Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2024, 02:22
Static task
static1
Behavioral task
behavioral1
Sample
158c6c117d8a030775fc9860c60fcdd2_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
158c6c117d8a030775fc9860c60fcdd2_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
158c6c117d8a030775fc9860c60fcdd2_JaffaCakes118.html
-
Size
76KB
-
MD5
158c6c117d8a030775fc9860c60fcdd2
-
SHA1
f10c20b916a33233289ec5c35c141cf85c768639
-
SHA256
a7f170e4e0d1b7b847208ffebc6b434a8576b651e4f174af4ec2c215533d3ed2
-
SHA512
a92ebd542c50677b51414ddd39c7bea9c072e3e65b747d02d1c9bc436154b643161ac535746d39b67a555690f9d1053b3dccaa43edc7787e9eaa2f595b21abe8
-
SSDEEP
1536:++2voab9jIsvtX+KQEwww9RFQGg25JTUkCwDKw9yBwhFym3k3wpze:Evoab9pmhFym3k3wpze
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4016 msedge.exe 4016 msedge.exe 1940 msedge.exe 1940 msedge.exe 880 identity_helper.exe 880 identity_helper.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1940 wrote to memory of 3428 1940 msedge.exe 86 PID 1940 wrote to memory of 3428 1940 msedge.exe 86 PID 1940 wrote to memory of 1188 1940 msedge.exe 87 PID 1940 wrote to memory of 1188 1940 msedge.exe 87 PID 1940 wrote to memory of 1188 1940 msedge.exe 87 PID 1940 wrote to memory of 1188 1940 msedge.exe 87 PID 1940 wrote to memory of 1188 1940 msedge.exe 87 PID 1940 wrote to memory of 1188 1940 msedge.exe 87 PID 1940 wrote to memory of 1188 1940 msedge.exe 87 PID 1940 wrote to memory of 1188 1940 msedge.exe 87 PID 1940 wrote to memory of 1188 1940 msedge.exe 87 PID 1940 wrote to memory of 1188 1940 msedge.exe 87 PID 1940 wrote to memory of 1188 1940 msedge.exe 87 PID 1940 wrote to memory of 1188 1940 msedge.exe 87 PID 1940 wrote to memory of 1188 1940 msedge.exe 87 PID 1940 wrote to memory of 1188 1940 msedge.exe 87 PID 1940 wrote to memory of 1188 1940 msedge.exe 87 PID 1940 wrote to memory of 1188 1940 msedge.exe 87 PID 1940 wrote to memory of 1188 1940 msedge.exe 87 PID 1940 wrote to memory of 1188 1940 msedge.exe 87 PID 1940 wrote to memory of 1188 1940 msedge.exe 87 PID 1940 wrote to memory of 1188 1940 msedge.exe 87 PID 1940 wrote to memory of 1188 1940 msedge.exe 87 PID 1940 wrote to memory of 1188 1940 msedge.exe 87 PID 1940 wrote to memory of 1188 1940 msedge.exe 87 PID 1940 wrote to memory of 1188 1940 msedge.exe 87 PID 1940 wrote to memory of 1188 1940 msedge.exe 87 PID 1940 wrote to memory of 1188 1940 msedge.exe 87 PID 1940 wrote to memory of 1188 1940 msedge.exe 87 PID 1940 wrote to memory of 1188 1940 msedge.exe 87 PID 1940 wrote to memory of 1188 1940 msedge.exe 87 PID 1940 wrote to memory of 1188 1940 msedge.exe 87 PID 1940 wrote to memory of 1188 1940 msedge.exe 87 PID 1940 wrote to memory of 1188 1940 msedge.exe 87 PID 1940 wrote to memory of 1188 1940 msedge.exe 87 PID 1940 wrote to memory of 1188 1940 msedge.exe 87 PID 1940 wrote to memory of 1188 1940 msedge.exe 87 PID 1940 wrote to memory of 1188 1940 msedge.exe 87 PID 1940 wrote to memory of 1188 1940 msedge.exe 87 PID 1940 wrote to memory of 1188 1940 msedge.exe 87 PID 1940 wrote to memory of 1188 1940 msedge.exe 87 PID 1940 wrote to memory of 1188 1940 msedge.exe 87 PID 1940 wrote to memory of 4016 1940 msedge.exe 88 PID 1940 wrote to memory of 4016 1940 msedge.exe 88 PID 1940 wrote to memory of 2336 1940 msedge.exe 89 PID 1940 wrote to memory of 2336 1940 msedge.exe 89 PID 1940 wrote to memory of 2336 1940 msedge.exe 89 PID 1940 wrote to memory of 2336 1940 msedge.exe 89 PID 1940 wrote to memory of 2336 1940 msedge.exe 89 PID 1940 wrote to memory of 2336 1940 msedge.exe 89 PID 1940 wrote to memory of 2336 1940 msedge.exe 89 PID 1940 wrote to memory of 2336 1940 msedge.exe 89 PID 1940 wrote to memory of 2336 1940 msedge.exe 89 PID 1940 wrote to memory of 2336 1940 msedge.exe 89 PID 1940 wrote to memory of 2336 1940 msedge.exe 89 PID 1940 wrote to memory of 2336 1940 msedge.exe 89 PID 1940 wrote to memory of 2336 1940 msedge.exe 89 PID 1940 wrote to memory of 2336 1940 msedge.exe 89 PID 1940 wrote to memory of 2336 1940 msedge.exe 89 PID 1940 wrote to memory of 2336 1940 msedge.exe 89 PID 1940 wrote to memory of 2336 1940 msedge.exe 89 PID 1940 wrote to memory of 2336 1940 msedge.exe 89 PID 1940 wrote to memory of 2336 1940 msedge.exe 89 PID 1940 wrote to memory of 2336 1940 