Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
03/05/2024, 11:29
Static task
static1
Behavioral task
behavioral1
Sample
1068413b675aad6f0ede450ff8cc8311_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
1068413b675aad6f0ede450ff8cc8311_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
1068413b675aad6f0ede450ff8cc8311_JaffaCakes118.html
-
Size
26KB
-
MD5
1068413b675aad6f0ede450ff8cc8311
-
SHA1
cc76c14d535646b7ce563a6895b9a664bdd8b4d9
-
SHA256
c5a4cf68a4c569c9ca73e0718fe0bbf5a32d180c838316ff680fd843d8aef9c4
-
SHA512
b2a293359d47d18340b7368d1c5daf766254a76e1a42637a0e3e8c8662dd226a7e163ae920b7ef918bfde3e38f859a3817981f37e14d18e2108dfa955fbbe962
-
SSDEEP
192:uq+rLAb5n6OnQjxn5Q/VnQieANnAnQOkEntzP3nQTbnpnQ6CJVevo7Nt3Fo+NzQZ:nAQ/rygcsOKx
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4216 msedge.exe 4216 msedge.exe 1672 msedge.exe 1672 msedge.exe 4368 identity_helper.exe 4368 identity_helper.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1672 wrote to memory of 1496 1672 msedge.exe 84 PID 1672 wrote to memory of 1496 1672 msedge.exe 84 PID 1672 wrote to memory of 904 1672 msedge.exe 85 PID 1672 wrote to memory of 904 1672 msedge.exe 85 PID 1672 wrote to memory of 904 1672 msedge.exe 85 PID 1672 wrote to memory of 904 1672 msedge.exe 85 PID 1672 wrote to memory of 904 1672 msedge.exe 85 PID 1672 wrote to memory of 904 1672 msedge.exe 85 PID 1672 wrote to memory of 904 1672 msedge.exe 85 PID 1672 wrote to memory of 904 1672 msedge.exe 85 PID 1672 wrote to memory of 904 1672 msedge.exe 85 PID 1672 wrote to memory of 904 1672 msedge.exe 85 PID 1672 wrote to memory of 904 1672 msedge.exe 85 PID 1672 wrote to memory of 904 1672 msedge.exe 85 PID 1672 wrote to memory of 904 1672 msedge.exe 85 PID 1672 wrote to memory of 904 1672 msedge.exe 85 PID 1672 wrote to memory of 904 1672 msedge.exe 85 PID 1672 wrote to memory of 904 1672 msedge.exe 85 PID 1672 wrote to memory of 904 1672 msedge.exe 85 PID 1672 wrote to memory of 904 1672 msedge.exe 85 PID 1672 wrote to memory of 904 1672 msedge.exe 85 PID 1672 wrote to memory of 904 1672 msedge.exe 85 PID 1672 wrote to memory of 904 1672 msedge.exe 85 PID 1672 wrote to memory of 904 1672 msedge.exe 85 PID 1672 wrote to memory of 904 1672 msedge.exe 85 PID 1672 wrote to memory of 904 1672 msedge.exe 85 PID 1672 wrote to memory of 904 1672 msedge.exe 85 PID 1672 wrote to memory of 904 1672 msedge.exe 85 PID 1672 wrote to memory of 904 1672 msedge.exe 85 PID 1672 wrote to memory of 904 1672 msedge.exe 85 PID 1672 wrote to memory of 904 1672 msedge.exe 85 PID 1672 wrote to memory of 904 1672 msedge.exe 85 PID 1672 wrote to memory of 904 1672 msedge.exe 85 PID 1672 wrote to memory of 904 1672 msedge.exe 85 PID 1672 wrote to memory of 904 1672 msedge.exe 85 PID 1672 wrote to memory of 904 1672 msedge.exe 85 PID 1672 wrote to memory of 904 1672 msedge.exe 85 PID 1672 wrote to memory of 904 1672 msedge.exe 85 PID 1672 wrote to memory of 904 1672 msedge.exe 85 PID 1672 wrote to memory of 904 1672 msedge.exe 85 PID 1672 wrote to memory of 904 1672 msedge.exe 85 PID 1672 wrote to memory of 904 1672 msedge.exe 85 PID 1672 wrote to memory of 4216 1672 msedge.exe 86 PID 1672 wrote to memory of 4216 1672 msedge.exe 86 PID 1672 wrote to memory of 2124 1672 msedge.exe 87 PID 1672 wrote to memory of 2124 1672 msedge.exe 87 PID 1672 wrote to memory of 2124 1672 msedge.exe 87 PID 1672 wrote to memory of 2124 1672 msedge.exe 87 PID 1672 wrote to memory of 2124 1672 msedge.exe 87 PID 1672 wrote to memory of 2124 1672 msedge.exe 87 PID 1672 wrote to memory of 2124 1672 msedge.exe 87 PID 1672 wrote to memory of 2124 1672 msedge.exe 87 PID 1672 wrote to memory of 2124 1672 msedge.exe 87 PID 1672 wrote to memory of 2124 1672 msedge.exe 87 PID 1672 wrote to memory of 2124 1672 msedge.exe 87 PID 1672 wrote to memory of 2124 1672 