Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2024, 10:19
Static task
static1
Behavioral task
behavioral1
Sample
124841148f8f87a3319e9638559019c8_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
124841148f8f87a3319e9638559019c8_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
124841148f8f87a3319e9638559019c8_JaffaCakes118.html
-
Size
786B
-
MD5
124841148f8f87a3319e9638559019c8
-
SHA1
2c228fd2376a0ab5a953a4725153103f3b453eef
-
SHA256
b15f48c7c1b56a4812f334393827531b7053b33e69b62fb72ad701abe725fd9e
-
SHA512
2fa20f0d001342837958b6645ff186999ebb0ce4302fb5f3e5bd906d8e19b353a818840f70fde66407be009666b96d1c6d545d6e9cfd9e44739b54599eea072e
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4856 msedge.exe 4856 msedge.exe 2336 msedge.exe 2336 msedge.exe 2296 identity_helper.exe 2296 identity_helper.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2072 2336 msedge.exe 83 PID 2336 wrote to memory of 2072 2336 msedge.exe 83 PID 2336 wrote to memory of 3928 2336 msedge.exe 84 PID 2336 wrote to memory of 3928 2336 msedge.exe 84 PID 2336 wrote to memory of 3928 2336 msedge.exe 84 PID 2336 wrote to memory of 3928 2336 msedge.exe 84 PID 2336 wrote to memory of 3928 2336 msedge.exe 84 PID 2336 wrote to memory of 3928 2336 msedge.exe 84 PID 2336 wrote to memory of 3928 2336 msedge.exe 84 PID 2336 wrote to memory of 3928 2336 msedge.exe 84 PID 2336 wrote to memory of 3928 2336 msedge.exe 84 PID 2336 wrote to memory of 3928 2336 msedge.exe 84 PID 2336 wrote to memory of 3928 2336 msedge.exe 84 PID 2336 wrote to memory of 3928 2336 msedge.exe 84 PID 2336 wrote to memory of 3928 2336 msedge.exe 84 PID 2336 wrote to memory of 3928 2336 msedge.exe 84 PID 2336 wrote to memory of 3928 2336 msedge.exe 84 PID 2336 wrote to memory of 3928 2336 msedge.exe 84 PID 2336 wrote to memory of 3928 2336 msedge.exe 84 PID 2336 wrote to memory of 3928 2336 msedge.exe 84 PID 2336 wrote to memory of 3928 2336 msedge.exe 84 PID 2336 wrote to memory of 3928 2336 msedge.exe 84 PID 2336 wrote to memory of 3928 2336 msedge.exe 84 PID 2336 wrote to memory of 3928 2336 msedge.exe 84 PID 2336 wrote to memory of 3928 2336 msedge.exe 84 PID 2336 wrote to memory of 3928 2336 msedge.exe 84 PID 2336 wrote to memory of 3928 2336 msedge.exe 84 PID 2336 wrote to memory of 3928 2336 msedge.exe 84 PID 2336 wrote to memory of 3928 2336 msedge.exe 84 PID 2336 wrote to memory of 3928 2336 msedge.exe 84 PID 2336 wrote to memory of 3928 2336 msedge.exe 84 PID 2336 wrote to memory of 3928 2336 msedge.exe 84 PID 2336 wrote to memory of 3928 2336 msedge.exe 84 PID 2336 wrote to memory of 3928 2336 msedge.exe 84 PID 2336 wrote to memory of 3928 2336 msedge.exe 84 PID 2336 wrote to memory of 3928 2336 msedge.exe 84 PID 2336 wrote to memory of 3928 2336 msedge.exe 84 PID 2336 wrote to memory of 3928 2336 msedge.exe 84 PID 2336 wrote to memory of 3928 2336 msedge.exe 84 PID 2336 wrote to memory of 3928 2336 msedge.exe 84 PID 2336 wrote to memory of 3928 2336 msedge.exe 84 PID 2336 wrote to memory of 3928 2336 msedge.exe 84 PID 2336 wrote to memory of 4856 2336 msedge.exe 85 PID 2336 wrote to memory of 4856 2336 msedge.exe 85 PID 2336 wrote to memory of 5008 2336 msedge.exe 86 PID 2336 wrote to memory of 5008 2336 msedge.exe 86 PID 2336 wrote to memory of 5008 2336 msedge.exe 86 PID 2336 wrote to memory of 5008 2336 msedge.exe 86 PID 2336 wrote to memory of 5008 2336 msedge.exe 86 PID 2336 wrote to memory of 5008 2336 msedge.exe 86 PID 2336 wrote to memory of 5008 2336 msedge.exe 86 PID 2336 wrote to memory of 5008 2336 msedge.exe 86 PID 2336 wrote to memory of 5008 2336 msedge.exe 86 PID 2336 wrote to memory of 5008 2336 msedge.exe 86 PID 2336 wrote to memory of 5008 2336 msedge.exe 86 PID 2336 wrote to memory of 5008 2336 msedge.exe 86 PID 2336 wrote to memory of 5008 2336 msedge.exe 86 PID 2336 wrote to memory of 5008 2336 msedge.exe 86 PID 2336 wrote to memory of 5008 2336 msedge.exe 86 PID 2336 wrote to memory of 5008 2336 msedge.exe 86 PID 2336 wrote to memory of 5008 2336 msedge.exe 86 PID 2336 wrote to memory of 5008 2336 msedge.exe 86 PID 2336 wrote