Analysis
-
max time kernel
145s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2024, 16:24
Static task
static1
Behavioral task
behavioral1
Sample
1389c195e33c7e2dfe47c927ae4667da_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1389c195e33c7e2dfe47c927ae4667da_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
1389c195e33c7e2dfe47c927ae4667da_JaffaCakes118.html
-
Size
39KB
-
MD5
1389c195e33c7e2dfe47c927ae4667da
-
SHA1
3a02785c52d988c81e2f232bf859aa4f5919fe98
-
SHA256
8697d15ec399a8fd67925eb50381df0c32f9951fe8c6897fd981d5cdca762b94
-
SHA512
9be48be7cf78bf4ec8aee65a9bcdf65d8b00ba9a0f0b65329675ed562643dc7687067ebcf8a3e55b14c6ec5daf70000524d6e7d36d0c9519ea3e7e11f889d554
-
SSDEEP
768:qhSeE85FW1Z1TNuxMwkMsL02/XLVU9VzdhM8k7zBAvgkRC1X1nzK:qhdEyFW1Z1TNuxMwkMsL0QXLVU9Vzdhj
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 3396 msedge.exe 3396 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 2952 identity_helper.exe 2952 identity_helper.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1940 wrote to memory of 1000 1940 msedge.exe 83 PID 1940 wrote to memory of 1000 1940 msedge.exe 83 PID 1940 wrote to memory of 4048 1940 msedge.exe 84 PID 1940 wrote to memory of 4048 1940 msedge.exe 84 PID 1940 wrote to memory of 4048 1940 msedge.exe 84 PID 1940 wrote to memory of 4048 1940 msedge.exe 84 PID 1940 wrote to memory of 4048 1940 msedge.exe 84 PID 1940 wrote to memory of 4048 1940 msedge.exe 84 PID 1940 wrote to memory of 4048 1940 msedge.exe 84 PID 1940 wrote to memory of 4048 1940 msedge.exe 84 PID 1940 wrote to memory of 4048 1940 msedge.exe 84 PID 1940 wrote to memory of 4048 1940 msedge.exe 84 PID 1940 wrote to memory of 4048 1940 msedge.exe 84 PID 1940 wrote to memory of 4048 1940 msedge.exe 84 PID 1940 wrote to memory of 4048 1940 msedge.exe 84 PID 1940 wrote to memory of 4048 1940 msedge.exe 84 PID 1940 wrote to memory of 4048 1940 msedge.exe 84 PID 1940 wrote to memory of 4048 1940 msedge.exe 84 PID 1940 wrote to memory of 4048 1940 msedge.exe 84 PID 1940 wrote to memory of 4048 1940 msedge.exe 84 PID 1940 wrote to memory of 4048 1940 msedge.exe 84 PID 1940 wrote to memory of 4048 1940 msedge.exe 84 PID 1940 wrote to memory of 4048 1940 msedge.exe 84 PID 1940 wrote to memory of 4048 1940 msedge.exe 84 PID 1940 wrote to memory of 4048 1940 msedge.exe 84 PID 1940 wrote to memory of 4048 1940 msedge.exe 84 PID 1940 wrote to memory of 4048 1940 msedge.exe 84 PID 1940 wrote to memory of 4048 1940 msedge.exe 84 PID 1940 wrote to memory of 4048 1940 msedge.exe 84 PID 1940 wrote to memory of 4048 1940 msedge.exe 84 PID 1940 wrote to memory of 4048 1940 msedge.exe 84 PID 1940 wrote to memory of 4048 1940 msedge.exe 84 PID 1940 wrote to memory of 4048 1940 msedge.exe 84 PID 1940 wrote to memory of 4048 1940 msedge.exe 84 PID 1940 wrote to memory of 4048 1940 msedge.exe 84 PID 1940 wrote to memory of 4048 1940 msedge.exe 84 PID 1940 wrote to memory of 4048 1940 msedge.exe 84 PID 1940 wrote to memory of 4048 1940 msedge.exe 84 PID 1940 wrote to memory of 4048 1940 msedge.exe 84 PID 1940 wrote to memory of 4048 1940 msedge.exe 84 PID 1940 wrote to memory of 4048 1940 msedge.exe 84 PID 1940 wrote to memory of 4048 1940 msedge.exe 84 PID 1940 wrote to memory of 3396 1940 msedge.exe 85 PID 1940 wrote to memory of 3396 1940 msedge.exe 85 PID 1940 wrote to memory of 3496 1940 msedge.exe 86 PID 1940 wrote to memory of 3496 1940 msedge.exe 86 PID 1940 wrote to memory of 3496 1940 msedge.exe 86 PID 1940 wrote to memory of 3496 1940 msedge.exe 86 PID 1940 wrote to memory of 3496 1940 msedge.exe 86 PID 1940 wrote to memory of 3496 1940 msedge.exe 86 PID 1940 wrote to memory of 3496 1940 msedge.exe 86 PID 1940 wrote to memory of 3496 1940 msedge.exe 86 PID 1940 wrote to memory of 3496 1940 msedge.exe 86 PID 1940 wrote to memory of 3496 1940 msedge.exe 86 PID 1940 wrote to memory of 3496 1940 msedge.exe 86 PID 1940 wrote to memory of 3496 1940 msedge.exe 86 PID 1940 wrote to memory of 3496 1940 msedge.exe 86 PID 