Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2024, 21:06
Static task
static1
Behavioral task
behavioral1
Sample
147baa63b55c0cce01db04603976b86a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
147baa63b55c0cce01db04603976b86a_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
147baa63b55c0cce01db04603976b86a_JaffaCakes118.html
-
Size
142KB
-
MD5
147baa63b55c0cce01db04603976b86a
-
SHA1
5485aaa0b34a8891de1f9f1e9ae34a5b45d35e31
-
SHA256
b0ef3e9d199bd5280ba0470bdcf23f05ec6868c758a2b1fe4e028902f52288d0
-
SHA512
7ae257297b44a0f9621f85f6ca283ac430748bb4bd45a61df94446bbf719a2cbca066d3e9649574debe50c1a4ecb39b55e77be124e772c514eb558b513300160
-
SSDEEP
1536:a4WIfX3MCTFNIRTILDX7Upg7MmpHopiOwAW:pzfX3MCTFNIRTIn7bpHopiOwAW
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3252 msedge.exe 3252 msedge.exe 3164 msedge.exe 3164 msedge.exe 4852 identity_helper.exe 4852 identity_helper.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3164 wrote to memory of 1396 3164 msedge.exe 85 PID 3164 wrote to memory of 1396 3164 msedge.exe 85 PID 3164 wrote to memory of 1372 3164 msedge.exe 86 PID 3164 wrote to memory of 1372 3164 msedge.exe 86 PID 3164 wrote to memory of 1372 3164 msedge.exe 86 PID 3164 wrote to memory of 1372 3164 msedge.exe 86 PID 3164 wrote to memory of 1372 3164 msedge.exe 86 PID 3164 wrote to memory of 1372 3164 msedge.exe 86 PID 3164 wrote to memory of 1372 3164 msedge.exe 86 PID 3164 wrote to memory of 1372 3164 msedge.exe 86 PID 3164 wrote to memory of 1372 3164 msedge.exe 86 PID 3164 wrote to memory of 1372 3164 msedge.exe 86 PID 3164 wrote to memory of 1372 3164 msedge.exe 86 PID 3164 wrote to memory of 1372 3164 msedge.exe 86 PID 3164 wrote to memory of 1372 3164 msedge.exe 86 PID 3164 wrote to memory of 1372 3164 msedge.exe 86 PID 3164 wrote to memory of 1372 3164 msedge.exe 86 PID 3164 wrote to memory of 1372 3164 msedge.exe 86 PID 3164 wrote to memory of 1372 3164 msedge.exe 86 PID 3164 wrote to memory of 1372 3164 msedge.exe 86 PID 3164 wrote to memory of 1372 3164 msedge.exe 86 PID 3164 wrote to memory of 1372 3164 msedge.exe 86 PID 3164 wrote to memory of 1372 3164 msedge.exe 86 PID 3164 wrote to memory of 1372 3164 msedge.exe 86 PID 3164 wrote to memory of 1372 3164 msedge.exe 86 PID 3164 wrote to memory of 1372 3164 msedge.exe 86 PID 3164 wrote to memory of 1372 3164 msedge.exe 86 PID 3164 wrote to memory of 1372 3164 msedge.exe 86 PID 3164 wrote to memory of 1372 3164 msedge.exe 86 PID 3164 wrote to memory of 1372 3164 msedge.exe 86 PID 3164 wrote to memory of 1372 3164 msedge.exe 86 PID 3164 wrote to memory of 1372 3164 msedge.exe 86 PID 3164 wrote to memory of 1372 3164 msedge.exe 86 PID 3164 wrote to memory of 1372 3164 msedge.exe 86 PID 3164 wrote to memory of 1372 3164 msedge.exe 86 PID 3164 wrote to memory of 1372 3164 msedge.exe 86 PID 3164 wrote to memory of 1372 3164 msedge.exe 86 PID 3164 wrote to memory of 1372 3164 msedge.exe 86 PID 3164 wrote to memory of 1372 3164 msedge.exe 86 PID 3164 wrote to memory of 1372 3164 msedge.exe 86 PID 3164 wrote to memory of 1372 3164 msedge.exe 86 PID 3164 wrote to memory of 1372 3164 msedge.exe 86 PID 3164 wrote to memory of 3252 3164 msedge.exe 87 PID 3164 wrote to memory of 3252 3164 msedge.exe 87 PID 3164 wrote to memory of 2020 3164 msedge.exe 88 PID 3164 wrote to memory of 2020 3164 msedge.exe 88 PID 3164 wrote to memory of 2020 3164 msedge.exe 88 PID 3164 wrote to memory of 2020 3164 msedge.exe 88 PID 3164 wrote to memory of 2020 3164 msedge.exe 88 PID 3164 wrote to memory of 2020 3164 msedge.exe 88 PID 3164 wrote to memory of 2020 3164 msedge.exe 88 PID 3164 wrote to memory of 2020 3164 msedge.exe 88 PID 3164 wrote to memory of 2020 3164 msedge.exe 88 PID 3164 wrote to memory of 2020 3164 msedge.exe 88 PID 3164 wrote to memory of 2020 3164 msedge.exe 88 PID 3164 wrote to memory of 2020 3164 msedge.exe 88 PID 3164 