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\158c6c117d8a030775fc9860c60fcdd2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xc4,0x108,0x7ffa266146f8,0x7ffa26614708,0x7ffa266147182⤵PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,15465970686055684768,6531453344257218296,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,15465970686055684768,6531453344257218296,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,15465970686055684768,6531453344257218296,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15465970686055684768,6531453344257218296,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15465970686055684768,6531453344257218296,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15465970686055684768,6531453344257218296,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2208 /prefetch:12⤵PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,15465970686055684768,6531453344257218296,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5584 /prefetch:82⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,15465970686055684768,6531453344257218296,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5584 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15465970686055684768,6531453344257218296,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3016 /prefetch:12⤵PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15465970686055684768,6531453344257218296,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1756 /prefetch:12⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15465970686055684768,6531453344257218296,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5724 /prefetch:12⤵PID:2660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15465970686055684768,6531453344257218296,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,15465970686055684768,6531453344257218296,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5612 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:972
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4816
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58b2290ca03b4ca5fe52d82550c7e7d69
SHA120583a7851a906444204ce8ba4fa51153e6cd494
SHA256f9ff4871fc5317299de907489d466e630be63d698c8f7cb77cc81faddbecc6d2
SHA512704ec8122cc1c263dff67ddbb5c20ee0db8a438674d716bc3be5b266ee5629a219b0049d721f9eb2dd8f2d8fda0163659eaa4d3e1f0a6e9072a8ffb92bb2b25d
-
Filesize
152B
MD5919c29d42fb6034fee2f5de14d573c63
SHA124a2e1042347b3853344157239bde3ed699047a8
SHA25617cd6de97a0c020cb4935739cfef4ec4e074e8d127ac4c531b6dc496580c8141
SHA512bb7eadd087bbcec8b1b8a49b102b454333f2f9708d36b6ffc3c82fdc52e46873398d967238c3bfe9ac6caef45b017a5fe3938ebf5f3053e4ef9be7b2752b563d
-
Filesize
465B
MD59be151cdeedc6f5a47b05e38b3115d1e
SHA1352c3d37f6a4a1faf889fdfcd99f270676e890ef
SHA256c082de04bbd221d73018a691dfc5ee0b1f9dffcee290225f5206a1e08c08d029
SHA512d3e1d67f74949fdc8f8ec4c57d63149fc45924e1fa189e137d97e311e2fbe529b3a464e54d23006400bc7b30c1c15ba88c3370041cb6a948d62805d5a938af46
-
Filesize
614B
MD5cee6650c93f4351881cfa6267a8beac7
SHA14b6dec76f36b7f59014a8839b390e7aadad55a54
SHA2560241d324dce2423ef82229ea7bf817641c3dceac2d0e5695ab719f381284d24d
SHA512e868a9efdc425a1351def72394fa09ef7151d5ff9a6f73b435b5a94930dcb79a9d87445a6065c8189e7c04e9524de046e830175acba0dc073a3020abb0d18480
-
Filesize
6KB
MD50eb945e2ca018e10c64f9b8a075373bb
SHA13bc88f37832c97bd2461163ae700e02eca5b2248
SHA2568e8570a64258805d992179e87e341ab1ced27c702dc386583de94f3886b674f7
SHA51247248c6a11fceb121556e044013955f6ff987fcc7631eec050ac6c629da56fa6501d0835cb79334f9f77498fda63014f480a5b9f72348734073cef2fd66e55dc
-
Filesize
5KB
MD55da41b0417375012e6a344d26e3964dc
SHA14c2c22aa180e25bbade6b64a165a9cc382390515
SHA25673650bd0c8c4c270fad83f0361a4ff7fa1c1c65a6a416960e1ddb45b59e9ccd1
SHA512ddc2ac1a64b14ce8aa7b7c5c077146b33f10d2aa949e7d96fd41ccb39ed5376916110cb5ebfd8215047cfb1f7569b28116e6ecd4190daad25c815abfa8ccb1c3
-
Filesize
6KB
MD5ef748ea7328f4953e3143e842b20a00c
SHA1e2b1feaed55c67e46dbd8f45cadbcc7606a0b83e
SHA256ed2f3647178dd4082408ef7c8e2b5a8f6a32d6c656941cb908fa8ef18b4f1a95
SHA512472fbcefa30d50e110817cf3a2edbeb24139a62403a7009ac40a4893214a690163027184825c9f255df202399579b8cf8cd5cb0479d3c10e5f0490c77e520f38
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57ed7b3896edb2845e8539a128ef92cc1
SHA1ecb7f8ebe75435c125ff0c8c43facca0dee0e898
SHA25685840fb2fe3e08c92168366875ad52108f62b5d78c95a2f8ecd440e51ac98d76
SHA512dd0c03237c794abe4fca04a91d9d74a79c041dc4f2676c47fa5354071102fbeb006d15e85f6421a336d18cb10bdb409f26140ed23d659498885a2e6d0223df54