746,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,354420288051867667,1394777725072531746,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:2764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1844,354420288051867667,1394777725072531746,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5408 /prefetch:82⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1844,354420288051867667,1394777725072531746,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5408 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,354420288051867667,1394777725072531746,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,354420288051867667,1394777725072531746,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:12⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,354420288051867667,1394777725072531746,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3964 /prefetch:12⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,354420288051867667,1394777725072531746,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1844,354420288051867667,1394777725072531746,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1840 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1848
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:836
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
6KB
MD5aae2616df341b12d9194d0707179012e
SHA189af19710645dce1cdc6f91f25f7286dbb90ddc9
SHA25689052af68d846b10eb4d20b23f448107478a86c4bcda29080bab9b1d8698c744
SHA512d27cc8b5ebfcaa8492ed119bb65f7b7a9edbcabcca2109ef4371ac6a70bc32559ff43ebb101519804821a6ae6ea80c9726c463fd62a444973c2ad9e09c8bd6bd
-
Filesize
6KB
MD52b23960643a44cc7a7ad42d9f50ccdae
SHA17656b98b0521610381f53284c6079055247fa8be
SHA256cbe6204c07224430c961188bfd9b336727d286553d37242c8fa7e8b1973db18b
SHA51296f873cc190e23dfb42a81a6cac6abd06603f6f1065b779e30bda6ab7ec92558d117c263502e27809b40a5875e0da0a11e4a921f5ec339ee3f3c3c7604830983
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5eeee6a830dd48f451d686c034a06611d
SHA1bb9eaee7f8539450adceed00f9186867122b625a
SHA2564a1d393cb4adb30668e47ea4f742b606cc53a43b5a400378d1384d02874a5ca5
SHA512b3d94d830df746fe4020dce87b66ae0b17dabb81a42901c09163ce7e51742c381e702c0401d57f8ab8286d5ca64befdcc61c521985fd744e0ba86950a6eb8978