Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04-05-2024 10:05
Static task
static1
Behavioral task
behavioral1
Sample
123b4b9ad7feecec590c696c106c94d5_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
123b4b9ad7feecec590c696c106c94d5_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
123b4b9ad7feecec590c696c106c94d5_JaffaCakes118.html
-
Size
37KB
-
MD5
123b4b9ad7feecec590c696c106c94d5
-
SHA1
e1accecb4ca40348e1b7044b95bb7467f4031962
-
SHA256
7f9d2b9734a7fadd410a86adb0a67e56de9c8d7de0df5f1352f713ded29253d0
-
SHA512
136901a800c7996091da13521078cf09b21111c996bad3e6d4bd87228bf4058b3b6954ee44c846e44b902fe2951a1de833cbd5e2750703cdba1ab0c427b1661f
-
SSDEEP
768:s/bVoRTW81D4RA+vEOjz6rdG2Gil54RZfPGnf3Gu34awi6781DdRA4vEOjq6h8at:DRTW81D4RA+vEOjz6raA7Ia3C81DdRAW
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2696 msedge.exe 2696 msedge.exe 1924 msedge.exe 1924 msedge.exe 4792 identity_helper.exe 4792 identity_helper.exe 5432 msedge.exe 5432 msedge.exe 5432 msedge.exe 5432 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1924 wrote to memory of 3132 1924 msedge.exe 85 PID 1924 wrote to memory of 3132 1924 msedge.exe 85 PID 1924 wrote to memory of 2356 1924 msedge.exe 86 PID 1924 wrote to memory of 2356 1924 msedge.exe 86 PID 1924 wrote to memory of 2356 1924 msedge.exe 86 PID 1924 wrote to memory of 2356 1924 msedge.exe 86 PID 1924 wrote to memory of 2356 1924 msedge.exe 86 PID 1924 wrote to memory of 2356 1924 msedge.exe 86 PID 1924 wrote to memory of 2356 1924 msedge.exe 86 PID 1924 wrote to memory of 2356 1924 msedge.exe 86 PID 1924 wrote to memory of 2356 1924 msedge.exe 86 PID 1924 wrote to memory of 2356 1924 msedge.exe 86 PID 1924 wrote to memory of 2356 1924 msedge.exe 86 PID 1924 wrote to memory of 2356 1924 msedge.exe 86 PID 1924 wrote to memory of 2356 1924 msedge.exe 86 PID 1924 wrote to memory of 2356 1924 msedge.exe 86 PID 1924 wrote to memory of 2356 1924 msedge.exe 86 PID 1924 wrote to memory of 2356 1924 msedge.exe 86 PID 1924 wrote to memory of 2356 1924 msedge.exe 86 PID 1924 wrote to memory of 2356 1924 msedge.exe 86 PID 1924 wrote to memory of 2356 1924 msedge.exe 86 PID 1924 wrote to memory of 2356 1924 msedge.exe 86 PID 1924 wrote to memory of 2356 1924 msedge.exe 86 PID 1924 wrote to memory of 2356 1924 msedge.exe 86 PID 1924 wrote to memory of 2356 1924 msedge.exe 86 PID 1924 wrote to memory of 2356 1924 msedge.exe 86 PID 1924 wrote to memory of 2356 1924 msedge.exe 86 PID 1924 wrote to memory of 2356 1924 msedge.exe 86 PID 1924 wrote to memory of 2356 1924 msedge.exe 86 PID 1924 wrote to memory of 2356 1924 msedge.exe 86 PID 1924 wrote to memory of 2356 1924 msedge.exe 86 PID 1924 wrote to memory of 2356 1924 msedge.exe 86 PID 1924 wrote to memory of 2356 1924 msedge.exe 86 PID 1924 wrote to memory of 2356 1924 msedge.exe 86 PID 1924 wrote to memory of 2356 1924 msedge.exe 86 PID 1924 wrote to memory of 2356 1924 msedge.exe 86 PID 1924 wrote to memory of 2356 1924 msedge.exe 86 PID 1924 wrote to memory of 2356 1924 msedge.exe 86 PID 1924 wrote to memory of 2356 1924 msedge.exe 86 PID 1924 wrote to memory of 2356 1924 msedge.exe 86 PID 1924 wrote to memory of 2356 1924 msedge.exe 86 PID 1924 wrote to memory of 2356 1924 msedge.exe 86 PID 1924 wrote to memory of 2696 1924 msedge.exe 87 PID 1924 wrote to memory of 2696 1924 msedge.exe 87 PID 1924 wrote to memory of 2632 1924 msedge.exe 88 PID 1924 wrote to memory of 2632 1924 msedge.exe 88 PID 1924 wrote to memory of 2632 1924 msedge.exe 88 PID 1924 wrote to memory of 2632 1924 msedge.exe 88 PID 1924 wrote to memory of 2632 1924 msedge.exe 88 PID 1924 wrote to memory of 2632 1924 msedge.exe 88 PID 1924 wrote to memory of 2632 1924 msedge.exe 88 PID 1924 wrote to memory of 2632 1924 msedge.exe 88 PID 1924 wrote to memory of 2632 1924 msedge.exe 88 PID 1924 wrote to memory of 2632 1924 msedge.exe 88 PID 1924 wrote to memory of 2632 1924 msedge.exe 88 PID 1924 wrote to memory of 2632 1924 msedge.exe 88 PID 1924 