Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
30-04-2024 01:59
Static task
static1
Behavioral task
behavioral1
Sample
08c528c09ca1ad07839b687b2a14a593_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
08c528c09ca1ad07839b687b2a14a593_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
08c528c09ca1ad07839b687b2a14a593_JaffaCakes118.html
-
Size
19KB
-
MD5
08c528c09ca1ad07839b687b2a14a593
-
SHA1
4ba2e3d30370eb90073dbabfa21e1ed42a027574
-
SHA256
8798c489b6de262ffe84711c9e35cd14670ae20984111dc62115efa20a480c56
-
SHA512
3b3912241e72b26c4c4254e45d526bc657bb25b3c9d3383cff1a48022e8e5dc6a43c7abb09d1b93011cef56facf7a2c1f1944659d4a72aab043fc11ed1c845b5
-
SSDEEP
192:SIM3t0I5fo9cOQivXQWxZxdkVSoAIV4vzUnjBh5T82qDB8:SIMd0I5nO9Hdsv5IxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 440 msedge.exe 440 msedge.exe 2316 msedge.exe 2316 msedge.exe 1016 identity_helper.exe 1016 identity_helper.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2316 wrote to memory of 1736 2316 msedge.exe 84 PID 2316 wrote to memory of 1736 2316 msedge.exe 84 PID 2316 wrote to memory of 5052 2316 msedge.exe 85 PID 2316 wrote to memory of 5052 2316 msedge.exe 85 PID 2316 wrote to memory of 5052 2316 msedge.exe 85 PID 2316 wrote to memory of 5052 2316 msedge.exe 85 PID 2316 wrote to memory of 5052 2316 msedge.exe 85 PID 2316 wrote to memory of 5052 2316 msedge.exe 85 PID 2316 wrote to memory of 5052 2316 msedge.exe 85 PID 2316 wrote to memory of 5052 2316 msedge.exe 85 PID 2316 wrote to memory of 5052 2316 msedge.exe 85 PID 2316 wrote to memory of 5052 2316 msedge.exe 85 PID 2316 wrote to memory of 5052 2316 msedge.exe 85 PID 2316 wrote to memory of 5052 2316 msedge.exe 85 PID 2316 wrote to memory of 5052 2316 msedge.exe 85 PID 2316 wrote to memory of 5052 2316 msedge.exe 85 PID 2316 wrote to memory of 5052 2316 msedge.exe 85 PID 2316 wrote to memory of 5052 2316 msedge.exe 85 PID 2316 wrote to memory of 5052 2316 msedge.exe 85 PID 2316 wrote to memory of 5052 2316 msedge.exe 85 PID 2316 wrote to memory of 5052 2316 msedge.exe 85 PID 2316 wrote to memory of 5052 2316 msedge.exe 85 PID 2316 wrote to memory of 5052 2316 msedge.exe 85 PID 2316 wrote to memory of 5052 2316 msedge.exe 85 PID 2316 wrote to memory of 5052 2316 msedge.exe 85 PID 2316 wrote to memory of 5052 2316 msedge.exe 85 PID 2316 wrote to memory of 5052 2316 msedge.exe 85 PID 2316 wrote to memory of 5052 2316 msedge.exe 85 PID 2316 wrote to memory of 5052 2316 msedge.exe 85 PID 2316 wrote to memory of 5052 2316 msedge.exe 85 PID 2316 wrote to memory of 5052 2316 msedge.exe 85 PID 2316 wrote to memory of 5052 2316 msedge.exe 85 PID 2316 wrote to memory of 5052 2316 msedge.exe 85 PID 2316 wrote to memory of 5052 2316 msedge.exe 85 PID 2316 wrote to memory of 5052 2316 msedge.exe 85 PID 2316 wrote to memory of 5052 2316 msedge.exe 85 PID 2316 wrote to memory of 5052 2316 msedge.exe 85 PID 2316 wrote to memory of 5052 2316 msedge.exe 85 PID 2316 wrote to memory of 5052 2316 msedge.exe 85 PID 2316 wrote to memory of 5052 2316 msedge.exe 85 PID 2316 wrote to memory of 5052 2316 msedge.exe 85 PID 2316 wrote to memory of 5052 2316 msedge.exe 85 PID 2316 wrote to memory of 440 2316 msedge.exe 86 PID 2316 wrote to memory of 440 2316 msedge.exe 86 PID 2316 wrote to memory of 4400 2316 msedge.exe 87 PID 2316 wrote to memory of 4400 2316 msedge.exe 87 PID 2316 wrote to memory of 4400 2316 msedge.exe 87 PID 2316 wrote to memory of 4400 2316 msedge.exe 87 PID 2316 wrote