Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
03/05/2024, 08:27
Static task
static1
Behavioral task
behavioral1
Sample
101565515b360fd6a155cd523f97e3b1_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
101565515b360fd6a155cd523f97e3b1_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
101565515b360fd6a155cd523f97e3b1_JaffaCakes118.html
-
Size
20KB
-
MD5
101565515b360fd6a155cd523f97e3b1
-
SHA1
fcc01bb1e1f0d6b4274886dece6ef5fa04804dff
-
SHA256
3efd58da5d31bc0dfa9ef3461eec95e50f7afd0e677c4980a3aac816c8fb7d26
-
SHA512
8edddbcf516c160f125e28c3fb9a9f0b41e8dc347a40d2a3b573268762edb3bc4e23233169e7e1d884bb319ad9e1f22a0a86b6e6ecda818341999a20ff110097
-
SSDEEP
384:gmwmO5VX4M3R96tq8uuSsbOZhALwQFy1khrlekJu4M8fr42RRcsDJ9JA:rw/5VX4M3RXxsfpJu4Mo4Q93A
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4960 msedge.exe 4960 msedge.exe 2188 msedge.exe 2188 msedge.exe 2168 identity_helper.exe 2168 identity_helper.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2188 wrote to memory of 1916 2188 msedge.exe 83 PID 2188 wrote to memory of 1916 2188 msedge.exe 83 PID 2188 wrote to memory of 3744 2188 msedge.exe 84 PID 2188 wrote to memory of 3744 2188 msedge.exe 84 PID 2188 wrote to memory of 3744 2188 msedge.exe 84 PID 2188 wrote to memory of 3744 2188 msedge.exe 84 PID 2188 wrote to memory of 3744 2188 msedge.exe 84 PID 2188 wrote to memory of 3744 2188 msedge.exe 84 PID 2188 wrote to memory of 3744 2188 msedge.exe 84 PID 2188 wrote to memory of 3744 2188 msedge.exe 84 PID 2188 wrote to memory of 3744 2188 msedge.exe 84 PID 2188 wrote to memory of 3744 2188 msedge.exe 84 PID 2188 wrote to memory of 3744 2188 msedge.exe 84 PID 2188 wrote to memory of 3744 2188 msedge.exe 84 PID 2188 wrote to memory of 3744 2188 msedge.exe 84 PID 2188 wrote to memory of 3744 2188 msedge.exe 84 PID 2188 wrote to memory of 3744 2188 msedge.exe 84 PID 2188 wrote to memory of 3744 2188 msedge.exe 84 PID 2188 wrote to memory of 3744 2188 msedge.exe 84 PID 2188 wrote to memory of 3744 2188 msedge.exe 84 PID 2188 wrote to memory of 3744 2188 msedge.exe 84 PID 2188 wrote to memory of 3744 2188 msedge.exe 84 PID 2188 wrote to memory of 3744 2188 msedge.exe 84 PID 2188 wrote to memory of 3744 2188 msedge.exe 84 PID 2188 wrote to memory of 3744 2188 msedge.exe 84 PID 2188 wrote to memory of 3744 2188 msedge.exe 84 PID 2188 wrote to memory of 3744 2188 msedge.exe 84 PID 2188 wrote to memory of 3744 2188 msedge.exe 84 PID 2188 wrote to memory of 3744 2188 msedge.exe 84 PID 2188 wrote to memory of 3744 2188 msedge.exe 84 PID 2188 wrote to memory of 3744 2188 msedge.exe 84 PID 2188 wrote to memory of 3744 2188 msedge.exe 84 PID 2188 wrote to memory of 3744 2188 msedge.exe 84 PID 2188 wrote to memory of 3744 2188 msedge.exe 84 PID 2188 wrote to memory of 3744 2188 msedge.exe 84 PID 2188 wrote to memory of 3744 2188 msedge.exe 84 PID 2188 wrote to memory of 3744 2188 msedge.exe 84 PID 2188 wrote to memory of 3744 2188 msedge.exe 84 PID 2188 wrote to memory of 3744 2188 msedge.exe 84 PID 2188 wrote to memory of 3744 2188 msedge.exe 84 PID 2188 wrote to memory of 3744 2188 msedge.exe 84 PID 2188 wrote to memory of 3744 2188 msedge.exe 84 PID 2188 wrote to memory of 4960 2188 msedge.exe 85 PID 2188 wrote to memory of 4960 2188 msedge.exe 85 PID 2188 wrote to memory of 3876 2188 msedge.exe 86 PID 2188 wrote to memory of 3876 2188 msedge.exe 86 PID 2188 wrote to memory of 3876 2188 msedge.exe 86 PID 2188 wrote to memory of 3876 2188 msedge.exe 86 PID 2188 wrote to memory of 3876 2188 msedge.exe 86 PID 2188 wrote to memory of 3876 2188 msedge.exe 86 PID 2188 wrote to memory of 3876 2188 msedge.exe 86 PID 2188 wrote to memory of 3876 2188 msedge.exe 86 PID 2188 wrote to memory of 3876 2188 msedge.exe 86 PID 2188 wrote to memory of 3876 2188 msedge.exe 86 PID 2188 wrote to memory of 3876 2188 msedge.exe 86 PID 2188 wrote to memory of 3876 2188 msedge.exe 86 PID 2188 wrote to memory of 3876 2188 msedge.exe 86 PID 2188 wrote to memory of 3876 2188 msedge.exe 86 PID 2188 wrote to memory of 3876 2188 msedge.exe 86 PID 2188 wrote to memory of 3876 2188 msedge.exe 86 PID 2188 wrote to memory of 3876 