Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04-05-2024 03:27
Static task
static1
Behavioral task
behavioral1
Sample
115c64d1bba37fa910e1c1bfc83350a7_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
115c64d1bba37fa910e1c1bfc83350a7_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
115c64d1bba37fa910e1c1bfc83350a7_JaffaCakes118.html
-
Size
46KB
-
MD5
115c64d1bba37fa910e1c1bfc83350a7
-
SHA1
cf2c80caa56b1ed46008b961a6357ca99db03868
-
SHA256
c515b1c7c99ac9430d4f521c8957a8dc9ea0a1fa1c0e15492868b0799facb4c5
-
SHA512
02aaadc808c6b11eeb70ee066d95f4337e08d78419958fb0f20c100d4b94ac4288ac8ad0f427af2339d35015fcd8e678c370a251aa2c3f96a6e44406e15f6ed4
-
SSDEEP
768:/Uk4NfQAyOwgWcsUX8W0aCjy1xahLmerXEy/qFzSsf0bm6mS5A8IULZ/7ECLE7K2:ck4NfQAyOwgWdg8taCjy1xOLmerUy/qj
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 956 msedge.exe 956 msedge.exe 3476 msedge.exe 3476 msedge.exe 840 identity_helper.exe 840 identity_helper.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3476 wrote to memory of 512 3476 msedge.exe 84 PID 3476 wrote to memory of 512 3476 msedge.exe 84 PID 3476 wrote to memory of 4864 3476 msedge.exe 85 PID 3476 wrote to memory of 4864 3476 msedge.exe 85 PID 3476 wrote to memory of 4864 3476 msedge.exe 85 PID 3476 wrote to memory of 4864 3476 msedge.exe 85 PID 3476 wrote to memory of 4864 3476 msedge.exe 85 PID 3476 wrote to memory of 4864 3476 msedge.exe 85 PID 3476 wrote to memory of 4864 3476 msedge.exe 85 PID 3476 wrote to memory of 4864 3476 msedge.exe 85 PID 3476 wrote to memory of 4864 3476 msedge.exe 85 PID 3476 wrote to memory of 4864 3476 msedge.exe 85 PID 3476 wrote to memory of 4864 3476 msedge.exe 85 PID 3476 wrote to memory of 4864 3476 msedge.exe 85 PID 3476 wrote to memory of 4864 3476 msedge.exe 85 PID 3476 wrote to memory of 4864 3476 msedge.exe 85 PID 3476 wrote to memory of 4864 3476 msedge.exe 85 PID 3476 wrote to memory of 4864 3476 msedge.exe 85 PID 3476 wrote to memory of 4864 3476 msedge.exe 85 PID 3476 wrote to memory of 4864 3476 msedge.exe 85 PID 3476 wrote to memory of 4864 3476 msedge.exe 85 PID 3476 wrote to memory of 4864 3476 msedge.exe 85 PID 3476 wrote to memory of 4864 3476 msedge.exe 85 PID 3476 wrote to memory of 4864 3476 msedge.exe 85 PID 3476 wrote to memory of 4864 3476 msedge.exe 85 PID 3476 wrote to memory of 4864 3476 msedge.exe 85 PID 3476 wrote to memory of 4864 3476 msedge.exe 85 PID 3476 wrote to memory of 4864 3476 msedge.exe 85 PID 3476 wrote to memory of 4864 3476 msedge.exe 85 PID 3476 wrote to memory of 4864 3476 msedge.exe 85 PID 3476 wrote to memory of 4864 3476 msedge.exe 85 PID 3476 wrote to memory of 4864 3476 msedge.exe 85 PID 3476 wrote to memory of 4864 3476 msedge.exe 85 PID 3476 wrote to memory of 4864 3476 msedge.exe 85 PID 3476 wrote to memory of 4864 3476 msedge.exe 85 PID 3476 wrote to memory of 4864 3476 msedge.exe 85 PID 3476 wrote to memory of 4864 3476 msedge.exe 85 PID 3476 wrote to memory of 4864 3476 msedge.exe 85 PID 3476 wrote to memory of 4864 3476 msedge.exe 85 PID 3476 wrote to memory of 4864 3476 msedge.exe 85 PID 3476 wrote to memory of 4864 3476 msedge.exe 85 PID 3476 wrote to memory of 4864 3476 msedge.exe 85 PID 3476 wrote to memory of 956 3476 msedge.exe 86 PID 3476 wrote to memory of 956 3476 msedge.exe 86 PID 3476 wrote to memory of 912 3476 msedge.exe 87 PID 3476 wrote to memory of 912 3476 msedge.exe 87 PID 3476 wrote to memory of 912 3476 msedge.exe 87 PID 3476 wrote to memory of 912 3476 msedge.exe 87 PID 3476 wrote to memory of 912 3476 msedge.exe 87 PID 3476 wrote to memory of 912 3476 msedge.exe 87 PID 3476 wrote to memory of 912 3476 msedge.exe 87 PID 3476 wrote to memory of 912 3476 msedge.exe 87 PID 3476 wrote to