Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
30-04-2024 13:19
Static task
static1
Behavioral task
behavioral1
Sample
09da306a4e94c558466523413bba482f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
09da306a4e94c558466523413bba482f_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
09da306a4e94c558466523413bba482f_JaffaCakes118.html
-
Size
32KB
-
MD5
09da306a4e94c558466523413bba482f
-
SHA1
b7977b8d0a9e68bc6a29ee3c6945eedc84dff05c
-
SHA256
5d25ee294cf37457a9da0ebf8717b18759d5d7b1f690a5311c690d066a169343
-
SHA512
69d5a8336d8b7feb139a25d3eecf52a63c80e6a951cb7672b0ad2854b5a17e4f078767394233353786ffb360c4a4fe8f6c44a7ddbc54fb0b80b654ddfbfa4976
-
SSDEEP
192:SHBxPDBM95qrCXtbcobXE3amJ+1xPEs1nN1NXet5uRtyO4bWMdm4ikzYtPEJHKu2:Sh495K5wJcml0cruMfYN8/lD
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2888 msedge.exe 2888 msedge.exe 5100 msedge.exe 5100 msedge.exe 3028 identity_helper.exe 3028 identity_helper.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5100 wrote to memory of 3540 5100 msedge.exe 85 PID 5100 wrote to memory of 3540 5100 msedge.exe 85 PID 5100 wrote to memory of 640 5100 msedge.exe 86 PID 5100 wrote to memory of 640 5100 msedge.exe 86 PID 5100 wrote to memory of 640 5100 msedge.exe 86 PID 5100 wrote to memory of 640 5100 msedge.exe 86 PID 5100 wrote to memory of 640 5100 msedge.exe 86 PID 5100 wrote to memory of 640 5100 msedge.exe 86 PID 5100 wrote to memory of 640 5100 msedge.exe 86 PID 5100 wrote to memory of 640 5100 msedge.exe 86 PID 5100 wrote to memory of 640 5100 msedge.exe 86 PID 5100 wrote to memory of 640 5100 msedge.exe 86 PID 5100 wrote to memory of 640 5100 msedge.exe 86 PID 5100 wrote to memory of 640 5100 msedge.exe 86 PID 5100 wrote to memory of 640 5100 msedge.exe 86 PID 5100 wrote to memory of 640 5100 msedge.exe 86 PID 5100 wrote to memory of 640 5100 msedge.exe 86 PID 5100 wrote to memory of 640 5100 msedge.exe 86 PID 5100 wrote to memory of 640 5100 msedge.exe 86 PID 5100 wrote to memory of 640 5100 msedge.exe 86 PID 5100 wrote to memory of 640 5100 msedge.exe 86 PID 5100 wrote to memory of 640 5100 msedge.exe 86 PID 5100 wrote to memory of 640 5100 msedge.exe 86 PID 5100 wrote to memory of 640 5100 msedge.exe 86 PID 5100 wrote to memory of 640 5100 msedge.exe 86 PID 5100 wrote to memory of 640 5100 msedge.exe 86 PID 5100 wrote to memory of 640 5100 msedge.exe 86 PID 5100 wrote to memory of 640 5100 msedge.exe 86 PID 5100 wrote to memory of 640 5100 msedge.exe 86 PID 5100 wrote to memory of 640 5100 msedge.exe 86 PID 5100 wrote to memory of 640 5100 msedge.exe 86 PID 5100 wrote to memory of 640 5100 msedge.exe 86 PID 5100 wrote to memory of 640 5100 msedge.exe 86 PID 5100 wrote to memory of 640 5100 msedge.exe 86 PID 5100 wrote to memory of 640 5100 msedge.exe 86 PID 5100 wrote to memory of 640 5100 msedge.exe 86 PID 5100 wrote to memory of 640 5100 msedge.exe 86 PID 5100 wrote to memory of 640 5100 msedge.exe 86 PID 5100 wrote to memory of 640 5100 msedge.exe 86 PID 5100 wrote to memory of 640 5100 msedge.exe 86 PID 5100 wrote to memory of 640 5100 msedge.exe 86 PID 5100 wrote to memory of 640 5100 msedge.exe 86 PID 5100 wrote to memory of 2888 5100 msedge.exe 87 PID 5100 wrote to memory of 2888 5100 msedge.exe 87 PID 5100 wrote to memory of 2180 5100 msedge.exe 88 PID 5100 wrote to memory of 2180 5100 msedge.exe 88 PID 5100 wrote to memory of 2180 5100 msedge.exe 88 PID 5100 wrote to memory of 2180 5100 msedge.exe 88 PID 5100 wrote to memory of 2180 5100 msedge.exe 88 PID 5100 wrote to memory of 2180 5100 msedge.exe 88 PID 5100 wrote to memory of 2180 5100 msedge.exe 88 PID 5100 wrote to memory of 2180 5100 msedge.exe 88 PID 5100 wrote to memory of 2180 5100 msedge.exe 88 PID 5100 wrote to memory of 2180 5100 msedge.exe 88 PID 5100 wrote to memory of 2180 5100 msedge.exe 88 PID 5100 wrote to memory