to memory of 5008 2336 msedge.exe 86 PID 2336 wrote to memory of 5008 2336 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\124841148f8f87a3319e9638559019c8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xd8,0x10c,0x7ffc325346f8,0x7ffc32534708,0x7ffc325347182⤵PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,5300675684771264196,7242493218166884145,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,5300675684771264196,7242493218166884145,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,5300675684771264196,7242493218166884145,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5300675684771264196,7242493218166884145,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5300675684771264196,7242493218166884145,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5300675684771264196,7242493218166884145,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4244 /prefetch:12⤵PID:1292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5300675684771264196,7242493218166884145,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4876 /prefetch:12⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5300675684771264196,7242493218166884145,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,5300675684771264196,7242493218166884145,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5448 /prefetch:82⤵PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,5300675684771264196,7242493218166884145,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5448 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5300675684771264196,7242493218166884145,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5300675684771264196,7242493218166884145,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5300675684771264196,7242493218166884145,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5300675684771264196,7242493218166884145,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:12⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5300675684771264196,7242493218166884145,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3032 /prefetch:12⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5300675684771264196,7242493218166884145,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:12⤵PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,5300675684771264196,7242493218166884145,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5252 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2080
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:368
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58b2290ca03b4ca5fe52d82550c7e7d69
SHA120583a7851a906444204ce8ba4fa51153e6cd494
SHA256f9ff4871fc5317299de907489d466e630be63d698c8f7cb77cc81faddbecc6d2
SHA512704ec8122cc1c263dff67ddbb5c20ee0db8a438674d716bc3be5b266ee5629a219b0049d721f9eb2dd8f2d8fda0163659eaa4d3e1f0a6e9072a8ffb92bb2b25d
-
Filesize
152B
MD5919c29d42fb6034fee2f5de14d573c63
SHA124a2e1042347b3853344157239bde3ed699047a8
SHA25617cd6de97a0c020cb4935739cfef4ec4e074e8d127ac4c531b6dc496580c8141
SHA512bb7eadd087bbcec8b1b8a49b102b454333f2f9708d36b6ffc3c82fdc52e46873398d967238c3bfe9ac6caef45b017a5fe3938ebf5f3053e4ef9be7b2752b563d
-
Filesize
5KB
MD5a4b35c9a1c9734654d166503f94131b7
SHA11095dd96e3ad5106a4e68e56c81ad28863c66a6c
SHA2560688d299d5c41421b1a84ed9442e44018552c6410110f64e5cd611b8b7638163
SHA5123047d951d53d4a7002065e6bf89b08b9f741285cae682b57c74a09d77bcbc3a2744b1f48f57e892f79853222ccddce86435b5a77b63b089a805fe19caf3e4b7b
-
Filesize
6KB
MD595817ff200284d1638069863a56ce0b9
SHA109db3d62f0ced7121e501673e2aa65664b27745d
SHA256a058f997ec1489bee84a900560672d2a8b3155b51508b39ce23a02b4d4fc072f
SHA512d65bac6a1d062f876f047a4717c9c271769fbdc8193b0f29f3278311ef15f9bdf388ce32f5c9f037ae4316416900dea87da6aea7094a74326c8f063a17c6bf14
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b8dcefcb899c14ab3cf4dc61c78cbcf8
SHA1b5b0ff6ecd8c12192d26d5f59dde50ccbdb71e7b
SHA2567d5c2f87060160e60d1afd9a6bb30671b0e2f1146f794cc6997843d8da4deeee
SHA51238b6cee38e5a3904ae5e9929f96d58f159147dbd5b5e371345ae9e7deb66f16f8ffe77cf2408d6714a28bc6fa294e0ee0f712809317d2e1ae2b3217851b66f14