1940 wrote to memory of 3496 1940 msedge.exe 86 PID 1940 wrote to memory of 3496 1940 msedge.exe 86 PID 1940 wrote to memory of 3496 1940 msedge.exe 86 PID 1940 wrote to memory of 3496 1940 msedge.exe 86 PID 1940 wrote to memory of 3496 1940 msedge.exe 86 PID 1940 wrote to memory of 3496 1940 msedge.exe 86 PID 1940 wrote to memory of 3496 1940 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\1389c195e33c7e2dfe47c927ae4667da_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffefc9446f8,0x7ffefc944708,0x7ffefc9447182⤵PID:1000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,3209121533861725644,5239013946828720117,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,3209121533861725644,5239013946828720117,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,3209121533861725644,5239013946828720117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,3209121533861725644,5239013946828720117,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:2828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,3209121533861725644,5239013946828720117,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,3209121533861725644,5239013946828720117,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,3209121533861725644,5239013946828720117,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,3209121533861725644,5239013946828720117,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4080 /prefetch:12⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,3209121533861725644,5239013946828720117,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4112 /prefetch:12⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,3209121533861725644,5239013946828720117,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,3209121533861725644,5239013946828720117,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,3209121533861725644,5239013946828720117,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5300 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4920
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3520
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1588
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52a70f1bd4da893a67660d6432970788d
SHA1ddf4047e0d468f56ea0c0d8ff078a86a0bb62873
SHA256c550af5ba51f68ac4d18747edc5dea1a655dd212d84bad1e6168ba7a97745561
SHA51226b9a365e77df032fc5c461d85d1ba313eafead38827190608c6537ec12b2dfdbed4e1705bfd1e61899034791ad6fa88ea7490c3a48cdaec4d04cd0577b11343
-
Filesize
152B
MD5fbe1ce4d182aaffb80de94263be1dd35
SHA1bc6c9827aa35a136a7d79be9e606ff359e2ac3ea
SHA2560021f72dbca789f179762b0e17c28fe0b93a12539b08294800e47469905aeb51
SHA5123fb0a3b38e7d4a30f5560594b1d14e6e58419e274255fb68dfe0ca897aa181f9ce8cb2048403f851fd36a17b0e34d272d03927769d41a500b2fe64806354902f
-
Filesize
6KB
MD5eb7d64991026783d431deb390fb459b8
SHA12ce5eb0c0eb306d0e8909638a262843517632874
SHA2566260d047e6ddb729acd213f7b6e5ca91862a4787dde2bf818193bfe56e497c57
SHA51243f1e301f705cecfc20dc03e75a30cb917657edd088f2f913a64af92665eb0523e5893255b121ad11a3160fe9a2d4117bc579e671b9381c3c5aac4a536b68fe4
-
Filesize
6KB
MD5c7cfe1d6859657dd5e9b72653b4faa98
SHA1e47cea371c882eda3576d551899394a35ab24bcd
SHA25646a5d6bb1b3b8d227c9f5900ed24f1b6cd42100c136ce2ebfedf9ab75fdb4867
SHA512064fe3bff6769b6705bb52d51d617815b02eb7692cfa7002da099a96067cfd69de87d56ececef3082639bf0e800672e4e7e6b4837eb5b488a91029e7754bbad6
-
Filesize
5KB
MD5f4d57e1be7a249bc5aa771456538a581
SHA13984591b47bfdda3773732cbc24d92f9cf7f0a41
SHA256dd80b943a646dae35c36eaa97c3388c09e0bbc5e98db3f3005324853cea320fd
SHA512a8add2e44db83b6a481f9aa77cc722ead84edc2d4e2acae9c45f535ae859efb47db4d5289203e556a36264b36020eab75912d74ba225f53ce6e3a0b9a1aa089a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50a478264d2de3364308dbdfd91546c04
SHA19f97931f3d68b3ec42df891af10860eda6ba27e2
SHA2562a1536c7e735aad584af1e8b58c0de21bee838a34b661556dbf3685b3a9f330b
SHA51296346a4532a98adce754377e5fceb09e62b96a11c8b999a14bf607997815cd805639327963339db32f4cda982e30292677b1f9040fd68c6fb1d00db23d534d9e