Analysis
-
max time kernel
147s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04-05-2024 04:43
Static task
static1
Behavioral task
behavioral1
Sample
11865b39400edd203d840d9470286526_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
11865b39400edd203d840d9470286526_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
11865b39400edd203d840d9470286526_JaffaCakes118.html
-
Size
204KB
-
MD5
11865b39400edd203d840d9470286526
-
SHA1
165494e67cf51a894121307749be4691d6115f2c
-
SHA256
15becf6daf1cb201e63dd77d3e85df582023182db5f5bbda5c78dc1e309c38d6
-
SHA512
afe813933307f7f0b350171f75f75a7a64872c19573bdee8f3af6cfeaccd8d0a7e6a715748da3414256dd940fe13969de6b08fb0819f4fd8e25db1d9fcb6f27f
-
SSDEEP
1536:iwPx09b6JRnzb8wf/iRbN/ATzYUvLwKh/19jEFvzP4i7JnsqaYIrZf1EAYXKLP1x:iwP29b6T/4OLwq2T77Jo1T49CF1e4ihy
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4548 msedge.exe 4548 msedge.exe 2812 msedge.exe 2812 msedge.exe 3544 identity_helper.exe 3544 identity_helper.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2812 wrote to memory of 4088 2812 msedge.exe 84 PID 2812 wrote to memory of 4088 2812 msedge.exe 84 PID 2812 wrote to memory of 4984 2812 msedge.exe 85 PID 2812 wrote to memory of 4984 2812 msedge.exe 85 PID 2812 wrote to memory of 4984 2812 msedge.exe 85 PID 2812 wrote to memory of 4984 2812 msedge.exe 85 PID 2812 wrote to memory of 4984 2812 msedge.exe 85 PID 2812 wrote to memory of 4984 2812 msedge.exe 85 PID 2812 wrote to memory of 4984 2812 msedge.exe 85 PID 2812 wrote to memory of 4984 2812 msedge.exe 85 PID 2812 wrote to memory of 4984 2812 msedge.exe 85 PID 2812 wrote to memory of 4984 2812 msedge.exe 85 PID 2812 wrote to memory of 4984 2812 msedge.exe 85 PID 2812 wrote to memory of 4984 2812 msedge.exe 85 PID 2812 wrote to memory of 4984 2812 msedge.exe 85 PID 2812 wrote to memory of 4984 2812 msedge.exe 85 PID 2812 wrote to memory of 4984 2812 msedge.exe 85 PID 2812 wrote to memory of 4984 2812 msedge.exe 85 PID 2812 wrote to memory of 4984 2812 msedge.exe 85 PID 2812 wrote to memory of 4984 2812 msedge.exe 85 PID 2812 wrote to memory of 4984 2812 msedge.exe 85 PID 2812 wrote to memory of 4984 2812 msedge.exe 85 PID 2812 wrote to memory of 4984 2812 msedge.exe 85 PID 2812 wrote to memory of 4984 2812 msedge.exe 85 PID 2812 wrote to memory of 4984 2812 msedge.exe 85 PID 2812 wrote to memory of 4984 2812 msedge.exe 85 PID 2812 wrote to memory of 4984 2812 msedge.exe 85 PID 2812 wrote to memory of 4984 2812 msedge.exe 85 PID 2812 wrote to memory of 4984 2812 msedge.exe 85 PID 2812 wrote to memory of 4984 2812 msedge.exe 85 PID 2812 wrote to memory of 4984 2812 msedge.exe 85 PID 2812 wrote to memory of 4984 2812 msedge.exe 85 PID 2812 wrote to memory of 4984 2812 msedge.exe 85 PID 2812 wrote to memory of 4984 2812 msedge.exe 85 PID 2812 wrote to memory of 4984 2812 msedge.exe 85 PID 2812 wrote to memory of 4984 2812 msedge.exe 85 PID 2812 wrote to memory of 4984 2812 msedge.exe 85 PID 2812 wrote to memory of 4984 2812 msedge.exe 85 PID 2812 wrote to memory of 4984 2812 msedge.exe 85 PID 2812 wrote to memory of 4984 2812 msedge.exe 85 PID 2812 wrote to memory of 4984 2812 msedge.exe 85 PID 2812 wrote to memory of 4984 2812 msedge.exe 85 PID 2812 wrote to memory of 4548 2812 msedge.exe 86 PID 2812 wrote to memory of 4548 2812 msedge.exe 86 PID 2812 wrote to memory of 2208 2812 msedge.exe 87 PID 2812 wrote to memory of 2208 2812 msedge.exe 87 PID 2812 wrote to memory of 2208 2812 msedge.exe 87 PID 2812 wrote to memory of 2208 2812 msedge.exe 87 PID 2812 wrote to memory of 2208 2812 msedge.exe 87 PID 2812 wrote to memory of 2208 2812 msedge.exe 87 PID 2812 wrote to memory of 2208 2812 msedge.exe 87 PID 2812 wrote to memory of 2208 2812 msedge.exe 87 PID 2812 wrote to memory of 2208 2812 msedge.exe 87 PID 2812 wrote to memory of 2208 2812 msedge.exe 87 PID 2812 wrote to memory of 2208 2812 msedge.exe 87 PID 2812 wrote to memory of 2208 2812 msedge.exe 87 PID 2812 wrote to memory of 2208 2812 msedge.exe 87 PID 2812 wrote to memory of 2208 2812 msedge.exe 87 PID 2812 wrote to memory of 2208 2812 msedge.exe 87 PID 2812 wrote to memory of 2208 2812 msedge.exe 87 PID 2812 wrote to memory of 2208 2812 msedge.exe 87 PID 2812 wrote to memory of 2208 2812 msedge.exe 87 PID 2812 wrote to memory of 2208 2812 msedge.exe 87 PID 2812 wrote to memory of 2208 2812 