Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2024, 18:51
Static task
static1
Behavioral task
behavioral1
Sample
1408642cbd70792d9150963e6d93f8a9_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1408642cbd70792d9150963e6d93f8a9_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
1408642cbd70792d9150963e6d93f8a9_JaffaCakes118.html
-
Size
68KB
-
MD5
1408642cbd70792d9150963e6d93f8a9
-
SHA1
4c24471c7781da62909d49bcfb81ff9f5e01a043
-
SHA256
e63b278218a0d22fdce2075f32a200737962bb0476c4c8e64c9e3cf5348ebcbe
-
SHA512
fc757b38da0bd3a78118381ed5af96601fdd6d5aa5dc95be597e0e6fa6fb317771a0603c94bb7d0ce424c3dc1c750102cac94a5160aa690cc3ed07e46c1d577d
-
SSDEEP
768:JiUgcMiR3sI2PDDnX0g61UaxIzFAII4oTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpq:JCqCTuTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1824 msedge.exe 1824 msedge.exe 4696 msedge.exe 4696 msedge.exe 3908 identity_helper.exe 3908 identity_helper.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4696 wrote to memory of 3972 4696 msedge.exe 84 PID 4696 wrote to memory of 3972 4696 msedge.exe 84 PID 4696 wrote to memory of 4848 4696 msedge.exe 85 PID 4696 wrote to memory of 4848 4696 msedge.exe 85 PID 4696 wrote to memory of 4848 4696 msedge.exe 85 PID 4696 wrote to memory of 4848 4696 msedge.exe 85 PID 4696 wrote to memory of 4848 4696 msedge.exe 85 PID 4696 wrote to memory of 4848 4696 msedge.exe 85 PID 4696 wrote to memory of 4848 4696 msedge.exe 85 PID 4696 wrote to memory of 4848 4696 msedge.exe 85 PID 4696 wrote to memory of 4848 4696 msedge.exe 85 PID 4696 wrote to memory of 4848 4696 msedge.exe 85 PID 4696 wrote to memory of 4848 4696 msedge.exe 85 PID 4696 wrote to memory of 4848 4696 msedge.exe 85 PID 4696 wrote to memory of 4848 4696 msedge.exe 85 PID 4696 wrote to memory of 4848 4696 msedge.exe 85 PID 4696 wrote to memory of 4848 4696 msedge.exe 85 PID 4696 wrote to memory of 4848 4696 msedge.exe 85 PID 4696 wrote to memory of 4848 4696 msedge.exe 85 PID 4696 wrote to memory of 4848 4696 msedge.exe 85 PID 4696 wrote to memory of 4848 4696 msedge.exe 85 PID 4696 wrote to memory of 4848 4696 msedge.exe 85 PID 4696 wrote to memory of 4848 4696 msedge.exe 85 PID 4696 wrote to memory of 4848 4696 msedge.exe 85 PID 4696 wrote to memory of 4848 4696 msedge.exe 85 PID 4696 wrote to memory of 4848 4696 msedge.exe 85 PID 4696 wrote to memory of 4848 4696 msedge.exe 85 PID 4696 wrote to memory of 4848 4696 msedge.exe 85 PID 4696 wrote to memory of 4848 4696 msedge.exe 85 PID 4696 wrote to memory of 4848 4696 msedge.exe 85 PID 4696 wrote to memory of 4848 4696 msedge.exe 85 PID 4696 wrote to memory of 4848 4696 msedge.exe 85 PID 4696 wrote to memory of 4848 4696 msedge.exe 85 PID 4696 wrote to memory of 4848 4696 msedge.exe 85 PID 4696 wrote to memory of 4848 4696 msedge.exe 85 PID 4696 wrote to memory of 4848 4696 msedge.exe 85 PID 4696 wrote to memory of 4848 4696 msedge.exe 85 PID 4696 wrote to memory of 4848 4696 msedge.exe 85 PID 4696 wrote to memory of 4848 4696 msedge.exe 85 PID 4696 wrote to memory of 4848 4696 msedge.exe 85 PID 4696 wrote to memory of 4848 4696 msedge.exe 85 PID 4696 wrote to memory of 4848 4696 msedge.exe 85 PID 4696 wrote to memory of 1824 4696 msedge.exe 86 PID 4696 wrote to memory of 1824 4696 msedge.exe 86 PID 4696 wrote to memory of 2948 4696 msedge.exe 87 PID 4696 wrote to memory of 2948 4696 msedge.exe 87 PID 4696 wrote to memory of 2948 4696 msedge.exe 87 PID 4696 wrote to memory of 2948 4696 msedge.exe 87 PID 4696 wrote to memory of 2948 4696 msedge.exe 87 PID 4696 