wrote to memory of 2020 3164 msedge.exe 88 PID 3164 wrote to memory of 2020 3164 msedge.exe 88 PID 3164 wrote to memory of 2020 3164 msedge.exe 88 PID 3164 wrote to memory of 2020 3164 msedge.exe 88 PID 3164 wrote to memory of 2020 3164 msedge.exe 88 PID 3164 wrote to memory of 2020 3164 msedge.exe 88 PID 3164 wrote to memory of 2020 3164 msedge.exe 88 PID 3164 wrote to memory of 2020 3164 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\147baa63b55c0cce01db04603976b86a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff297346f8,0x7fff29734708,0x7fff297347182⤵PID:1396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,14576603441687130948,13022258551761951752,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,14576603441687130948,13022258551761951752,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2384 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,14576603441687130948,13022258551761951752,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2568 /prefetch:82⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14576603441687130948,13022258551761951752,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14576603441687130948,13022258551761951752,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,14576603441687130948,13022258551761951752,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:82⤵PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,14576603441687130948,13022258551761951752,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14576603441687130948,13022258551761951752,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3820 /prefetch:12⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14576603441687130948,13022258551761951752,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:12⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14576603441687130948,13022258551761951752,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4476 /prefetch:12⤵PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14576603441687130948,13022258551761951752,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,14576603441687130948,13022258551761951752,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4416 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1712
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3948
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dbac49e66219979194c79f1cf1cb3dd1
SHA14ef87804a04d51ae1fac358f92382548b27f62f2
SHA256f24ed6c5bf4b734a9af4d64e14a80a160bea569f50849f70bf7b7277c4f48562
SHA512bb314d61f53cf7774f6dfb6b772c72f5daf386bc3d27d2bb7a14c65848ee86e6c48e9c5696693ded31846b69b9372a530175df48494e3d61a228e49d43401ad1
-
Filesize
152B
MD5a9e55f5864d6e2afd2fd84e25a3bc228
SHA1a5efcff9e3df6252c7fe8535d505235f82aab276
SHA2560f4df3120e4620555916be8e51c29be8d600d68ae5244efad6a0268aabc8c452
SHA51212f45fa73a6de6dfe17acc8b52b60f2d79008da130730b74cc138c1dcd73ccc99487165e3c8c90dc247359fde272f1ec6b3cf2c5fcb04e5093936144d0558b75
-
Filesize
5KB
MD5fd9deeae46bbe8e320bff3cc0d211571
SHA124cceae18303dfe68517d2f080fa341c68c67b5a
SHA2567458718da9d85f9bbdec694f1b28d8c7330ab1b95ddf8c88447081fb428b1c95
SHA512d8235b8a03e283bcba38efd52c868a1821da1d7db56d81d83303c2c71472ec10163369fec5c91cbe9b0be1a1c2a3268ec8afbbad7f7a312527709d0f94a7b54e
-
Filesize
6KB
MD524adac7582ddb6b2d7e1a202a761ce97
SHA1b15055bafb9426013fe91a76de5dd50f06116e09
SHA2564d162cd25b556bff53857fd1df07ca01872fbe8db4cbeab0883340e40824e5ed
SHA5127161c67e27354185156e8198acfd74f6249d6c676dc5778875173e7bb9d69c492f0ca58cc3c32af128db10cc113017d636ab45fc173741d8e3404f90e369dbc4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD527a27b0ce46bbc53fa41f05096e22c12
SHA1f433342dd390f10802fbaad0cf50851b2741fa5f
SHA256034e067f4b37d025203ec87c5ed8d2ed92bb624b0634102d0f2500ca42c7adc2
SHA512ee862298856f2228f96c2e690fda9ffee711b7861b64aeb886b79d0a7f061d9b9fd1bdb467a80476e115faf8a0f6e324d922cdd445a6c8b372a2f46d29213089