memory of 912 3476 msedge.exe 87 PID 3476 wrote to memory of 912 3476 msedge.exe 87 PID 3476 wrote to memory of 912 3476 msedge.exe 87 PID 3476 wrote to memory of 912 3476 msedge.exe 87 PID 3476 wrote to memory of 912 3476 msedge.exe 87 PID 3476 wrote to memory of 912 3476 msedge.exe 87 PID 3476 wrote to memory of 912 3476 msedge.exe 87 PID 3476 wrote to memory of 912 3476 msedge.exe 87 PID 3476 wrote to memory of 912 3476 msedge.exe 87 PID 3476 wrote to memory of 912 3476 msedge.exe 87 PID 3476 wrote to memory of 912 3476 msedge.exe 87 PID 3476 wrote to memory of 912 3476 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\115c64d1bba37fa910e1c1bfc83350a7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff36cc46f8,0x7fff36cc4708,0x7fff36cc47182⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2240,2707545712259057141,13631089450338711803,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1996 /prefetch:22⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2240,2707545712259057141,13631089450338711803,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2240,2707545712259057141,13631089450338711803,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵PID:912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,2707545712259057141,13631089450338711803,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,2707545712259057141,13631089450338711803,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2240,2707545712259057141,13631089450338711803,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5316 /prefetch:82⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2240,2707545712259057141,13631089450338711803,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5316 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,2707545712259057141,13631089450338711803,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,2707545712259057141,13631089450338711803,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,2707545712259057141,13631089450338711803,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,2707545712259057141,13631089450338711803,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2240,2707545712259057141,13631089450338711803,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4824 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:264
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1416
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\5c0fc201-031e-45c9-8e3e-06c66139a643.tmp
Filesize6KB
MD5ca6ccaaef01991099b4fe549661810af
SHA12becaca7d26788cff4e17197e5b494e336fc2cd0
SHA2564485dc75cdbe637811f7019aa30c6217b57bf447682aaabee0b4933e264703dd
SHA51298a11608a776c0bbbca5a567f0da5e602d88bcc0b052cf21e68767336aeed779df5676aff7772674fa25ca26fa1025aa93db103a2f22079c71f220902b65efef
-
Filesize
454B
MD5aca097d35a7c1ef4d4be5e8c1175cc70
SHA1cde5a545403b2fe0b28696a646278b0d66febe3b
SHA256a60f9d42d059a6c6b7ca80b91180be2964c992f494e4600df09ee8d92b245543
SHA51227c1a530d3166dd605b0d6ca83e8160a3000cf456457f9cc20d71a4170ea01ab34b601b32de082e265b33d9951c5d43252e7530b4bf10d0fba4b539d6c0fd121
-
Filesize
5KB
MD5a42f11c634ad6887bfdb1063fabc0ff6
SHA17712b492b5e2792f2db4ee3948c78bf4fdf408da
SHA2569e8ed542a19dfd856933f6d41740dcf70b8a424dd95fa475a71d31a33e494996
SHA51223d6aa14c4da17c2805a0a4668ed143123158f15956af9081efb1d0a620f47bd40617aa41df818d5a3f6af468a24d4004b93f05502b96b936c67283c0f30a03c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD594f99bbcb62af58ccac65f3de2368a38
SHA19fc7d9399e41c13345c944a846a65f85f47ae1e1
SHA2560a8d6552095d2f45664a23f08928dc57b32dcc299e4396f2fd01dc5b56d448eb
SHA512382faf8001beddb6381a595b51d7c22a4c3be946bc87153748dbb1f4a4ac63c99fe91a38a2eb10f30f09087f8f676480d3da25e0bac4cbaea81a4181096f0308