wrote to memory of 2948 4696 msedge.exe 87 PID 4696 wrote to memory of 2948 4696 msedge.exe 87 PID 4696 wrote to memory of 2948 4696 msedge.exe 87 PID 4696 wrote to memory of 2948 4696 msedge.exe 87 PID 4696 wrote to memory of 2948 4696 msedge.exe 87 PID 4696 wrote to memory of 2948 4696 msedge.exe 87 PID 4696 wrote to memory of 2948 4696 msedge.exe 87 PID 4696 wrote to memory of 2948 4696 msedge.exe 87 PID 4696 wrote to memory of 2948 4696 msedge.exe 87 PID 4696 wrote to memory of 2948 4696 msedge.exe 87 PID 4696 wrote to memory of 2948 4696 msedge.exe 87 PID 4696 wrote to memory of 2948 4696 msedge.exe 87 PID 4696 wrote to memory of 2948 4696 msedge.exe 87 PID 4696 wrote to memory of 2948 4696 msedge.exe 87 PID 4696 wrote to memory of 2948 4696 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\1408642cbd70792d9150963e6d93f8a9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd9c4d46f8,0x7ffd9c4d4708,0x7ffd9c4d47182⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,4365931313090653040,1323832045044780248,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,4365931313090653040,1323832045044780248,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,4365931313090653040,1323832045044780248,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,4365931313090653040,1323832045044780248,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,4365931313090653040,1323832045044780248,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,4365931313090653040,1323832045044780248,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:82⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,4365931313090653040,1323832045044780248,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,4365931313090653040,1323832045044780248,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,4365931313090653040,1323832045044780248,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:1548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,4365931313090653040,1323832045044780248,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:1812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,4365931313090653040,1323832045044780248,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3940 /prefetch:12⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,4365931313090653040,1323832045044780248,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1900 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4408
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1548
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3128
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
Filesize
5KB
MD59d6939f528814eae7a33023dc931a6f7
SHA126ceebba883fdfda0e5df5834dd776f73488f7b8
SHA256a53f19691368725e939dd055436986b2a6c5a50b009b5dcf64ae38f107d3639b
SHA512ecccd5770a22d1314297741750e1339474ab815e9fa5fe63f1242d23de04fe7db048f5c7b5e13b9d415a23508057341010817fcff8c20766277dd6a216c8f6da
-
Filesize
6KB
MD5ede3721f026d29adbd4e60980757484a
SHA1af01ad978280f86602b92171a9f5f7f7f526a19e
SHA25662d02b211b0e15a7c869aa1da771066194ff315af0b658d669c4e3d26d9de4ca
SHA51277bc79f919407e3d93c03343079d7793faad210558d617b01f2e49174421cdd5e15a7637f5f0f115a1884a581374a2b975ae4c55c8a444bcb0afa1ba719765f5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f88cc250a4e8e3be59cb3769cbe75adc
SHA1a39c09e0cf7840f6b113e023b799f903f43daefa
SHA2562959cdd23ffd2af213f114e5a741d06b77b2f6a3f4e1b3aeae0d3299f04e8f4d
SHA512d24342a1e98f4516e86d1f6e790c6b1b2b023e8735ceceb2921c27dbcf0e817a0445530be489ff90e901cadf7e10f51b32c752305a5564c5b12bbd4ebc8eb70c