Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2024, 17:15
Static task
static1
Behavioral task
behavioral1
Sample
13b57f22fe6a082308037f14b2e48f99_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
13b57f22fe6a082308037f14b2e48f99_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
13b57f22fe6a082308037f14b2e48f99_JaffaCakes118.html
-
Size
68KB
-
MD5
13b57f22fe6a082308037f14b2e48f99
-
SHA1
bc0ec02a4086ee4ab6a5876b35e77c4067fd988a
-
SHA256
b6112c833bf392b07bf687d7b0ab236d57f18c90b303c1d9a1318708870ba769
-
SHA512
0ab381c932bb9be2eed076ae89d8b75222f8ade4e743605833311dbeeb92cf47000179b6f26d0b77223dfdb61c174144ed25b0b195156d87d64989a3de7dbf7a
-
SSDEEP
768:JiNgcMiR3sI2PDDnX0g6savbjRWysoTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQFf:JLgzlWyhTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1012 msedge.exe 1012 msedge.exe 3616 msedge.exe 3616 msedge.exe 3620 identity_helper.exe 3620 identity_helper.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3616 wrote to memory of 1096 3616 msedge.exe 83 PID 3616 wrote to memory of 1096 3616 msedge.exe 83 PID 3616 wrote to memory of 2008 3616 msedge.exe 84 PID 3616 wrote to memory of 2008 3616 msedge.exe 84 PID 3616 wrote to memory of 2008 3616 msedge.exe 84 PID 3616 wrote to memory of 2008 3616 msedge.exe 84 PID 3616 wrote to memory of 2008 3616 msedge.exe 84 PID 3616 wrote to memory of 2008 3616 msedge.exe 84 PID 3616 wrote to memory of 2008 3616 msedge.exe 84 PID 3616 wrote to memory of 2008 3616 msedge.exe 84 PID 3616 wrote to memory of 2008 3616 msedge.exe 84 PID 3616 wrote to memory of 2008 3616 msedge.exe 84 PID 3616 wrote to memory of 2008 3616 msedge.exe 84 PID 3616 wrote to memory of 2008 3616 msedge.exe 84 PID 3616 wrote to memory of 2008 3616 msedge.exe 84 PID 3616 wrote to memory of 2008 3616 msedge.exe 84 PID 3616 wrote to memory of 2008 3616 msedge.exe 84 PID 3616 wrote to memory of 2008 3616 msedge.exe 84 PID 3616 wrote to memory of 2008 3616 msedge.exe 84 PID 3616 wrote to memory of 2008 3616 msedge.exe 84 PID 3616 wrote to memory of 2008 3616 msedge.exe 84 PID 3616 wrote to memory of 2008 3616 msedge.exe 84 PID 3616 wrote to memory of 2008 3616 msedge.exe 84 PID 3616 wrote to memory of 2008 3616 msedge.exe 84 PID 3616 wrote to memory of 2008 3616 msedge.exe 84 PID 3616 wrote to memory of 2008 3616 msedge.exe 84 PID 3616 wrote to memory of 2008 3616 msedge.exe 84 PID 3616 wrote to memory of 2008 3616 msedge.exe 84 PID 3616 wrote to memory of 2008 3616 msedge.exe 84 PID 3616 wrote to memory of 2008 3616 msedge.exe 84 PID 3616 wrote to memory of 2008 3616 msedge.exe 84 PID 3616 wrote to memory of 2008 3616 msedge.exe 84 PID 3616 wrote to memory of 2008 3616 msedge.exe 84 PID 3616 wrote to memory of 2008 3616 msedge.exe 84 PID 3616 wrote to memory of 2008 3616 msedge.exe 84 PID 3616 wrote to memory of 2008 3616 msedge.exe 84 PID 3616 wrote to memory of 2008 3616 msedge.exe 84 PID 3616 wrote to memory of 2008 3616 msedge.exe 84 PID 3616 wrote to memory of 2008 3616 msedge.exe 84 PID 3616 wrote to memory of 2008 3616 msedge.exe 84 PID 3616 wrote to memory of 2008 3616 msedge.exe 84 PID 3616 wrote to memory of 2008 3616 msedge.exe 84 PID 3616 wrote to memory of 1012 3616 msedge.exe 85 PID 3616 wrote to memory of 1012 3616 msedge.exe 85 PID 3616 wrote to memory of 1680 3616 msedge.exe 86 PID 3616 wrote to memory of 1680 3616 msedge.exe 86 PID 3616 wrote to memory of 1680 3616 msedge.exe 86 PID 3616 wrote to memory of 1680 3616 msedge.exe 86 PID 3616 wrote to memory of 1680 