Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
03-05-2024 08:43
Static task
static1
Behavioral task
behavioral1
Sample
101cda2df0f4139cc58f630358cac28e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
101cda2df0f4139cc58f630358cac28e_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
101cda2df0f4139cc58f630358cac28e_JaffaCakes118.html
-
Size
61KB
-
MD5
101cda2df0f4139cc58f630358cac28e
-
SHA1
fb924e4761923624e2780882932e7bb2dec24238
-
SHA256
5b8712f099bcde4158682f1fc23fd6e7b5d6b84c27f66ff2ae50898567d2306c
-
SHA512
cc033b3d4e9c431832c7c038e6faf3b6d6fcda96770a2b616bbc453ac4f2a582dff529e5ddec619ee27e19c9a6e41cf92737e0dac5d3f2287918beeba88740eb
-
SSDEEP
1536:jEBzsbBjb0oet+DZaMkvww26rHEd5bKIU7LgP2d:jERsHD02Eg5bDU7z
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5032 msedge.exe 5032 msedge.exe 808 msedge.exe 808 msedge.exe 4868 identity_helper.exe 4868 identity_helper.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 808 wrote to memory of 1316 808 msedge.exe 84 PID 808 wrote to memory of 1316 808 msedge.exe 84 PID 808 wrote to memory of 1528 808 msedge.exe 85 PID 808 wrote to memory of 1528 808 msedge.exe 85 PID 808 wrote to memory of 1528 808 msedge.exe 85 PID 808 wrote to memory of 1528 808 msedge.exe 85 PID 808 wrote to memory of 1528 808 msedge.exe 85 PID 808 wrote to memory of 1528 808 msedge.exe 85 PID 808 wrote to memory of 1528 808 msedge.exe 85 PID 808 wrote to memory of 1528 808 msedge.exe 85 PID 808 wrote to memory of 1528 808 msedge.exe 85 PID 808 wrote to memory of 1528 808 msedge.exe 85 PID 808 wrote to memory of 1528 808 msedge.exe 85 PID 808 wrote to memory of 1528 808 msedge.exe 85 PID 808 wrote to memory of 1528 808 msedge.exe 85 PID 808 wrote to memory of 1528 808 msedge.exe 85 PID 808 wrote to memory of 1528 808 msedge.exe 85 PID 808 wrote to memory of 1528 808 msedge.exe 85 PID 808 wrote to memory of 1528 808 msedge.exe 85 PID 808 wrote to memory of 1528 808 msedge.exe 85 PID 808 wrote to memory of 1528 808 msedge.exe 85 PID 808 wrote to memory of 1528 808 msedge.exe 85 PID 808 wrote to memory of 1528 808 msedge.exe 85 PID 808 wrote to memory of 1528 808 msedge.exe 85 PID 808 wrote to memory of 1528 808 msedge.exe 85 PID 808 wrote to memory of 1528 808 msedge.exe 85 PID 808 wrote to memory of 1528 808 msedge.exe 85 PID 808 wrote to memory of 1528 808 msedge.exe 85 PID 808 wrote to memory of 1528 808 msedge.exe 85 PID 808 wrote to memory of 1528 808 msedge.exe 85 PID 808 wrote to memory of 1528 808 msedge.exe 85 PID 808 wrote to memory of 1528 808 msedge.exe 85 PID 808 wrote to memory of 1528 808 msedge.exe 85 PID 808 wrote to memory of 1528 808 msedge.exe 85 PID 808 wrote to memory of 1528 808 msedge.exe 85 PID 808 wrote to memory of 1528 808 msedge.exe 85 PID 808 wrote to memory of 1528 808 msedge.exe 85 PID 808 wrote to memory of 1528 808 msedge.exe 85 PID 808 wrote to memory of 1528 808 msedge.exe 85 PID 808 wrote to memory of 1528 808 msedge.exe 85 PID 808 wrote to memory of 1528 808 msedge.exe 85 PID 808 wrote to memory of 1528 808 msedge.exe 85 PID 808 wrote to memory of 5032 808 msedge.exe 86 PID 808 wrote to memory of 5032 808 msedge.exe 86 PID 808 wrote to memory of 4968 808 msedge.exe 87 PID 808 wrote to memory of 4968 808 msedge.exe 87 PID 808 wrote to memory of 4968 808 msedge.exe 87 PID 808 wrote to memory of 4968 808 msedge.exe 87 PID 808 wrote to memory of 4968 808 msedge.exe 87 PID 808 wrote to memory of 4968 808 msedge.exe 87 PID 808 wrote to memory of 4968 808 msedge.exe 87 PID 808 wrote to memory of 4968 808 