msedge.exe 87 PID 1672 wrote to memory of 2124 1672 msedge.exe 87 PID 1672 wrote to memory of 2124 1672 msedge.exe 87 PID 1672 wrote to memory of 2124 1672 msedge.exe 87 PID 1672 wrote to memory of 2124 1672 msedge.exe 87 PID 1672 wrote to memory of 2124 1672 msedge.exe 87 PID 1672 wrote to memory of 2124 1672 msedge.exe 87 PID 1672 wrote to memory of 2124 1672 msedge.exe 87 PID 1672 wrote to memory of 2124 1672 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\1068413b675aad6f0ede450ff8cc8311_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffea46346f8,0x7ffea4634708,0x7ffea46347182⤵PID:1496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,14505240796811044517,9845319761954097904,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,14505240796811044517,9845319761954097904,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2564 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,14505240796811044517,9845319761954097904,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:82⤵PID:2124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14505240796811044517,9845319761954097904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14505240796811044517,9845319761954097904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,14505240796811044517,9845319761954097904,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3228 /prefetch:82⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,14505240796811044517,9845319761954097904,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3228 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14505240796811044517,9845319761954097904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14505240796811044517,9845319761954097904,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14505240796811044517,9845319761954097904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14505240796811044517,9845319761954097904,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,14505240796811044517,9845319761954097904,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4776 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4964
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4368
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58b2290ca03b4ca5fe52d82550c7e7d69
SHA120583a7851a906444204ce8ba4fa51153e6cd494
SHA256f9ff4871fc5317299de907489d466e630be63d698c8f7cb77cc81faddbecc6d2
SHA512704ec8122cc1c263dff67ddbb5c20ee0db8a438674d716bc3be5b266ee5629a219b0049d721f9eb2dd8f2d8fda0163659eaa4d3e1f0a6e9072a8ffb92bb2b25d
-
Filesize
152B
MD5919c29d42fb6034fee2f5de14d573c63
SHA124a2e1042347b3853344157239bde3ed699047a8
SHA25617cd6de97a0c020cb4935739cfef4ec4e074e8d127ac4c531b6dc496580c8141
SHA512bb7eadd087bbcec8b1b8a49b102b454333f2f9708d36b6ffc3c82fdc52e46873398d967238c3bfe9ac6caef45b017a5fe3938ebf5f3053e4ef9be7b2752b563d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\6b7c087f-e4ed-491d-83f8-8429c67a2024.tmp
Filesize5KB
MD5ecbdbff4f292582d9bc715099de391b5
SHA13d5f3abccaf56f12f9d1d59d9d6d35cc96b3e3e2
SHA2563d8f01ddf6467eabf96ec0fbebaabd23ea35a2f69b3f6e2bcab9da434068eaf1
SHA51233dc79d9b98a4ebbc3c267dfaaf74805bef58efb868c3da04952ecfc42e663adfc18d46100d43477b3a7f111960593dcd722d0c58155cdf1cb4a34c0213f6f60
-
Filesize
6KB
MD5e0cb9cfe35649223f92de4c6c964b770
SHA18f248ce22b140885e49ef91d0fa2321d3cda9836
SHA2560cb476b230fed53e7cebb9bd3878c09043e859fc38ea471a9a1c6f277983d8f1
SHA5123c57ecfa849e222262ab548b7d813fff5ad5bf49931cd906fd81a8e0e5a11e05405c0735f27e7e72bafd4fd0b3241a86de498e0aa4c02982a7a6dc9e7b4ec330
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5184e03e833f433e7b745f23e6acd29e3
SHA1ab9d53fb066ddb062d37188f0d567964ac139b73
SHA256d38888382ab5f856e9ed35868bc87cc21600d9f6764726e0733de68abee4a018
SHA5129b80d793ecdddde6fe277e4e3fb74657aa7751d6ec9e7a46616476202a8cc490f50ff94cfe76d0138f5b78264b98cbc93a82030e3f739800212192cbb4ef7540