Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30/04/2024, 10:09
Static task
static1
Behavioral task
behavioral1
Sample
0993d318d2592374435f22a6b07eeb4a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0993d318d2592374435f22a6b07eeb4a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
0993d318d2592374435f22a6b07eeb4a_JaffaCakes118.html
-
Size
196KB
-
MD5
0993d318d2592374435f22a6b07eeb4a
-
SHA1
9549531bc9e780f464c67b7842dcf9b2635f80e7
-
SHA256
a60bd927cb4603fe7b2d442a46fbcc40fb0ccbbc0c5f887789d8a4ada1051c59
-
SHA512
fb0eb610b63e8b927f372f94c73188d23f6ad885cae096aab865f94eb194a0ff1552a9c89993f197d1eb804b9653b82e7145ee9b3964dd3cc493429d30c5b0bf
-
SSDEEP
6144:m/nX5uOlQsnxugfW+hMQWtctydkUBjZ3rwTVG1J0A7R9D02Ei:m/nX5uOlQsnxugfW+hMQWtcMdkUBjNr5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3976 msedge.exe 3976 msedge.exe 1988 msedge.exe 1988 msedge.exe 3340 identity_helper.exe 3340 identity_helper.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1988 wrote to memory of 2908 1988 msedge.exe 84 PID 1988 wrote to memory of 2908 1988 msedge.exe 84 PID 1988 wrote to memory of 3660 1988 msedge.exe 85 PID 1988 wrote to memory of 3660 1988 msedge.exe 85 PID 1988 wrote to memory of 3660 1988 msedge.exe 85 PID 1988 wrote to memory of 3660 1988 msedge.exe 85 PID 1988 wrote to memory of 3660 1988 msedge.exe 85 PID 1988 wrote to memory of 3660 1988 msedge.exe 85 PID 1988 wrote to memory of 3660 1988 msedge.exe 85 PID 1988 wrote to memory of 3660 1988 msedge.exe 85 PID 1988 wrote to memory of 3660 1988 msedge.exe 85 PID 1988 wrote to memory of 3660 1988 msedge.exe 85 PID 1988 wrote to memory of 3660 1988 msedge.exe 85 PID 1988 wrote to memory of 3660 1988 msedge.exe 85 PID 1988 wrote to memory of 3660 1988 msedge.exe 85 PID 1988 wrote to memory of 3660 1988 msedge.exe 85 PID 1988 wrote to memory of 3660 1988 msedge.exe 85 PID 1988 wrote to memory of 3660 1988 msedge.exe 85 PID 1988 wrote to memory of 3660 1988 msedge.exe 85 PID 1988 wrote to memory of 3660 1988 msedge.exe 85 PID 1988 wrote to memory of 3660 1988 msedge.exe 85 PID 1988 wrote to memory of 3660 1988 msedge.exe 85 PID 1988 wrote to memory of 3660 1988 msedge.exe 85 PID 1988 wrote to memory of 3660 1988 msedge.exe 85 PID 1988 wrote to memory of 3660 1988 msedge.exe 85 PID 1988 wrote to memory of 3660 1988 msedge.exe 85 PID 1988 wrote to memory of 3660 1988 msedge.exe 85 PID 1988 wrote to memory of 3660 1988 msedge.exe 85 PID 1988 wrote to memory of 3660 1988 msedge.exe 85 PID 1988 wrote to memory of 3660 1988 msedge.exe 85 PID 1988 wrote to memory of 3660 1988 msedge.exe 85 PID 1988 wrote to memory of 3660 1988 msedge.exe 85 PID 1988 wrote to memory of 3660 1988 msedge.exe 85 PID 1988 wrote to memory of 3660 1988 msedge.exe 85 PID 1988 wrote to memory of 3660 1988 msedge.exe 85 PID 1988 wrote to memory of 3660 1988 msedge.exe 85 PID 1988 wrote to memory of 3660 1988 msedge.exe 85 PID 1988 wrote to memory of 3660 1988 msedge.exe 85 PID 1988 wrote to memory of 3660 1988 msedge.exe 85 PID 1988 wrote to memory of 3660 1988 msedge.exe 85 PID 1988 wrote to memory of 3660 1988 msedge.exe 85 PID 1988 wrote to memory of 3660 1988 msedge.exe 85 PID 1988 wrote to memory of 3976 1988 msedge.exe 86 PID 1988 wrote to memory of 3976 1988 msedge.exe 86 PID 1988 wrote to memory of 4092 1988 msedge.exe 87 PID 1988 wrote to memory of 4092 1988 msedge.exe 87 PID 1988 wrote to memory of 4092 1988 msedge.exe 87 PID 1988 wrote to memory of 4092 1988 msedge.exe 87 PID 1988 wrote to memory of 4092 1988 msedge.exe 87 PID 1988 wrote to memory of 4092 1988 msedge.exe 87 PID 1988 wrote to memory of 4092 1988 msedge.exe 87 PID 1988 wrote to memory of 4092 1988 msedge.exe 87 PID 1988 wrote to memory of 4092 1988 msedge.exe 87 PID 1988 wrote to memory of 4092 1988 msedge.exe 87 PID 1988 wrote to memory of 4092 1988 msedge.exe 87 PID 1988 wrote to memory of 4092 1988 msedge.exe 87 PID 1988 wrote to memory of 4092 1988 msedge.exe 87 PID 1988 wrote to memory of 4092 1988 msedge.exe 87 PID 1988 wrote to memory of 4092 1988 msedge.exe 87 PID 1988 wrote to memory of 4092 1988 msedge.exe 87 PID 1988 wrote to memory of 4092 1988 msedge.exe 87 PID 1988 wrote to memory of 4092 1988 msedge.exe 87 PID 1988 wrote to memory