Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
30-04-2024 06:53
Static task
static1
Behavioral task
behavioral1
Sample
0945c262d5bae5833fa456b4a01b3abf_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0945c262d5bae5833fa456b4a01b3abf_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0945c262d5bae5833fa456b4a01b3abf_JaffaCakes118.html
-
Size
460KB
-
MD5
0945c262d5bae5833fa456b4a01b3abf
-
SHA1
ddc67d0d306821d9b3e9e2bd5c9396c2f7574a98
-
SHA256
78eba4c1c1f0a60f1fd6b385b997627e4037c4f171c456430ca5e6d597d31608
-
SHA512
6c0662a8253d908200f1b7ce24688e4d3c27d08da38dc56028e3d066820c9de2139895c78827dab12340366f2ee78078a5c6b1ec5a8037d2ebc2a7c19aa4adfc
-
SSDEEP
6144:SisMYod+X3oI+Y7XsMYod+X3oI+Y2sMYod+X3oI+YLsMYod+X3oI+YQ:35d+X3575d+X3S5d+X315d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2016 msedge.exe 2016 msedge.exe 1092 msedge.exe 1092 msedge.exe 4148 identity_helper.exe 4148 identity_helper.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1092 wrote to memory of 3408 1092 msedge.exe 83 PID 1092 wrote to memory of 3408 1092 msedge.exe 83 PID 1092 wrote to memory of 3348 1092 msedge.exe 84 PID 1092 wrote to memory of 3348 1092 msedge.exe 84 PID 1092 wrote to memory of 3348 1092 msedge.exe 84 PID 1092 wrote to memory of 3348 1092 msedge.exe 84 PID 1092 wrote to memory of 3348 1092 msedge.exe 84 PID 1092 wrote to memory of 3348 1092 msedge.exe 84 PID 1092 wrote to memory of 3348 1092 msedge.exe 84 PID 1092 wrote to memory of 3348 1092 msedge.exe 84 PID 1092 wrote to memory of 3348 1092 msedge.exe 84 PID 1092 wrote to memory of 3348 1092 msedge.exe 84 PID 1092 wrote to memory of 3348 1092 msedge.exe 84 PID 1092 wrote to memory of 3348 1092 msedge.exe 84 PID 1092 wrote to memory of 3348 1092 msedge.exe 84 PID 1092 wrote to memory of 3348 1092 msedge.exe 84 PID 1092 wrote to memory of 3348 1092 msedge.exe 84 PID 1092 wrote to memory of 3348 1092 msedge.exe 84 PID 1092 wrote to memory of 3348 1092 msedge.exe 84 PID 1092 wrote to memory of 3348 1092 msedge.exe 84 PID 1092 wrote to memory of 3348 1092 msedge.exe 84 PID 1092 wrote to memory of 3348 1092 msedge.exe 84 PID 1092 wrote to memory of 3348 1092 msedge.exe 84 PID 1092 wrote to memory of 3348 1092 msedge.exe 84 PID 1092 wrote to memory of 3348 1092 msedge.exe 84 PID 1092 wrote to memory of 3348 1092 msedge.exe 84 PID 1092 wrote to memory of 3348 1092 msedge.exe 84 PID 1092 wrote to memory of 3348 1092 msedge.exe 84 PID 1092 wrote to memory of 3348 1092 msedge.exe 84 PID 1092 wrote to memory of 3348 1092 msedge.exe 84 PID 1092 wrote to memory of 3348 1092 msedge.exe 84 PID 1092 wrote to memory of 3348 1092 msedge.exe 84 PID 1092 wrote to memory of 3348 1092 msedge.exe 84 PID 1092 wrote to memory of 3348 1092 msedge.exe 84 PID 1092 wrote to memory of 3348 1092 msedge.exe 84 PID 1092 wrote to memory of 3348 1092 msedge.exe 84 PID 1092 wrote to memory of 3348 1092 msedge.exe 84 PID 1092 wrote to memory of 3348 1092 msedge.exe 84 PID 1092 wrote to memory of 3348 1092 msedge.exe 84 PID 1092 wrote to memory of 3348 1092 msedge.exe 84 PID 1092 wrote to memory of 3348 1092 msedge.exe 84 PID 1092 wrote to memory of 3348 1092 msedge.exe 84 PID 1092 wrote to memory of 2016 1092 msedge.exe 85 PID 1092 wrote to memory of 2016 1092 msedge.exe 85 PID 1092 wrote to memory of 3104 1092 msedge.exe 86 PID 1092 wrote to memory of 3104 1092 msedge.exe 86 PID 1092 wrote to memory of 3104 1092 msedge.exe 86 PID 1092 wrote to memory of 3104 1092 msedge.exe 86 PID 1092 wrote to memory of 3104 1092 msedge.exe 86 PID 1092 wrote to memory of 3104 1092 msedge.exe 86 PID 1092 wrote to