Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2024, 09:58
Static task
static1
Behavioral task
behavioral1
Sample
1721f04d050b7325e1648280422c0c16_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1721f04d050b7325e1648280422c0c16_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
1721f04d050b7325e1648280422c0c16_JaffaCakes118.html
-
Size
891B
-
MD5
1721f04d050b7325e1648280422c0c16
-
SHA1
ede5d952e741fa3b9c5a92b181c5a656ee5ac6c2
-
SHA256
bd1c5a19959f6a916b7defe220ce41878964c73afd6cd512be06b87fd45018a9
-
SHA512
b9a5a8b2e97b23c8561793485bf77c285e481a2e2a1685afe3b713add283d9cbcddd00684b03707603b7ac0016d7baacf2d4ac8add3e11db5319675c91b5a151
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4600 msedge.exe 4600 msedge.exe 2868 msedge.exe 2868 msedge.exe 2912 identity_helper.exe 2912 identity_helper.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2868 wrote to memory of 692 2868 msedge.exe 83 PID 2868 wrote to memory of 692 2868 msedge.exe 83 PID 2868 wrote to memory of 1452 2868 msedge.exe 84 PID 2868 wrote to memory of 1452 2868 msedge.exe 84 PID 2868 wrote to memory of 1452 2868 msedge.exe 84 PID 2868 wrote to memory of 1452 2868 msedge.exe 84 PID 2868 wrote to memory of 1452 2868 msedge.exe 84 PID 2868 wrote to memory of 1452 2868 msedge.exe 84 PID 2868 wrote to memory of 1452 2868 msedge.exe 84 PID 2868 wrote to memory of 1452 2868 msedge.exe 84 PID 2868 wrote to memory of 1452 2868 msedge.exe 84 PID 2868 wrote to memory of 1452 2868 msedge.exe 84 PID 2868 wrote to memory of 1452 2868 msedge.exe 84 PID 2868 wrote to memory of 1452 2868 msedge.exe 84 PID 2868 wrote to memory of 1452 2868 msedge.exe 84 PID 2868 wrote to memory of 1452 2868 msedge.exe 84 PID 2868 wrote to memory of 1452 2868 msedge.exe 84 PID 2868 wrote to memory of 1452 2868 msedge.exe 84 PID 2868 wrote to memory of 1452 2868 msedge.exe 84 PID 2868 wrote to memory of 1452 2868 msedge.exe 84 PID 2868 wrote to memory of 1452 2868 msedge.exe 84 PID 2868 wrote to memory of 1452 2868 msedge.exe 84 PID 2868 wrote to memory of 1452 2868 msedge.exe 84 PID 2868 wrote to memory of 1452 2868 msedge.exe 84 PID 2868 wrote to memory of 1452 2868 msedge.exe 84 PID 2868 wrote to memory of 1452 2868 msedge.exe 84 PID 2868 wrote to memory of 1452 2868 msedge.exe 84 PID 2868 wrote to memory of 1452 2868 msedge.exe 84 PID 2868 wrote to memory of 1452 2868 msedge.exe 84 PID 2868 wrote to memory of 1452 2868 msedge.exe 84 PID 2868 wrote to memory of 1452 2868 msedge.exe 84 PID 2868 wrote to memory of 1452 2868 msedge.exe 84 PID 2868 wrote to memory of 1452 2868 msedge.exe 84 PID 2868 wrote to memory of 1452 2868 msedge.exe 84 PID 2868 wrote to memory of 1452 2868 msedge.exe 84 PID 2868 wrote to memory of 1452 2868 msedge.exe 84 PID 2868 wrote to memory of 1452 2868 msedge.exe 84 PID 2868 wrote to memory of 1452 2868 msedge.exe 84 PID 2868 wrote to memory of 1452 2868 msedge.exe 84 PID 2868 wrote to memory of 1452 2868 msedge.exe 84 PID 2868 wrote to memory of 1452 2868 msedge.exe 84 PID 2868 wrote to memory of 1452 2868 msedge.exe 84 PID 2868 wrote to memory of 4600 2868 msedge.exe 85 PID 2868 wrote to memory of 4600 2868 msedge.exe 85 PID 2868 wrote to memory of 1536 2868 msedge.exe 86 PID 2868 wrote to memory of 1536 2868 msedge.exe 86 PID 2868 wrote to memory of 1536 2868 msedge.exe 86 PID 2868 wrote to memory of 1536 2868 msedge.exe 86 PID 2868 wrote to memory of 1536 2868 msedge.exe 86 PID 2868 wrote to memory of 1536 2868 msedge.exe 86 PID 2868 wrote to memory of 1536 2868 msedge.exe 86 PID 2868 wrote to memory of 1536 2868 msedge.exe 86 PID 2868 wrote to memory of 1536 2868 msedge.exe 86 PID 2868 wrote to memory of 1536 2868 msedge.exe 86 PID 2868 wrote to memory of 1536 2868 msedge.exe 86 PID 2868 wrote to memory of 1536 2868 msedge.exe 86 PID 