Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2024 00:09
Static task
static1
Behavioral task
behavioral1
Sample
15191b21702386d160e46b22d0982081_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
15191b21702386d160e46b22d0982081_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
15191b21702386d160e46b22d0982081_JaffaCakes118.html
-
Size
23KB
-
MD5
15191b21702386d160e46b22d0982081
-
SHA1
5dc2d54e81585827e04313bfcde9f738c84594bc
-
SHA256
6419aa8b2538fc5ac0185185f8fe97dfbd432dd717beaee462b490566aaac21e
-
SHA512
d12386d918a76b63326041a79877e571e30c258769a1a0f265a882a3694b93ab077f9c66b156dc9cb79e6fceebace78711836b564cd2776d707025ee2ceedff5
-
SSDEEP
192:uwrxb5nGcKnQjxn5Q/OnQie9NnDnQOkEntiknQTbnVnQAGLnLnQtdqMBdqnYnQ7o:GgQ/SGar5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2376 msedge.exe 2376 msedge.exe 3348 msedge.exe 3348 msedge.exe 4868 identity_helper.exe 4868 identity_helper.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3348 wrote to memory of 4500 3348 msedge.exe 82 PID 3348 wrote to memory of 4500 3348 msedge.exe 82 PID 3348 wrote to memory of 2212 3348 msedge.exe 83 PID 3348 wrote to memory of 2212 3348 msedge.exe 83 PID 3348 wrote to memory of 2212 3348 msedge.exe 83 PID 3348 wrote to memory of 2212 3348 msedge.exe 83 PID 3348 wrote to memory of 2212 3348 msedge.exe 83 PID 3348 wrote to memory of 2212 3348 msedge.exe 83 PID 3348 wrote to memory of 2212 3348 msedge.exe 83 PID 3348 wrote to memory of 2212 3348 msedge.exe 83 PID 3348 wrote to memory of 2212 3348 msedge.exe 83 PID 3348 wrote to memory of 2212 3348 msedge.exe 83 PID 3348 wrote to memory of 2212 3348 msedge.exe 83 PID 3348 wrote to memory of 2212 3348 msedge.exe 83 PID 3348 wrote to memory of 2212 3348 msedge.exe 83 PID 3348 wrote to memory of 2212 3348 msedge.exe 83 PID 3348 wrote to memory of 2212 3348 msedge.exe 83 PID 3348 wrote to memory of 2212 3348 msedge.exe 83 PID 3348 wrote to memory of 2212 3348 msedge.exe 83 PID 3348 wrote to memory of 2212 3348 msedge.exe 83 PID 3348 wrote to memory of 2212 3348 msedge.exe 83 PID 3348 wrote to memory of 2212 3348 msedge.exe 83 PID 3348 wrote to memory of 2212 3348 msedge.exe 83 PID 3348 wrote to memory of 2212 3348 msedge.exe 83 PID 3348 wrote to memory of 2212 3348 msedge.exe 83 PID 3348 wrote to memory of 2212 3348 msedge.exe 83 PID 3348 wrote to memory of 2212 3348 msedge.exe 83 PID 3348 wrote to memory of 2212 3348 msedge.exe 83 PID 3348 wrote to memory of 2212 3348 msedge.exe 83 PID 3348 wrote to memory of 2212 3348 msedge.exe 83 PID 3348 wrote to memory of 2212 3348 msedge.exe 83 PID 3348 wrote to memory of 2212 3348 msedge.exe 83 PID 3348 wrote to memory of 2212 3348 msedge.exe 83 PID 3348 wrote to memory of 2212 3348 msedge.exe 83 PID 3348 wrote to memory of 2212 3348 msedge.exe 83 PID 3348 wrote to memory of 2212 3348 msedge.exe 83 PID 3348 wrote to memory of 2212 3348 msedge.exe 83 PID 3348 wrote to memory of 2212 3348 msedge.exe 83 PID 3348 wrote to memory of 2212 3348 msedge.exe 83 PID 3348 wrote to memory of 2212 3348 msedge.exe 83 PID 3348 wrote to memory of 2212 3348 msedge.exe 83 PID 3348 wrote to memory of 2212 3348 msedge.exe 83 PID 3348 wrote to memory of 2376 3348 msedge.exe 84 PID 3348 wrote to memory of 2376 3348 msedge.exe 84 PID 3348 wrote to memory of 728 3348 msedge.exe 85 PID 3348 wrote to memory of 728 3348 msedge.exe 85 PID 3348 wrote to memory of 728 3348 msedge.exe 85 PID 3348 wrote to memory of 728 3348 msedge.exe 85 PID 3348 wrote to memory of 728 3348 msedge.exe 85 PID 3348 wrote