Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30/04/2024, 05:32
Static task
static1
Behavioral task
behavioral1
Sample
09223496ef9392409c5464c471641659_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
09223496ef9392409c5464c471641659_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
09223496ef9392409c5464c471641659_JaffaCakes118.html
-
Size
61KB
-
MD5
09223496ef9392409c5464c471641659
-
SHA1
85dd9552770e70ad3f8e6f6128557361d0bf0ce1
-
SHA256
52b91a34a7aaca51cea8ca75baf8b2f827a33c316686c94115b4db8b74b3d8fe
-
SHA512
919592a560b21eb0e965926e314ed3791d45e5dc718a870a846d394a7a2d3e04e1ae95e9b58a1e8186ad464680f4b9b4186b1db4e285c7ac8e33adc608f02aec
-
SSDEEP
1536:NV0mwPKe/JniPe6q4bbwUECpQ6mU00FceY8abB9aqO++MET6X:NV0mne/lceBCe0Y82QqOEET6X
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1392 msedge.exe 1392 msedge.exe 4388 msedge.exe 4388 msedge.exe 3376 identity_helper.exe 3376 identity_helper.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4388 wrote to memory of 1372 4388 msedge.exe 84 PID 4388 wrote to memory of 1372 4388 msedge.exe 84 PID 4388 wrote to memory of 3964 4388 msedge.exe 87 PID 4388 wrote to memory of 3964 4388 msedge.exe 87 PID 4388 wrote to memory of 3964 4388 msedge.exe 87 PID 4388 wrote to memory of 3964 4388 msedge.exe 87 PID 4388 wrote to memory of 3964 4388 msedge.exe 87 PID 4388 wrote to memory of 3964 4388 msedge.exe 87 PID 4388 wrote to memory of 3964 4388 msedge.exe 87 PID 4388 wrote to memory of 3964 4388 msedge.exe 87 PID 4388 wrote to memory of 3964 4388 msedge.exe 87 PID 4388 wrote to memory of 3964 4388 msedge.exe 87 PID 4388 wrote to memory of 3964 4388 msedge.exe 87 PID 4388 wrote to memory of 3964 4388 msedge.exe 87 PID 4388 wrote to memory of 3964 4388 msedge.exe 87 PID 4388 wrote to memory of 3964 4388 msedge.exe 87 PID 4388 wrote to memory of 3964 4388 msedge.exe 87 PID 4388 wrote to memory of 3964 4388 msedge.exe 87 PID 4388 wrote to memory of 3964 4388 msedge.exe 87 PID 4388 wrote to memory of 3964 4388 msedge.exe 87 PID 4388 wrote to memory of 3964 4388 msedge.exe 87 PID 4388 wrote to memory of 3964 4388 msedge.exe 87 PID 4388 wrote to memory of 3964 4388 msedge.exe 87 PID 4388 wrote to memory of 3964 4388 msedge.exe 87 PID 4388 wrote to memory of 3964 4388 msedge.exe 87 PID 4388 wrote to memory of 3964 4388 msedge.exe 87 PID 4388 wrote to memory of 3964 4388 msedge.exe 87 PID 4388 wrote to memory of 3964 4388 msedge.exe 87 PID 4388 wrote to memory of 3964 4388 msedge.exe 87 PID 4388 wrote to memory of 3964 4388 msedge.exe 87 PID 4388 wrote to memory of 3964 4388 msedge.exe 87 PID 4388 wrote to memory of 3964 4388 msedge.exe 87 PID 4388 wrote to memory of 3964 4388 msedge.exe 87 PID 4388 wrote to memory of 3964 4388 msedge.exe 87 PID 4388 wrote to memory of 3964 4388 msedge.exe 87 PID 4388 wrote to memory of 3964 4388 msedge.exe 87 PID 4388 wrote to memory of 3964 4388 msedge.exe 87 PID 4388 wrote to memory of 3964 4388 msedge.exe 87 PID 4388 wrote to memory of 3964 4388 msedge.exe 87 PID 4388 wrote to memory of 3964 4388 msedge.exe 87 PID 4388 wrote to memory of 3964 4388 msedge.exe 87 PID 4388 wrote to memory of 3964 4388 msedge.exe 87 PID 4388 wrote to memory of 1392 4388 msedge.exe 88 PID 4388 wrote to memory of 1392 4388 msedge.exe 88 PID 4388 wrote to memory of 1676 4388 msedge.exe 89 PID 4388 wrote to memory of 1676 4388 msedge.exe 89 PID 4388 wrote to memory of 1676 4388 msedge.exe 89 PID 4388 wrote to memory of 1676 4388 msedge.exe 89 PID 4388 wrote to memory of 1676 4388 msedge.exe 89 PID 4388 wrote to memory of 1676 4388 msedge.exe 89 PID 4388 wrote to memory of 1676 4388 msedge.exe 89 PID 4388 wrote to memory of 1676 4388 msedge.exe 89 PID 4388 wrote to memory of 1676 4388 msedge.exe 89 PID 4388 wrote to memory of 1676 4388 msedge.exe 89 PID 4388 wrote to memory of 1676 4388 msedge.exe 89 PID 4388 wrote to memory of 1676 4388 msedge.exe 89 PID 4388 wrote to memory of 1676 4388 msedge.exe 89 PID 4388 wrote to memory of 1676 4388 msedge.exe 89 PID 4388 wrote to memory of 1676 4388 msedge.exe 89 PID 4388 wrote to memory of 1676 4388 msedge.exe 89 PID 4388 wrote to memory of 1676 4388 msedge.exe 89 PID 4388 wrote to