of 2180 5100 msedge.exe 88 PID 5100 wrote to memory of 2180 5100 msedge.exe 88 PID 5100 wrote to memory of 2180 5100 msedge.exe 88 PID 5100 wrote to memory of 2180 5100 msedge.exe 88 PID 5100 wrote to memory of 2180 5100 msedge.exe 88 PID 5100 wrote to memory of 2180 5100 msedge.exe 88 PID 5100 wrote to memory of 2180 5100 msedge.exe 88 PID 5100 wrote to memory of 2180 5100 msedge.exe 88 PID 5100 wrote to memory of 2180 5100 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\09da306a4e94c558466523413bba482f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff297346f8,0x7fff29734708,0x7fff297347182⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1972,15981265901908372281,17874750462096520234,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1972,15981265901908372281,17874750462096520234,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1972,15981265901908372281,17874750462096520234,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,15981265901908372281,17874750462096520234,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,15981265901908372281,17874750462096520234,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1972,15981265901908372281,17874750462096520234,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4464 /prefetch:82⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1972,15981265901908372281,17874750462096520234,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4464 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,15981265901908372281,17874750462096520234,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4460 /prefetch:12⤵PID:884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,15981265901908372281,17874750462096520234,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,15981265901908372281,17874750462096520234,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,15981265901908372281,17874750462096520234,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3564 /prefetch:12⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1972,15981265901908372281,17874750462096520234,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4436 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4984
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4392
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dbac49e66219979194c79f1cf1cb3dd1
SHA14ef87804a04d51ae1fac358f92382548b27f62f2
SHA256f24ed6c5bf4b734a9af4d64e14a80a160bea569f50849f70bf7b7277c4f48562
SHA512bb314d61f53cf7774f6dfb6b772c72f5daf386bc3d27d2bb7a14c65848ee86e6c48e9c5696693ded31846b69b9372a530175df48494e3d61a228e49d43401ad1
-
Filesize
152B
MD5a9e55f5864d6e2afd2fd84e25a3bc228
SHA1a5efcff9e3df6252c7fe8535d505235f82aab276
SHA2560f4df3120e4620555916be8e51c29be8d600d68ae5244efad6a0268aabc8c452
SHA51212f45fa73a6de6dfe17acc8b52b60f2d79008da130730b74cc138c1dcd73ccc99487165e3c8c90dc247359fde272f1ec6b3cf2c5fcb04e5093936144d0558b75
-
Filesize
6KB
MD5719aa63a271cc84466c33860c53689a5
SHA1a067fab945bf4ba502496d9a6907fe684cc87f4b
SHA2567c56b536bfa43e34c521fa2dbe41b15350a1b07819f7909e7d4240f88d1fbb92
SHA5124f4007e7c118e73fed5f63725c9567f2b2abb914e963b857428ba61c9cf65fffb3b617276987744ced6273d77a37606a47366ae1edfd3381b00e7a08048e0d81
-
Filesize
6KB
MD5f579862164d39f5b249359ce0069ac65
SHA10b45102da0b2f93d203553b45b328c8ab393ae53
SHA25602b428025646461cc5dffb833c81fe51be78c55bfa3a9a51b0ae57bde6b81cf2
SHA51257250827dfc0f8831a3c458c6fd0245a34d34f24fd537b85d1cb8287c01c9caa320244416af2f055eab08997baa00e0451ef36bd765d9c18cb038ceb5bccab9b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5357c2616c93599ef751ed70c81abe988
SHA18376705ebf7cdb41ed8f161b231651af9a93af85
SHA2563376a25d87e6a1e1f8b1f3498aa8e41f4657b7feb62631fe24c5917beb11722e
SHA512b32a8ae1f2b83224539197dd0858b6fed7b3d6a06a7bb601d67b337f2cabaad969f5f10cb031a19f9a2ac4c152ef32021cbae2e5f2a115c605de706a51aa620d