to memory of 728 3348 msedge.exe 85 PID 3348 wrote to memory of 728 3348 msedge.exe 85 PID 3348 wrote to memory of 728 3348 msedge.exe 85 PID 3348 wrote to memory of 728 3348 msedge.exe 85 PID 3348 wrote to memory of 728 3348 msedge.exe 85 PID 3348 wrote to memory of 728 3348 msedge.exe 85 PID 3348 wrote to memory of 728 3348 msedge.exe 85 PID 3348 wrote to memory of 728 3348 msedge.exe 85 PID 3348 wrote to memory of 728 3348 msedge.exe 85 PID 3348 wrote to memory of 728 3348 msedge.exe 85 PID 3348 wrote to memory of 728 3348 msedge.exe 85 PID 3348 wrote to memory of 728 3348 msedge.exe 85 PID 3348 wrote to memory of 728 3348 msedge.exe 85 PID 3348 wrote to memory of 728 3348 msedge.exe 85 PID 3348 wrote to memory of 728 3348 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\15191b21702386d160e46b22d0982081_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd944946f8,0x7ffd94494708,0x7ffd944947182⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,8353832573967802901,1510971319887274534,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,8353832573967802901,1510971319887274534,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,8353832573967802901,1510971319887274534,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:82⤵PID:728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,8353832573967802901,1510971319887274534,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,8353832573967802901,1510971319887274534,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,8353832573967802901,1510971319887274534,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 /prefetch:82⤵PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,8353832573967802901,1510971319887274534,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,8353832573967802901,1510971319887274534,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,8353832573967802901,1510971319887274534,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:1068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,8353832573967802901,1510971319887274534,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:12⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,8353832573967802901,1510971319887274534,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,8353832573967802901,1510971319887274534,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2040 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2464
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2072
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1296
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
6KB
MD53479326b18c4f3f0184129b560bc7332
SHA15c8647da3431399291077928afe1b359376ed94b
SHA256121deae732fa95babb399ba93ff337a901cd8344ac6ebba7e37531b68c759612
SHA512349769eef9f01f0764a22f74e34701e11a9277c712fd4e562b42ed4f9e066c55803d1414705b4abe279dd808f353dff0610be0ef944b55b6b3804cdf6973dbde
-
Filesize
6KB
MD547eebabeb7cc25981504bb2343cbd866
SHA1d3a95401d79bc062b45281ca24d3af3051adf246
SHA2565964f5d334e299f87db2df31e4ce672a1dbd23d2ee567c44f635c1adeaa0b6e5
SHA5129606915caf34fff4115e86e25a5fbccc28fb9d44538ef7f8dccaf47d4cdce0bbbd5693bc81acec8e2a9f9b2547a4464faf9801401318055abc0acc4ec4849421
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD574a52771875b6f11e0b36c652fbe66be
SHA1359357cb171b47e651c56c34014233a9975e91ff
SHA256b0faaad47cb1827c8bd3e568f43dfb5851fb6db5a7a147ce4e7a24034ee8ff77
SHA512ab20382189a6e18e18c750b90a6e64210c3621bcb20630875bb236eee8f2a3941d1ecf4d7e7e23412375d3a501e720322df555c380df7e7d529c3852ccbe3c8e