Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2024 02:22
Static task
static1
Behavioral task
behavioral1
Sample
158c4f8a12d269439c42f1465d8bd632_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
158c4f8a12d269439c42f1465d8bd632_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
158c4f8a12d269439c42f1465d8bd632_JaffaCakes118.html
-
Size
37KB
-
MD5
158c4f8a12d269439c42f1465d8bd632
-
SHA1
6e23c28f13476c3712a69944982f581a27b3772d
-
SHA256
196a0b940ec65711f56de92391fe7064faaaebc0ae25a74de05d0e61a7897c5f
-
SHA512
cc3680c4ac22824dd530f34af98934b85ecd6efeff2a3486a88eac188381d17d2bc43a81f485291a195b6bd46a5ed020a89416a4bc4efe446ad459fb3a145cda
-
SSDEEP
768:vTPMHS852ufSQ3FI7fE1X/k0UAYkooDiUvADe5PL5AmYQwjTjA2UV:LPM152ufSQ3FI7fE1X/goDiUvADe5PLn
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2512 msedge.exe 2512 msedge.exe 2920 msedge.exe 2920 msedge.exe 4488 identity_helper.exe 4488 identity_helper.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2920 wrote to memory of 4556 2920 msedge.exe 84 PID 2920 wrote to memory of 4556 2920 msedge.exe 84 PID 2920 wrote to memory of 4380 2920 msedge.exe 85 PID 2920 wrote to memory of 4380 2920 msedge.exe 85 PID 2920 wrote to memory of 4380 2920 msedge.exe 85 PID 2920 wrote to memory of 4380 2920 msedge.exe 85 PID 2920 wrote to memory of 4380 2920 msedge.exe 85 PID 2920 wrote to memory of 4380 2920 msedge.exe 85 PID 2920 wrote to memory of 4380 2920 msedge.exe 85 PID 2920 wrote to memory of 4380 2920 msedge.exe 85 PID 2920 wrote to memory of 4380 2920 msedge.exe 85 PID 2920 wrote to memory of 4380 2920 msedge.exe 85 PID 2920 wrote to memory of 4380 2920 msedge.exe 85 PID 2920 wrote to memory of 4380 2920 msedge.exe 85 PID 2920 wrote to memory of 4380 2920 msedge.exe 85 PID 2920 wrote to memory of 4380 2920 msedge.exe 85 PID 2920 wrote to memory of 4380 2920 msedge.exe 85 PID 2920 wrote to memory of 4380 2920 msedge.exe 85 PID 2920 wrote to memory of 4380 2920 msedge.exe 85 PID 2920 wrote to memory of 4380 2920 msedge.exe 85 PID 2920 wrote to memory of 4380 2920 msedge.exe 85 PID 2920 wrote to memory of 4380 2920 msedge.exe 85 PID 2920 wrote to memory of 4380 2920 msedge.exe 85 PID 2920 wrote to memory of 4380 2920 msedge.exe 85 PID 2920 wrote to memory of 4380 2920 msedge.exe 85 PID 2920 wrote to memory of 4380 2920 msedge.exe 85 PID 2920 wrote to memory of 4380 2920 msedge.exe 85 PID 2920 wrote to memory of 4380 2920 msedge.exe 85 PID 2920 wrote to memory of 4380 2920 msedge.exe 85 PID 2920 wrote to memory of 4380 2920 msedge.exe 85 PID 2920 wrote to memory of 4380 2920 msedge.exe 85 PID 2920 wrote to memory of 4380 2920 msedge.exe 85 PID 2920 wrote to memory of 4380 2920 msedge.exe 85 PID 2920 wrote to memory of 4380 2920 msedge.exe 85 PID 2920 wrote to memory of 4380 2920 msedge.exe 85 PID 2920 wrote to memory of 4380 2920 msedge.exe 85 PID 2920 wrote to memory of 4380 2920 msedge.exe 85 PID 2920 wrote to memory of 4380 2920 msedge.exe 85 PID 2920 wrote to memory of 4380 2920 msedge.exe 85 PID 2920 wrote to memory of 4380 2920 msedge.exe 85 PID 2920 wrote to memory of 4380 2920 msedge.exe 85 PID 2920 wrote to memory of 4380 2920 msedge.exe 85 PID 2920 wrote to memory of 2512 2920 msedge.exe 86 PID 2920 wrote to memory of 2512 2920 msedge.exe 86 PID 2920 wrote to memory of 3752 2920 msedge.exe 87 PID 2920 wrote to memory of 3752 2920 msedge.exe 87 PID 2920 wrote to memory of 3752 2920 msedge.exe 87 PID 2920 wrote to memory of 3752 2920 msedge.exe 87 PID 2920 wrote to memory of 3752 2920 msedge.exe 87 PID 2920 wrote to memory of 3752 2920 msedge.exe 87 PID 2920 wrote to memory of 3752 2920 msedge.exe 87 PID 2920 wrote to memory of 3752 2920 msedge.exe 87 PID 2920 wrote to memory of 3752 2920 msedge.exe 87 PID 2920 wrote to memory of 3752 2920 msedge.exe 87 PID 2920 