msedge.exe 87 PID 808 wrote to memory of 4968 808 msedge.exe 87 PID 808 wrote to memory of 4968 808 msedge.exe 87 PID 808 wrote to memory of 4968 808 msedge.exe 87 PID 808 wrote to memory of 4968 808 msedge.exe 87 PID 808 wrote to memory of 4968 808 msedge.exe 87 PID 808 wrote to memory of 4968 808 msedge.exe 87 PID 808 wrote to memory of 4968 808 msedge.exe 87 PID 808 wrote to memory of 4968 808 msedge.exe 87 PID 808 wrote to memory of 4968 808 msedge.exe 87 PID 808 wrote to memory of 4968 808 msedge.exe 87 PID 808 wrote to memory of 4968 808 msedge.exe 87 PID 808 wrote to memory of 4968 808 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\101cda2df0f4139cc58f630358cac28e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffae8446f8,0x7fffae844708,0x7fffae8447182⤵PID:1316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,7123373759206516086,16264996479034215332,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,7123373759206516086,16264996479034215332,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,7123373759206516086,16264996479034215332,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2624 /prefetch:82⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,7123373759206516086,16264996479034215332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,7123373759206516086,16264996479034215332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,7123373759206516086,16264996479034215332,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 /prefetch:82⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,7123373759206516086,16264996479034215332,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,7123373759206516086,16264996479034215332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,7123373759206516086,16264996479034215332,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,7123373759206516086,16264996479034215332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,7123373759206516086,16264996479034215332,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,7123373759206516086,16264996479034215332,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5764 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:748
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3780
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
Filesize
5KB
MD5a6d3e2ed05b8daa4c753f66d53275246
SHA15dbfc180b0ea0021b6be73cd73e5a1ca8018a515
SHA256ac45a4aebc2e07d02c90b4d4adae289389aec12a9c148074d1791d8450cd01d3
SHA5123e2abdefe2be52b23b8a7001108be0dc8ba590f42db409f5ea2cc9f0142b479de472b45b6e9e0a2fce81976de75ec1c04542bfd55e2ff2fab460dc0c98b54a21
-
Filesize
6KB
MD5fe63e240259c6974d1ae5f17a8244d97
SHA160d2bd621014c29ddac11ce660e7ae0ab5fddbd9
SHA256bcf99e2409e9dcccb4106791223f88fa1ce98046ec178f96eb17625796e7d691
SHA512e787a63205dc1012297f41d2c7e30fe0b6835b7240076d1e391670e4416e4b9666b21dcb2e230cbb52894e0974eae25aa7cb2969814009bcc352f95680febebd
-
Filesize
6KB
MD587df26610da88b3c982710d6f5e2d5b1
SHA1dc1b23eabe4572d3a347996504c884bf7fa7afda
SHA256e8022b97b732e7650354c0424e8757fe7368293f78e1043531d0392d95d2f291
SHA512f045f95dfd0e192d8ed979cdb3a5a410590fcc22a40ead172129f86ab074c8773f97cd6854c5233822f9ed0e23d9519afac669a976b0cd8fa49ef74466d7161e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f1a0ae29f1c32d635293679792bc5da2
SHA15569e09004ba649514114b5f158d20e9e29153b7
SHA256a850ce558a29e909805447c784a20828e478c6da8a57f4a93d5e5be8b768aab4
SHA51201032f547a264eed78d2326fc91c2a20a7d77fb647c4d0ee288380ef0fcf13659038d754fe7265c31613c0e2391a07d9b389e83c1157a0aee73b5f4e87da1a94