2188 msedge.exe 86 PID 2188 wrote to memory of 3876 2188 msedge.exe 86 PID 2188 wrote to memory of 3876 2188 msedge.exe 86 PID 2188 wrote to memory of 3876 2188 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\101565515b360fd6a155cd523f97e3b1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdf95b46f8,0x7ffdf95b4708,0x7ffdf95b47182⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,15944479806949535180,12397678921791849867,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2220,15944479806949535180,12397678921791849867,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2220,15944479806949535180,12397678921791849867,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:82⤵PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,15944479806949535180,12397678921791849867,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,15944479806949535180,12397678921791849867,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,15944479806949535180,12397678921791849867,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5448 /prefetch:82⤵PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,15944479806949535180,12397678921791849867,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5448 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,15944479806949535180,12397678921791849867,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,15944479806949535180,12397678921791849867,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,15944479806949535180,12397678921791849867,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,15944479806949535180,12397678921791849867,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,15944479806949535180,12397678921791849867,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5136 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4400
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5056
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:424
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
Filesize
180B
MD5e75179806fdb60b3337e8cd5b04cd6cf
SHA1434a695c7607996cc4d1a0698d9214afe4d9fd38
SHA256a121c6f8b11a0682ab639049f50ef2a1b00b3a2a565d7686cc64f501056b7b19
SHA512e1e2f888005696fb33453f369efda963c71c15270338db02d812a1ad503c1dfd2a0f693c3f6a02ca2abb7cad631524b0481141646353c7b39adf44b09bf8464f
-
Filesize
6KB
MD5697fb5607715c487ce9c8ae581bfcc3f
SHA1e5fec31084c2472966352ade336b3a3e38f58bfc
SHA256cb2ee6ca3c4dfd4a9dc448acd1c1bb7c86529bf57b08fd2424aea6b949068955
SHA512efbfe6a80988740e38716f4a563b48b879260d31ec88c77a318ce3b0e7d2730ca6eeaa72c76b3cb1c194d93e7b6414d04bf7a7907cffa28830999861b074518c
-
Filesize
5KB
MD52e9195c0514698f2497774f26cbf88a3
SHA1dbeb374ac99ba569d5abbedb261b7f59f9ea1906
SHA2566725d688468b4accfc0d9fed246e4713e727ebff1a1bf4c59e200fa194bb6f57
SHA512d0d220fd47c532b65aa0e0c5433176f348681d63799729d87a1a433f74f4c0dbda1ee05aa76adff28b1bb7c106c5ca562206c4b4c0e4d5881c44ea1d4c466001
-
Filesize
6KB
MD53936c60950fe16ad57f3c9d3a3629b26
SHA18d032d97fba2423855621e5453964dd0ebbeba61
SHA25636d8075c2cbcb1f5edd0a75f9cbc4b5314645761e73203e8fdefeb3503b79e28
SHA512c71ce4f911eed6da844cf79180ac6285c4a59b808ce6d63df5e8bb4b0c3ed67d83c0f3d1caacdb4ea1af61502aec289abddc03882088ed69239e7909f0e4b90c
-
Filesize
372B
MD5f695a56b819fc943153ff9540977f5ad
SHA1fc27034de55a57a4c9c40ee2d6683a5428de1812
SHA256065ae5b4012e59b101e8ca3be8ab7cce86bd3243ce5dbc364b7891b6ea434cf5
SHA51228c12b9a709540e365722bb6efc888970ed0c9b0c42c3bceefad8e46b2bfcd30f7f49feb5c89ceda5dd1eeb97d8846f461f578a2e40e948ca82c9e710611c0f9
-
Filesize
372B
MD542877f81e8eb1053d6612402056275d5
SHA17fd5fb9ecce0c94a5e620d6e3ec15a3137882281
SHA256e9aac06a99d462bec2b36f14965458f317743e64c9499f56feb6fd5247405a8a
SHA5121dacc76824f25444735f4f1e705d0260149ddd48859fac9b6a1839fb4964322049a449e1e54a322ca2c09271b0af96563a554df3f7ab3113f68fb9b0bfa59e7e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5fa44796d1aaff3ab4539d95dc2b42a79
SHA12c4771f03e23e35cfc00131bc09b82d43a698b6a
SHA256ce44b57b800e6e49587e92d5a2baf9a55a27b1d0b565d30d26d167551b00e437
SHA512f5744c7d8d6beeb7d6d83d6fe7ed4c2c74e7ae667af4a10c72a852ce88013643b82c04e337bc2eae4a46b14553ff6828c7a9a359d10971f13c965c9798f12089