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\11865b39400edd203d840d9470286526_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffbfd346f8,0x7fffbfd34708,0x7fffbfd347182⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,6989109746311332611,18281273544934087319,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,6989109746311332611,18281273544934087319,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2488 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,6989109746311332611,18281273544934087319,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,6989109746311332611,18281273544934087319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,6989109746311332611,18281273544934087319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2100 /prefetch:12⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,6989109746311332611,18281273544934087319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4020 /prefetch:12⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,6989109746311332611,18281273544934087319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2180 /prefetch:12⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,6989109746311332611,18281273544934087319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2932 /prefetch:12⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,6989109746311332611,18281273544934087319,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6000 /prefetch:82⤵PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,6989109746311332611,18281273544934087319,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6000 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,6989109746311332611,18281273544934087319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,6989109746311332611,18281273544934087319,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,6989109746311332611,18281273544934087319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2932 /prefetch:12⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,6989109746311332611,18281273544934087319,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:3836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,6989109746311332611,18281273544934087319,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5868 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4128
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3820
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2388
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
Filesize
1KB
MD5fd42a818677ccc90b6c49598a17e2c0f
SHA1ef51c1d1e2d76cc21678ef9328e078d638e4fb2b
SHA256b34e4a7e8396b0e615c213c2f621b352a9c5fdb5c7debb4c8b77052fe78771e2
SHA5120e8446283ef08af842c18a0369bfbd8958b724ce2243998ec3986472cb5c31075a177c132de52f87df6c379f2df89f542f313d773f9bf7c1ab2c36e181a039e5
-
Filesize
1KB
MD5bcda124334016260de5a1749923e7281
SHA1b9329c3c6f3aef0cc9424a1d0198b0057082b740
SHA256670058de588aadbb8e61cf2820c8d95723678c83237c7fb8d048fef252c646f6
SHA5128c5d2aac4d46ec4db3d6f0b59a4014c41d2802e1490dde2f9f00ba04714af24f29b960bc4c2a0128cab484f6917c6fc3cd1323764434f5c03420e6d590feb84a
-
Filesize
6KB
MD5ac84d70f949cc312bba5a26f2216f1a5
SHA1726b687d9d37e9d478ee6b499bcf9de365d79be1
SHA256f994506277afa53adeac93ac8fabfcb4467159c0e57f6b8a0ed0cc4602b5cc08
SHA5129099a8579ba64d7b9e800a50057cc31b2ca67baf7c272b91426ee57da0f3e07837563f44a8c2df98fe0df45b5e06cb2e0bc7e103d5d607d88de9f184abbc5ea3
-
Filesize
5KB
MD5f54f42318ecf68b263a1cebe9d5f6ceb
SHA1a6fc5723f9a0e072d84274b8b6e763f0aa477665
SHA25659ef16cbc06cdd0cf50b37f90858d7e1e9da2c1d908afb6881f6462acd2deeed
SHA51208380c505342ad6e3fe1bd884ec4c377d160b30c56657d2731fddf2b910f440af0bbdfba3c757cbe3e9be62406010e5ce6c0fd516c4a1a65587543d40beacca2
-
Filesize
6KB
MD57482ba503b45ce5c66e567cf7619a723
SHA189d18603ea3348fdc65480d7794876b6caea93a1
SHA256bc32e238b442b99cf6375d7accbb2bc66b085894bc4cf9e3840438667649a5ba
SHA512b99724fb303f13ddbee0eb4d3ceb5bd856890c24350faff6f0aef46d6e91443772e3f1c1cb835757fa3e1621fb8f9508bb462f046b6f6d3a7cea1f62624dbb4c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD505f4f01eb2b12e5abed6948039dbc238
SHA136ef4a19b35ade6b2aacbfef4401aa9be052b5d2
SHA25623c1ad0f39f332e2dfe260b75537d4fa6012471ef6b19f296f600db2ce619c7e
SHA512e64c87a80b6cdc173ed76c38d5df202e1b21d08b57f5c8cb644b895719d10cc08e70adf793ce4f1b3db492c1b90976c9818b714e2133c1a2a79737039603d800