memory of 3104 1092 msedge.exe 86 PID 1092 wrote to memory of 3104 1092 msedge.exe 86 PID 1092 wrote to memory of 3104 1092 msedge.exe 86 PID 1092 wrote to memory of 3104 1092 msedge.exe 86 PID 1092 wrote to memory of 3104 1092 msedge.exe 86 PID 1092 wrote to memory of 3104 1092 msedge.exe 86 PID 1092 wrote to memory of 3104 1092 msedge.exe 86 PID 1092 wrote to memory of 3104 1092 msedge.exe 86 PID 1092 wrote to memory of 3104 1092 msedge.exe 86 PID 1092 wrote to memory of 3104 1092 msedge.exe 86 PID 1092 wrote to memory of 3104 1092 msedge.exe 86 PID 1092 wrote to memory of 3104 1092 msedge.exe 86 PID 1092 wrote to memory of 3104 1092 msedge.exe 86 PID 1092 wrote to memory of 3104 1092 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0945c262d5bae5833fa456b4a01b3abf_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff957be46f8,0x7ff957be4708,0x7ff957be47182⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,2761062764098817489,12261852388643143576,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,2761062764098817489,12261852388643143576,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,2761062764098817489,12261852388643143576,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2761062764098817489,12261852388643143576,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2761062764098817489,12261852388643143576,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,2761062764098817489,12261852388643143576,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4964 /prefetch:82⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,2761062764098817489,12261852388643143576,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4964 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2761062764098817489,12261852388643143576,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4896 /prefetch:12⤵PID:2552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2761062764098817489,12261852388643143576,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:12⤵PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2761062764098817489,12261852388643143576,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4164 /prefetch:12⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2761062764098817489,12261852388643143576,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3484 /prefetch:12⤵PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,2761062764098817489,12261852388643143576,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1976 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:116
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4380
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
Filesize
6KB
MD5e305a0b67720e6541c958e4f0e21f736
SHA18f6a943e21239f11823dc35ddc11e31d566fb421
SHA256f6dd91850f42c846c3aef51b65c71eee211975e1075f7c1791057db35da4c22d
SHA512cde2f480f94d127dc8bfd205d0abcf212df331a7b8093e95fb270ce2a7395876825120314953d4aca9f47d0f033c99e480bf9e8bb6513052498a740656437303
-
Filesize
6KB
MD5e5532034d94fc8783b8250aee6bf86e9
SHA18e12b7a480ba3e6bbbf249d7c84ae8de7c475edc
SHA25685aafabc05cd06ad33e2ad56662e93ffb432674a02886dac98f5b727096c1fa8
SHA5126dcaccccb86e31527874f50488503187b764be0593fc9a24938ebbc2513abb08a040e1921b9bb8846da60c03ef1a280eea00da9fc1dfa91418f41913e2303cab
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD598b827b0eaa5e18b3289865b47f59304
SHA1c3559fd5232ce5e3d3ef19f1de05961eff868f03
SHA256fac92f80a04e1bc139c790967f27359eb9731e887f5143a05d62fa34473f5476
SHA5121729c198a819c829b45413a0c113925155e6d9f2d27ac46cb18d754d504099fb5fccfae9e7bdbcc5b92cf4dd681e795c1260fecbc3043b0c83d9035826214cf4