memory of 1676 4388 msedge.exe 89 PID 4388 wrote to memory of 1676 4388 msedge.exe 89 PID 4388 wrote to memory of 1676 4388 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\09223496ef9392409c5464c471641659_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x108,0x10c,0x110,0xd8,0x114,0x7ffc835446f8,0x7ffc83544708,0x7ffc835447182⤵PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,6263733810205266406,15334729642173362985,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,6263733810205266406,15334729642173362985,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,6263733810205266406,15334729642173362985,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:82⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,6263733810205266406,15334729642173362985,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,6263733810205266406,15334729642173362985,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,6263733810205266406,15334729642173362985,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:12⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,6263733810205266406,15334729642173362985,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:12⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,6263733810205266406,15334729642173362985,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:1456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,6263733810205266406,15334729642173362985,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6008 /prefetch:82⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,6263733810205266406,15334729642173362985,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6008 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,6263733810205266406,15334729642173362985,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5776 /prefetch:12⤵PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,6263733810205266406,15334729642173362985,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5764 /prefetch:12⤵PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,6263733810205266406,15334729642173362985,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:12⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,6263733810205266406,15334729642173362985,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5748 /prefetch:12⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,6263733810205266406,15334729642173362985,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6044 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3252
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3292
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
709B
MD51fbaa1c22392e99feee2dcb32e068bd9
SHA1062ea2035136b5b41daba4110e46eec23fddded8
SHA256ef54e53682d2116daff97ed19f9f99176ed57e88d82eccec22141ad55ab6de7a
SHA512502a22205f733446ef5530f6b6fa0c37f885c1fb02078621c745a297503c212d0ebdc48874020dc80fcfc0532ea8b580bf98952f308815556364dc47a0b893ed
-
Filesize
6KB
MD509ef8a8e775dd2f8a35e7b3ca575c888
SHA14844709bfa76b9779acf279155ce9b78185bf68a
SHA25650c2f68d6112349d6bfd2c772f4ecc64673127289b89429744f7d49a79489052
SHA51262e36097b3e7d57c57593d03e9867905c72341f17b3883692c2e3d71662e6a0401b5e02d8bad5c57650f61d63d41c0c66b6cc82f8a55fd39f735a9beef66c0e9
-
Filesize
6KB
MD560d7ead80de58cf3d04efc40263c015d
SHA1861c4074875295f09c430c7880a11834967b154a
SHA256df78e32fe58255d2bd44b9f220f29f89f008337837169bdf9d9b278afc8584db
SHA51221375f5cd3ff79fff33e57a6f1a0f6e7f27152e53c6bbeed82a13a3d15c445ed2f6c8dfc5b55c1271f5492d5e767516f20c02a02d5118bdff406123f251c4741
-
Filesize
6KB
MD5a35ef17c1563e92891036ec666bd13c9
SHA1725fd12ba12ab8dfab7ec519d4c5e1dadcc059f1
SHA25683ed70acbd27f90400aac204b12bbbd5a7396eb75b980c74aae37a0f9b14ce37
SHA5121ca87e8e2eb24258a8fcadd3d2b01108706645e8b7be3f27c8195a8b53b56c97c87be68ca319324caae8164791718b4c442890a238bd57fdc81c991fff3505f4
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD579160d7ee93f155d2fb53b165beda85f
SHA1dfa928050cdd26704816b5848c09fa6fbcc6ec4c
SHA2565b8657e80b9caf6582cb129d924f0b03446a2722dfd822396420ee78fcdd4cc7
SHA5129e75eb2d9445b504a873caf1fd9ea0c787949c52c23c0e91b27451be0a5b04a15d03aa7d01895e326b76114f25961414ae7c0af1d4f8db2cc8c8099aa8a52643