Analysis
-
max time kernel
145s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
29/04/2024, 16:42
Static task
static1
Behavioral task
behavioral1
Sample
08212b993362970a0f74f048037779f8_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
08212b993362970a0f74f048037779f8_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
08212b993362970a0f74f048037779f8_JaffaCakes118.html
-
Size
573KB
-
MD5
08212b993362970a0f74f048037779f8
-
SHA1
f765560bd09af6962883537741848978c38d19a3
-
SHA256
1d5601c89fc4b0e3fe9c6c277a4334bc349db43f042a87a12c3bba55c2ebaa3c
-
SHA512
49b979abd821053967856e2b6eba16236e3a2a127d4c5a25aa49ea5a3e4403a3bbdc6c1679d5ef9151655eb03024c19313140a38e0173c662b6f9ae833836d3d
-
SSDEEP
6144:ZTAez1plvQgD7Ej/IN9IuMLJ36s+cUvwr1s5l:1JASyB36s6vtL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2412 msedge.exe 2412 msedge.exe 4640 msedge.exe 4640 msedge.exe 2056 identity_helper.exe 2056 identity_helper.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4640 wrote to memory of 2540 4640 msedge.exe 82 PID 4640 wrote to memory of 2540 4640 msedge.exe 82 PID 4640 wrote to memory of 4188 4640 msedge.exe 83 PID 4640 wrote to memory of 4188 4640 msedge.exe 83 PID 4640 wrote to memory of 4188 4640 msedge.exe 83 PID 4640 wrote to memory of 4188 4640 msedge.exe 83 PID 4640 wrote to memory of 4188 4640 msedge.exe 83 PID 4640 wrote to memory of 4188 4640 msedge.exe 83 PID 4640 wrote to memory of 4188 4640 msedge.exe 83 PID 4640 wrote to memory of 4188 4640 msedge.exe 83 PID 4640 wrote to memory of 4188 4640 msedge.exe 83 PID 4640 wrote to memory of 4188 4640 msedge.exe 83 PID 4640 wrote to memory of 4188 4640 msedge.exe 83 PID 4640 wrote to memory of 4188 4640 msedge.exe 83 PID 4640 wrote to memory of 4188 4640 msedge.exe 83 PID 4640 wrote to memory of 4188 4640 msedge.exe 83 PID 4640 wrote to memory of 4188 4640 msedge.exe 83 PID 4640 wrote to memory of 4188 4640 msedge.exe 83 PID 4640 wrote to memory of 4188 4640 msedge.exe 83 PID 4640 wrote to memory of 4188 4640 msedge.exe 83 PID 4640 wrote to memory of 4188 4640 msedge.exe 83 PID 4640 wrote to memory of 4188 4640 msedge.exe 83 PID 4640 wrote to memory of 4188 4640 msedge.exe 83 PID 4640 wrote to memory of 4188 4640 msedge.exe 83 PID 4640 wrote to memory of 4188 4640 msedge.exe 83 PID 4640 wrote to memory of 4188 4640 msedge.exe 83 PID 4640 wrote to memory of 4188 4640 msedge.exe 83 PID 4640 wrote to memory of 4188 4640 msedge.exe 83 PID 4640 wrote to memory of 4188 4640 msedge.exe 83 PID 4640 wrote to memory of 4188 4640 msedge.exe 83 PID 4640 wrote to memory of 4188 4640 msedge.exe 83 PID 4640 wrote to memory of 4188 4640 msedge.exe 83 PID 4640 wrote to memory of 4188 4640 msedge.exe 83 PID 4640 wrote to memory of 4188 4640 msedge.exe 83 PID 4640 wrote to memory of 4188 4640 msedge.exe 83 PID 4640 wrote to memory of 4188 4640 msedge.exe 83 PID 4640 wrote to memory of 4188 4640 msedge.exe 83 PID 4640 wrote to memory of 4188 4640 msedge.exe 83 PID 4640 wrote to memory of 4188 4640 msedge.exe 83 PID 4640 wrote to memory of 4188 4640 msedge.exe 83 PID 4640 wrote to memory of 4188 4640 msedge.exe 83 PID 4640 wrote to memory of 4188 4640 msedge.exe 83 PID 4640 wrote to memory of 2412 4640 msedge.exe 84 PID 4640 wrote to memory of 2412 4640 msedge.exe 84 PID 4640 wrote to memory of 1944 4640 msedge.exe 85 PID 4640 wrote to memory of 1944 4640 msedge.exe 85 PID 4640 wrote to memory of 1944 4640 msedge.exe 85 PID 4640 wrote to memory of 1944 4640 msedge.exe 85 PID 4640 wrote to memory of 1944 4640 msedge.exe 85 PID 4640 wrote to memory of 1944 4640 msedge.exe 85 PID 4640 wrote to memory of 1944 4640 msedge.exe 85 PID 4640 wrote to memory of 1944 4640 msedge.exe 85 PID 4640 wrote to memory of 