3616 msedge.exe 86 PID 3616 wrote to memory of 1680 3616 msedge.exe 86 PID 3616 wrote to memory of 1680 3616 msedge.exe 86 PID 3616 wrote to memory of 1680 3616 msedge.exe 86 PID 3616 wrote to memory of 1680 3616 msedge.exe 86 PID 3616 wrote to memory of 1680 3616 msedge.exe 86 PID 3616 wrote to memory of 1680 3616 msedge.exe 86 PID 3616 wrote to memory of 1680 3616 msedge.exe 86 PID 3616 wrote to memory of 1680 3616 msedge.exe 86 PID 3616 wrote to memory of 1680 3616 msedge.exe 86 PID 3616 wrote to memory of 1680 3616 msedge.exe 86 PID 3616 wrote to memory of 1680 3616 msedge.exe 86 PID 3616 wrote to memory of 1680 3616 msedge.exe 86 PID 3616 wrote to memory of 1680 3616 msedge.exe 86 PID 3616 wrote to memory of 1680 3616 msedge.exe 86 PID 3616 wrote to memory of 1680 3616 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\13b57f22fe6a082308037f14b2e48f99_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff92e6e46f8,0x7ff92e6e4708,0x7ff92e6e47182⤵PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,6274270859236157406,9361244348816783444,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,6274270859236157406,9361244348816783444,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,6274270859236157406,9361244348816783444,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6274270859236157406,9361244348816783444,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6274270859236157406,9361244348816783444,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,6274270859236157406,9361244348816783444,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 /prefetch:82⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,6274270859236157406,9361244348816783444,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6274270859236157406,9361244348816783444,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:12⤵PID:836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6274270859236157406,9361244348816783444,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:2096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6274270859236157406,9361244348816783444,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6274270859236157406,9361244348816783444,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,6274270859236157406,9361244348816783444,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1928 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2620
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4436
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3836
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
Filesize
5KB
MD56a4110dda331b6c0cafc62bba5d72216
SHA1667f0fecd2b0269f8b467c3d9b4a8e6ed1dd2de1
SHA2569170e8c588d3cdc4e76f2ef5908c2f131d8f65616fa05237b10c8215d691df7a
SHA512a2ff786ff75c9e5f0186540207ddf03fea478aac7e60a7acf21668bd239c28b437ae9ede2f5cbfc12b0f3ad3f885275ec046fdf06c49b56bd634f77daf27229e
-
Filesize
6KB
MD5de4b58c4be3f6d3b5a9632fc7ceb3495
SHA1ab29446bf0b5fd5d2426373d3235cc9eccc2ed4d
SHA256727b29b486021b2b1e0dc8bcd5f68e87cfdac2cfa6466452632315501f22777b
SHA512c971fe6c458bc85aac1b9c6830d48ae92474fab3b967713898d99b7bc5493f9c72cc43b13ad10d97155ce8c3c599efed83046b13450d22741094278077251547
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d53a3dc64e2a7fd9fa6eeb7fb46d0a35
SHA1d67123601ec508ae39656fc0972c924ce092bc31
SHA2563e9f1af4065e684176350912718eac0eb74fcb854466ebaee988ca1948187df3
SHA512872b51ff2ad2b568d44d954fb44bd79c60444f7441ebf72e11b7b34808f6896cbdec4ab1ec3297ecb6fff1e068d0d1b4a433ec878c5fed5e59233d83e0851ca5