wrote to memory of 3752 2920 msedge.exe 87 PID 2920 wrote to memory of 3752 2920 msedge.exe 87 PID 2920 wrote to memory of 3752 2920 msedge.exe 87 PID 2920 wrote to memory of 3752 2920 msedge.exe 87 PID 2920 wrote to memory of 3752 2920 msedge.exe 87 PID 2920 wrote to memory of 3752 2920 msedge.exe 87 PID 2920 wrote to memory of 3752 2920 msedge.exe 87 PID 2920 wrote to memory of 3752 2920 msedge.exe 87 PID 2920 wrote to memory of 3752 2920 msedge.exe 87 PID 2920 wrote to memory of 3752 2920 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\158c4f8a12d269439c42f1465d8bd632_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9e61746f8,0x7ff9e6174708,0x7ff9e61747182⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,16218865427594478438,7360372830346618441,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,16218865427594478438,7360372830346618441,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2368 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,16218865427594478438,7360372830346618441,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,16218865427594478438,7360372830346618441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:1156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,16218865427594478438,7360372830346618441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,16218865427594478438,7360372830346618441,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2580 /prefetch:82⤵PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,16218865427594478438,7360372830346618441,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2580 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,16218865427594478438,7360372830346618441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:12⤵PID:1048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,16218865427594478438,7360372830346618441,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:12⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,16218865427594478438,7360372830346618441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4092 /prefetch:12⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,16218865427594478438,7360372830346618441,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:12⤵PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,16218865427594478438,7360372830346618441,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5936 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3764
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4964
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
Filesize
1003B
MD595f0546688a9c25bf150cb926e5cbec4
SHA18e5671aa68f46ad90bfd4d2d38a58ba7313ed851
SHA2561f4eaf29105aeacc5ca4df683bb2dda365ff8237d61cd5ee286e2ad274582f84
SHA512e459b3d0fe83142c2770776cf13489b5433ec980e28a19c29bc0740a4dc4b4bd13de456fc6f5b602ca387b5872fea23f7b3ff79427cc6eb0c146f32e1e9fc0f6
-
Filesize
5KB
MD5b3f8ec2a5f027cae7f9e643a8bd69b34
SHA1936dcf97b10e3234b00afc62c67857b08c05421c
SHA256d4a11dcc9083480330362e29a2c6c62e67ce1d7a416c673341b9f7d0e117e22a
SHA512dbea3938dca61956835bc57b97ffed3c97089969dc7295c889b99fb5e8a0a8aca8076601e947fc8958ee0d4f6e5a370da2b73d616946caf0de91af52756c258e
-
Filesize
6KB
MD5db0d38ac1ad8919cca21df44146b34c6
SHA108687359052f18b9c3b8d54669920ae67f5e08c5
SHA256c0036f6a09800bce02d58e61a611c49593ad6e6b3504010c5492755bf56f1587
SHA512af9e3b0320eec3e6bb1cca679bd92876116c59ccf608dde14a69cca4595e78c834c995687255711d11e8649ef33b520a96cd32161205382cd42e6e8a414f198f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54b8d05165e10c030cebfed5dee1342ef
SHA1150384475df36ca690fe9f7b836e65934bd4f15d
SHA2568f519c86ed9d17a5d892d340f9230447d1143ba2fa82cfc9884bbfa1ec7b2b6b
SHA512295a737229b33309c3a3e80a1b0484218f248e74ea4b07bdd8be91ba528d0172fec513fce76a94cc18118d85005884811ba44523fbbd483ac383203226507cd8