1944 4640 msedge.exe 85 PID 4640 wrote to memory of 1944 4640 msedge.exe 85 PID 4640 wrote to memory of 1944 4640 msedge.exe 85 PID 4640 wrote to memory of 1944 4640 msedge.exe 85 PID 4640 wrote to memory of 1944 4640 msedge.exe 85 PID 4640 wrote to memory of 1944 4640 msedge.exe 85 PID 4640 wrote to memory of 1944 4640 msedge.exe 85 PID 4640 wrote to memory of 1944 4640 msedge.exe 85 PID 4640 wrote to memory of 1944 4640 msedge.exe 85 PID 4640 wrote to memory of 1944 4640 msedge.exe 85 PID 4640 wrote to memory of 1944 4640 msedge.exe 85 PID 4640 wrote to memory of 1944 4640 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\08212b993362970a0f74f048037779f8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xe0,0xe4,0xb4,0xdc,0x108,0x7ff84d7846f8,0x7ff84d784708,0x7ff84d7847182⤵PID:2540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,3145671782531657553,3247481286810278665,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2192,3145671782531657553,3247481286810278665,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2192,3145671782531657553,3247481286810278665,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,3145671782531657553,3247481286810278665,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,3145671782531657553,3247481286810278665,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,3145671782531657553,3247481286810278665,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 /prefetch:82⤵PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,3145671782531657553,3247481286810278665,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,3145671782531657553,3247481286810278665,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:1896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,3145671782531657553,3247481286810278665,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:1004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,3145671782531657553,3247481286810278665,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:12⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,3145671782531657553,3247481286810278665,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4048 /prefetch:12⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,3145671782531657553,3247481286810278665,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5712 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1280
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3000
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
6KB
MD50e7e90ee89639978e2c54a5ad66b2d75
SHA18d43b1aa3a1729299842921b5becadeed0192e87
SHA256713008591d3511c74ecb0680170bcb10a24a429835c14d7506f759c4cf02cd8d
SHA51239ea48deb44acec0262d23a516f4c72174cf7857d73f58c962b2e8b55847ca698e4c931bf5e76e11e14f9ac4fbc57810243763dce9440d00ef052978327c1cdb
-
Filesize
6KB
MD5ef872e1208b8cbea8cb740c48069b769
SHA131b1cfc8791eabff5629be44ce5bfef5e0ea8dfb
SHA256287e77971c5125c410e98e196622f3d5ba7e5015f64993495ec18a35954ccf5e
SHA512d7d1e57e04f163d00ec52883f3b5789fc0680671a94960c20684022586c2bc6e931d98a8a63ce5ace3ef7c30a8da1fe8ec4682fb7d619d1f59e347fa96bec352
-
Filesize
6KB
MD568048ff6f260cd46f0d7b29b2c791d5e
SHA155b1ef1f61870f29d2b0d98a9bd56e0127151f81
SHA2568d081a0e80c65deb7cbea190b8b587ec6a79f4806375a0a96d09fd77d4019904
SHA512b48fbf1ba9542694ae84d56e9542ae62b5adf10079bed91b88203f3e7910f2f2a76f944c6126f3a6e4d1308335dbcb4b2af334714c32d307f518129546bb0276
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51a23a1dc347465f355f4f00d4a2d5c60
SHA1524851a6ba45f7de742d8a6a39c1c08a4f5aa41f
SHA25651d3232be96c4a12f7cc46022d2e2548b71bf451db6feda5253abbc3282e35b2
SHA512e5af03c7250a29471503daf02968d109f2c0dc46cc37f58d35de666f264e26aa8b0c8588c869084fc1facd0580cf096fa2ac6816e1d061aaf3aa9a1fa3a0bd6f