wrote to memory of 2632 1924 msedge.exe 88 PID 1924 wrote to memory of 2632 1924 msedge.exe 88 PID 1924 wrote to memory of 2632 1924 msedge.exe 88 PID 1924 wrote to memory of 2632 1924 msedge.exe 88 PID 1924 wrote to memory of 2632 1924 msedge.exe 88 PID 1924 wrote to memory of 2632 1924 msedge.exe 88 PID 1924 wrote to memory of 2632 1924 msedge.exe 88 PID 1924 wrote to memory of 2632 1924 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\123b4b9ad7feecec590c696c106c94d5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff98cd046f8,0x7ff98cd04708,0x7ff98cd047182⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,2715653971832623603,16491782504171061142,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2036,2715653971832623603,16491782504171061142,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2376 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2036,2715653971832623603,16491782504171061142,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:82⤵PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,2715653971832623603,16491782504171061142,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,2715653971832623603,16491782504171061142,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,2715653971832623603,16491782504171061142,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5920 /prefetch:82⤵PID:2884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,2715653971832623603,16491782504171061142,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5920 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,2715653971832623603,16491782504171061142,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,2715653971832623603,16491782504171061142,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2872 /prefetch:12⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,2715653971832623603,16491782504171061142,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:12⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,2715653971832623603,16491782504171061142,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,2715653971832623603,16491782504171061142,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4812 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5432
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:680
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\6dc8ece4-cbc7-41d7-ade8-39d473040e75.tmp
Filesize6KB
MD58d951e717202ae472721be1f3df617d8
SHA1285f9b42341c68f752021b7060761376552a6c2b
SHA256d54385fa83c7e848e59f31c0eb39742c4ff5a80d2a71defc5589519ef9adc20f
SHA512b06e3adde5f9590a12c333b366fe2105d247b5bec26912a59fab0c4b313c1110457fd9c8430676bb891807e744b13d35ed5717d1fab71778350525dbe235d300
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
724B
MD50049f5f6dbbe5c9db28f80386a9236ba
SHA18cf24296e156762f25588373c5ad4516996f8fbe
SHA256743ee6e4302d1a324670dcc1f8e85d83275dcb3ead90d11f265a32b7b03efa6d
SHA51223f0831f70005c1c36e15d717e23c915c372bfea261c17eebc4f4b3931bd3fa20bec0335ae7a6b2140370d41a501d2130f99acf760f4ec334b08b7c13123c7d0
-
Filesize
5KB
MD58a6960a25a6fbf99b31ebd7dcc64d176
SHA1ed6bb1aa49b4143dd04de5faadd77a8adca00d63
SHA256af05a9c8554b6a5228bd84a60b5450b9cd19770365410e2e8a7c378b5eb82a85
SHA5126b1e5d5dcc5c3faa69b589fb2b51c9235eab8290f07453509bad56eb5febb7a682994639aa462142c1e1415ae73d9c3070e4d127346efbfbd2758cf925ecd89f
-
Filesize
6KB
MD5a707625d4fa81b18db2abb37faf2a62d
SHA11ffcd01f84a41b3a9fcca90be363bda65fa47940
SHA256b87b5f49cabd69de578b2c7b179f7712f7163415c48b475976c244b2f8d9800b
SHA512067c36b55d057be42e17e76e40e5ed79c3a31c64dc9229569c75dbdec6cc2bf63c095ebfe715f7f6f2ac3b28d35e10b53e8ffca8d035b531370b0f1f2b3d6a61
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5471773cbee7ba5591a3dcd9cbbd8b1f4
SHA1e2c5bf13edf8b1b5a2741216e40a63c44ea5d15e
SHA25619c15ed80fbb587e71a624957d3adade5dc1ae8f8c9cd3013556097efc138b65
SHA512ea2b24c18ebc33c4a7720154eb4ec86178cbf9ac8d552dc97ec4b1416af4fa09062cd931e9b28d0b0631525bdaa4c8ba8b2ad95053bac8cd423db0934eeb3dfd