2868 wrote to memory of 1536 2868 msedge.exe 86 PID 2868 wrote to memory of 1536 2868 msedge.exe 86 PID 2868 wrote to memory of 1536 2868 msedge.exe 86 PID 2868 wrote to memory of 1536 2868 msedge.exe 86 PID 2868 wrote to memory of 1536 2868 msedge.exe 86 PID 2868 wrote to memory of 1536 2868 msedge.exe 86 PID 2868 wrote to memory of 1536 2868 msedge.exe 86 PID 2868 wrote to memory of 1536 2868 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\1721f04d050b7325e1648280422c0c16_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9178446f8,0x7ff917844708,0x7ff9178447182⤵PID:692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,18391345549903709104,1057765954629376272,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,18391345549903709104,1057765954629376272,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,18391345549903709104,1057765954629376272,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,18391345549903709104,1057765954629376272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,18391345549903709104,1057765954629376272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,18391345549903709104,1057765954629376272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4308 /prefetch:12⤵PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,18391345549903709104,1057765954629376272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3744 /prefetch:12⤵PID:828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,18391345549903709104,1057765954629376272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,18391345549903709104,1057765954629376272,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:82⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,18391345549903709104,1057765954629376272,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,18391345549903709104,1057765954629376272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,18391345549903709104,1057765954629376272,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,18391345549903709104,1057765954629376272,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,18391345549903709104,1057765954629376272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4164 /prefetch:12⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,18391345549903709104,1057765954629376272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2680 /prefetch:12⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,18391345549903709104,1057765954629376272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1048 /prefetch:12⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,18391345549903709104,1057765954629376272,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5840 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2948
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3136
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
Filesize
5KB
MD5c05cb8b66f9201c2eb36d14764645779
SHA18aee059d9fc62fc867ccb864359444f202fe7fa0
SHA256ada885a3163e38f7871a88e8189781498a615fd0180eab3db7ed41873ce89fdf
SHA512705d3233326bc135b71c465a692eeb9f5ad8d114585d5887dc12b33e787351b8cc5c27f14b777c4168c0cec82ebe923594a08c44f998b4ac458ac6ee38ee670e
-
Filesize
6KB
MD561d590c6ab61375f79c3ca9e15f9bc64
SHA19a959c79dc380d23175fdec63c08511bb7618460
SHA2567779264ffd4b993339aaa44b2574cbcfa1fc8fb85694920e415e93ca7d924d81
SHA51299a972838f870dcfa7eb81355ec1241eca0767455e8a909d52d1fe46257404037764226699639b81897023576c4acb68e182fb7e8876c1943a32f56765b0b24d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD599e6192fe55f6d2e921bf0f3f2303536
SHA1f99e90314b1512f20a88bd3226724b90db45992a
SHA25672c083613c697be9a53cb82cbfd46ad94e3d41bf5dee00f76c9eccbc4e49003d
SHA51280f2c8ffa59c63f30510cd5b739329a18e21dd55b83a16388c7372e28c855b99cd48bec4d14de0ee6fbbf1d7832d635b1c5af88c46576237716393948772241a