Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2024 04:34
Static task
static1
Behavioral task
behavioral1
Sample
16006fdee1bf353a929f8cc144f95e85_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
16006fdee1bf353a929f8cc144f95e85_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
16006fdee1bf353a929f8cc144f95e85_JaffaCakes118.html
-
Size
13KB
-
MD5
16006fdee1bf353a929f8cc144f95e85
-
SHA1
67e84df64180d98860a1b49f7855927eaa156345
-
SHA256
f8f5ca79900ca330141a1f38660c92e0b77c1c7e78914487b83029a989db13f5
-
SHA512
1cd42870152b7e34abcf330c780144229729478efff17b2712a0f63d7d76a9ddff2ffd985ec51d427a372d478aab3ac13577fb26541d713f01ad8f0998b157c0
-
SSDEEP
192:6smmcnm29aIdepMyMy2O5L9I5VnDuruCXOEYzEJoG+SKoyVf9aEKbNkLExb:6smZnd90GfKlYIiG+gyVfXGOEd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 60 msedge.exe 60 msedge.exe 3704 msedge.exe 3704 msedge.exe 3664 identity_helper.exe 3664 identity_helper.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3704 wrote to memory of 1104 3704 msedge.exe 83 PID 3704 wrote to memory of 1104 3704 msedge.exe 83 PID 3704 wrote to memory of 4356 3704 msedge.exe 84 PID 3704 wrote to memory of 4356 3704 msedge.exe 84 PID 3704 wrote to memory of 4356 3704 msedge.exe 84 PID 3704 wrote to memory of 4356 3704 msedge.exe 84 PID 3704 wrote to memory of 4356 3704 msedge.exe 84 PID 3704 wrote to memory of 4356 3704 msedge.exe 84 PID 3704 wrote to memory of 4356 3704 msedge.exe 84 PID 3704 wrote to memory of 4356 3704 msedge.exe 84 PID 3704 wrote to memory of 4356 3704 msedge.exe 84 PID 3704 wrote to memory of 4356 3704 msedge.exe 84 PID 3704 wrote to memory of 4356 3704 msedge.exe 84 PID 3704 wrote to memory of 4356 3704 msedge.exe 84 PID 3704 wrote to memory of 4356 3704 msedge.exe 84 PID 3704 wrote to memory of 4356 3704 msedge.exe 84 PID 3704 wrote to memory of 4356 3704 msedge.exe 84 PID 3704 wrote to memory of 4356 3704 msedge.exe 84 PID 3704 wrote to memory of 4356 3704 msedge.exe 84 PID 3704 wrote to memory of 4356 3704 msedge.exe 84 PID 3704 wrote to memory of 4356 3704 msedge.exe 84 PID 3704 wrote to memory of 4356 3704 msedge.exe 84 PID 3704 wrote to memory of 4356 3704 msedge.exe 84 PID 3704 wrote to memory of 4356 3704 msedge.exe 84 PID 3704 wrote to memory of 4356 3704 msedge.exe 84 PID 3704 wrote to memory of 4356 3704 msedge.exe 84 PID 3704 wrote to memory of 4356 3704 msedge.exe 84 PID 3704 wrote to memory of 4356 3704 msedge.exe 84 PID 3704 wrote to memory of 4356 3704 msedge.exe 84 PID 3704 wrote to memory of 4356 3704 msedge.exe 84 PID 3704 wrote to memory of 4356 3704 msedge.exe 84 PID 3704 wrote to memory of 4356 3704 msedge.exe 84 PID 3704 wrote to memory of 4356 3704 msedge.exe 84 PID 3704 wrote to memory of 4356 3704 msedge.exe 84 PID 3704 wrote to memory of 4356 3704 msedge.exe 84 PID 3704 wrote to memory of 4356 3704 msedge.exe 84 PID 3704 wrote to memory of 4356 3704 msedge.exe 84 PID 3704 wrote to memory of 4356 3704 msedge.exe 84 PID 3704 wrote to memory of 4356 3704 msedge.exe 84 PID 3704 wrote to memory of 4356 3704 msedge.exe 84 PID 3704 wrote to memory of 4356 3704 msedge.exe 84 PID 3704 wrote to memory of 4356 3704 msedge.exe 84 PID 3704 wrote to memory of 60 3704 msedge.exe 85 PID 3704 wrote to memory of 60 3704 msedge.exe 85 PID 3704 wrote to memory of 4680 3704 msedge.exe 86 PID 3704 wrote to memory of 4680 3704 msedge.exe 86 PID 3704 wrote to memory of 4680 3704 msedge.exe 86 PID 3704 wrote to memory of 4680 3704 msedge.exe 86 PID 3704 wrote to memory of 4680 3704 msedge.exe 86 PID 3704 wrote to memory of 4680 3704 msedge.exe 86 PID 3704 wrote to memory of 4680 3704 msedge.exe 86 PID 3704 wrote to memory of 4680 3704 msedge.exe 86 PID 3704 wrote to memory of 4680 3704 msedge.exe 86 PID 3704 wrote to memory of 4680 3704 msedge.exe 86 PID 3704 wrote to memory of 4680 3704 msedge.exe 86 PID 3704 wrote to memory of 4680 3704 msedge.exe 86 PID 3704 wrote to memory of 4680 3704 msedge.exe 86 PID 3704 wrote to memory of 4680 3704 msedge.exe 86 PID 3704 wrote to memory of 4680 