of 4092 1988 msedge.exe 87 PID 1988 wrote to memory of 4092 1988 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0993d318d2592374435f22a6b07eeb4a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbe6c446f8,0x7ffbe6c44708,0x7ffbe6c447182⤵PID:2908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,4428472092036116619,4523828808439679535,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,4428472092036116619,4523828808439679535,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,4428472092036116619,4523828808439679535,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,4428472092036116619,4523828808439679535,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,4428472092036116619,4523828808439679535,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,4428472092036116619,4523828808439679535,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6132 /prefetch:12⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,4428472092036116619,4523828808439679535,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 /prefetch:82⤵PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,4428472092036116619,4523828808439679535,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,4428472092036116619,4523828808439679535,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,4428472092036116619,4523828808439679535,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5896 /prefetch:12⤵PID:2816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,4428472092036116619,4523828808439679535,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:12⤵PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,4428472092036116619,4523828808439679535,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,4428472092036116619,4523828808439679535,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5932 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2240
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4792
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3128
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
588B
MD573c35fa08ae2f2c6789119f30747e733
SHA1c55612f7104aa21aaa4a8cea531d8a0434bb4ac3
SHA2564eb0e35ec30dbe085b47fe6f995e65ac84b929c369ba85d2102ef9a4ba2caf05
SHA5124d5f2f2143afb1a18d0ea0eb94c1fe319d8a990b7332ff5b200fe970da4055a3d7cf610427b2d97468f5eab134493a3744b19e1985549f34146e251454023968
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD51957fe93b8acdc99159d59ef4dca0350
SHA190ae0b11414b0a69650c6b52e1081d86d900655a
SHA256465b2d295a0dd840304a82b6a6f04abd77db2e8297a0f6d9268dabd23346ce00
SHA51214e8f3d4b34a87c8584c65e92b532e703b6caba08ac0abe46752926b598ba987ff4873dcfbabd4cd12eed48c5ae861c5fc50f28cca61033ebf1685d6683d50c9
-
Filesize
6KB
MD52e8c3113d693b219cf0608395401f532
SHA1ebec25be01e640dd6c4e59d721680e1bbeba36e6
SHA25600bc2f89c678be404e301dc301414888b023b7e5c374f27e8dd8ca24e1688e87
SHA51280acb02f3d5de45aaa26181511a66074528c8a3ebf8bcfaed44ba0258bf3ad81100a7b48d4bf0fba094e8b4ecd82be5549f284ba0e9d4d08c8568c909e471a0b
-
Filesize
6KB
MD58c520f36e6ba4000824ab44bbf0c8f18
SHA1b0a607c8665b8a3a53316502e240c4a75e9b4ecd
SHA256e6ada319d69384471d8d241a24d3baf506247f2a5ca2e6a3118c5ccd88442a30
SHA512e7d09c697d86d8dbe8180a62ff7a036d977b91ce6232236082f55a7ea5bcefba6b1764491d0961792eeb70a3817c7c0539a279a62a2f75a70afb5b66dbe18592
-
Filesize
706B
MD5934c70d4d93adc84504a47e29746914d
SHA1f072631bedf240e8b29d9395372a508ed63b628c
SHA256ea05393d4f0e545a3568f9200e32fbb740f6a320c9b2079e41b2d70a5c5d0f94
SHA5127216ed822097bcca4f803bb39b89ce8578d59dd47ece5514a37160d63da5305bb25fbf36558d87fb55d8d4b1a55e7c3f404decf26c9ac763a032a06441c36de6
-
Filesize
706B
MD5d416ea499fddff2af964c4aab9286857
SHA149668faa12c84c71e0a61b06210a45d9454c972e
SHA2567316417f0bdf1894efeb30f4881e7fd69e02d49e35e200b0c982e291e842c7fc
SHA512b1724f450ead66f82be5c5d1e70a5d57f026eae17d5f0480712d1872b4f3a93d81497a70c31f442c84309fb89c3322f22410c9b7d5aa1f8c81e742eca641b953
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD563331c48d3211f55cd0545583909b8cd
SHA19b1d97a5fbed095d87125e2b631bb804a4b57289
SHA256389a382ee2760239c5e32a7d84e84775eca453d55f680050f914e037fc9c93a7
SHA512406736b304ffb53c0b81d3e1bb7228b9f1d73d0b1c235a0d8ef98c0649598fd5263a2b29a434a58da2f89527d5ebdb64e6e63e9a6aa4bd12aef856ff7de1d73a