to memory of 4400 2316 msedge.exe 87 PID 2316 wrote to memory of 4400 2316 msedge.exe 87 PID 2316 wrote to memory of 4400 2316 msedge.exe 87 PID 2316 wrote to memory of 4400 2316 msedge.exe 87 PID 2316 wrote to memory of 4400 2316 msedge.exe 87 PID 2316 wrote to memory of 4400 2316 msedge.exe 87 PID 2316 wrote to memory of 4400 2316 msedge.exe 87 PID 2316 wrote to memory of 4400 2316 msedge.exe 87 PID 2316 wrote to memory of 4400 2316 msedge.exe 87 PID 2316 wrote to memory of 4400 2316 msedge.exe 87 PID 2316 wrote to memory of 4400 2316 msedge.exe 87 PID 2316 wrote to memory of 4400 2316 msedge.exe 87 PID 2316 wrote to memory of 4400 2316 msedge.exe 87 PID 2316 wrote to memory of 4400 2316 msedge.exe 87 PID 2316 wrote to memory of 4400 2316 msedge.exe 87 PID 2316 wrote to memory of 4400 2316 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\08c528c09ca1ad07839b687b2a14a593_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffbe0146f8,0x7fffbe014708,0x7fffbe0147182⤵PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,4609114265282388306,8226139541659336045,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,4609114265282388306,8226139541659336045,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,4609114265282388306,8226139541659336045,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4609114265282388306,8226139541659336045,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4609114265282388306,8226139541659336045,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:2992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,4609114265282388306,8226139541659336045,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5008 /prefetch:82⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,4609114265282388306,8226139541659336045,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5008 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4609114265282388306,8226139541659336045,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:12⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4609114265282388306,8226139541659336045,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4609114265282388306,8226139541659336045,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4609114265282388306,8226139541659336045,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,4609114265282388306,8226139541659336045,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:464
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1924
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
Filesize
6KB
MD5f643b14693935827957668dcc092f725
SHA182d6e37691a3ba498de35ba6ca0e86203372c29d
SHA25678983843d190b91a58c3629e29a5b0418e06de6bc76d0c9c7588b52ec228805c
SHA512e15de035b6d443c0b6bb033a15d35588de16736c49afabd0cd8c1f5acfcc6e8edb19739a599ccd6c42363f7c21d472b47a362e35b55f2db0ae1d1057cd17536b
-
Filesize
6KB
MD5e96f129dfd743e51660ea80d0162068a
SHA15d7cf73a762dc4195b1d5a69aed39c86d7ffb39d
SHA256ffe486c53c4fcf69799101488e6884ccb31187ea54b4cb0c271863702cd2edbb
SHA512eb0c4cf5f3d5646e67684c0a8a20b4e26569f065bc27c6122210ca9cec52b2c630e17323686d6610f2a3021dc3644111b30e85590d4d852c083ee1d717413e9c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5992ca8222d96735c5a08b29c8b318f12
SHA1083372a77af0eb1c5bc279476e7c06d515f18566
SHA256785643aa50b8abfc6e8068b56fca82667d2532b210b6eb323f5db0c306ea1b3a
SHA512dc22711e19e6dfebcbe34a2d8275b86916d9561f63c8d6358f4454e5229b0b0770b6653d8794d70fca417d1ecffa04087b29b625cb5742347edaddda12459014