3704 msedge.exe 86 PID 3704 wrote to memory of 4680 3704 msedge.exe 86 PID 3704 wrote to memory of 4680 3704 msedge.exe 86 PID 3704 wrote to memory of 4680 3704 msedge.exe 86 PID 3704 wrote to memory of 4680 3704 msedge.exe 86 PID 3704 wrote to memory of 4680 3704 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\16006fdee1bf353a929f8cc144f95e85_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7fffabfa46f8,0x7fffabfa4708,0x7fffabfa47182⤵PID:1104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1908,1769866762481747331,4699955413256267644,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2028 /prefetch:22⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1908,1769866762481747331,4699955413256267644,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2332 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1908,1769866762481747331,4699955413256267644,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,1769866762481747331,4699955413256267644,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,1769866762481747331,4699955413256267644,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1908,1769866762481747331,4699955413256267644,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 /prefetch:82⤵PID:1772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1908,1769866762481747331,4699955413256267644,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,1769866762481747331,4699955413256267644,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,1769866762481747331,4699955413256267644,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4884 /prefetch:12⤵PID:3284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,1769866762481747331,4699955413256267644,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:5564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,1769866762481747331,4699955413256267644,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1908,1769866762481747331,4699955413256267644,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1876 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4776
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:744
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58b2290ca03b4ca5fe52d82550c7e7d69
SHA120583a7851a906444204ce8ba4fa51153e6cd494
SHA256f9ff4871fc5317299de907489d466e630be63d698c8f7cb77cc81faddbecc6d2
SHA512704ec8122cc1c263dff67ddbb5c20ee0db8a438674d716bc3be5b266ee5629a219b0049d721f9eb2dd8f2d8fda0163659eaa4d3e1f0a6e9072a8ffb92bb2b25d
-
Filesize
152B
MD5919c29d42fb6034fee2f5de14d573c63
SHA124a2e1042347b3853344157239bde3ed699047a8
SHA25617cd6de97a0c020cb4935739cfef4ec4e074e8d127ac4c531b6dc496580c8141
SHA512bb7eadd087bbcec8b1b8a49b102b454333f2f9708d36b6ffc3c82fdc52e46873398d967238c3bfe9ac6caef45b017a5fe3938ebf5f3053e4ef9be7b2752b563d
-
Filesize
663B
MD57d7f7d8fa25b89b3dc3b58e957219a33
SHA1a7047fbd6097ce9df4427c6e9fb8c8dee5638b57
SHA256b871143486405fd13abe973489f31ff9e3ee00ad8e946290cfcdabcdf99e9759
SHA5122e372e68738ee4a18dbc35494982c875a99c2909c7935a93d0ec4a54a37dc6722ed11063e1e6f4066fc0fcbbd7e47e5736e7738370adaadf9495849d1a3663e3
-
Filesize
6KB
MD5b0df29e3d07ca8abaac24104835f7818
SHA12db266d4caa6f865ca5c1f08cdc570c88684630f
SHA256b992d9716f1c573b86f55e658082b5f7f32048abae6eb7b87fd6062653775406
SHA512c589a5ba648f492c64970d44c94cef332d5ecb5bbbb66a26a78a4591a3fe12363e96a9abe8dca9065297955f4e931a7ad78c16e562bfaa70b79479398a0af326
-
Filesize
5KB
MD584f6128eedb767b69ae7e3a1864942c0
SHA1dcab94e48bf4e7bdd2bd1995c4ce6afe3388914a
SHA256ab3433f0507b60f3df417364ce97e933bfe2e0143730c1d28544856059866dbf
SHA5121d12bbb53ff189a13ed8cd73af856c84b9c71b9bb7e1420d8c11619b7e54f94549412e1b207c6c0f9b88cf213513423205a2434289006d4679854bd9319f4ac7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d4219b133d0ce1658acf6467bef461a7
SHA1cf55e5bff28c543872cecac15239bc73a0230932
SHA256ac44880734250ec5035543a84415c06c9181d1e29f128120088c8f9a8c256fd3
SHA512fa3f064b54967e9e06f7cac826bf7bff91fc45e03752f0a3baac8b7c1f85feb5b4f65e4a304fd1d0adca6f19d24c7509fc159610797339bb35b0dcf2101bba26