Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2024, 15:00
Static task
static1
Behavioral task
behavioral1
Sample
18383d1a654ad5a799bd5d89884fec19_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
18383d1a654ad5a799bd5d89884fec19_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
18383d1a654ad5a799bd5d89884fec19_JaffaCakes118.html
-
Size
67KB
-
MD5
18383d1a654ad5a799bd5d89884fec19
-
SHA1
dffa64b44cfe2b18c6ed6cffc7f98d9febf5a8d3
-
SHA256
00ecc00090bb9c0f993e30bb262042abba6d60fea92082c704aadf835d2359f1
-
SHA512
32796fe212e2d56c6c16dfd442cbaee66f340e875b1698444e119dd6037f002484496f65a59bd7d652a3fc493233e4625db126149c323e0e4ea37fb0e2987584
-
SSDEEP
768:Ji/gcMiR3sI2PDDnX0g6st6g9oTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVG8sM:Jd4TzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2308 msedge.exe 2308 msedge.exe 4692 msedge.exe 4692 msedge.exe 4492 identity_helper.exe 4492 identity_helper.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4692 wrote to memory of 1888 4692 msedge.exe 85 PID 4692 wrote to memory of 1888 4692 msedge.exe 85 PID 4692 wrote to memory of 3284 4692 msedge.exe 86 PID 4692 wrote to memory of 3284 4692 msedge.exe 86 PID 4692 wrote to memory of 3284 4692 msedge.exe 86 PID 4692 wrote to memory of 3284 4692 msedge.exe 86 PID 4692 wrote to memory of 3284 4692 msedge.exe 86 PID 4692 wrote to memory of 3284 4692 msedge.exe 86 PID 4692 wrote to memory of 3284 4692 msedge.exe 86 PID 4692 wrote to memory of 3284 4692 msedge.exe 86 PID 4692 wrote to memory of 3284 4692 msedge.exe 86 PID 4692 wrote to memory of 3284 4692 msedge.exe 86 PID 4692 wrote to memory of 3284 4692 msedge.exe 86 PID 4692 wrote to memory of 3284 4692 msedge.exe 86 PID 4692 wrote to memory of 3284 4692 msedge.exe 86 PID 4692 wrote to memory of 3284 4692 msedge.exe 86 PID 4692 wrote to memory of 3284 4692 msedge.exe 86 PID 4692 wrote to memory of 3284 4692 msedge.exe 86 PID 4692 wrote to memory of 3284 4692 msedge.exe 86 PID 4692 wrote to memory of 3284 4692 msedge.exe 86 PID 4692 wrote to memory of 3284 4692 msedge.exe 86 PID 4692 wrote to memory of 3284 4692 msedge.exe 86 PID 4692 wrote to memory of 3284 4692 msedge.exe 86 PID 4692 wrote to memory of 3284 4692 msedge.exe 86 PID 4692 wrote to memory of 3284 4692 msedge.exe 86 PID 4692 wrote to memory of 3284 4692 msedge.exe 86 PID 4692 wrote to memory of 3284 4692 msedge.exe 86 PID 4692 wrote to memory of 3284 4692 msedge.exe 86 PID 4692 wrote to memory of 3284 4692 msedge.exe 86 PID 4692 wrote to memory of 3284 4692 msedge.exe 86 PID 4692 wrote to memory of 3284 4692 msedge.exe 86 PID 4692 wrote to memory of 3284 4692 msedge.exe 86 PID 4692 wrote to memory of 3284 4692 msedge.exe 86 PID 4692 wrote to memory of 3284 4692 msedge.exe 86 PID 4692 wrote to memory of 3284 4692 msedge.exe 86 PID 4692 wrote to memory of 3284 4692 msedge.exe 86 PID 4692 wrote to memory of 3284 4692 msedge.exe 86 PID 4692 wrote to memory of 3284 4692 msedge.exe 86 PID 4692 wrote to memory of 3284 4692 msedge.exe 86 PID 4692 wrote to memory of 3284 4692 msedge.exe 86 PID 4692 wrote to memory of 3284 4692 msedge.exe 86 PID 4692 wrote to memory of 3284 4692 msedge.exe 86 PID 4692 wrote to memory of 2308 4692 msedge.exe 87 PID 4692 wrote to memory of 2308 4692 msedge.exe 87 PID 4692 wrote to memory of 4612 4692 msedge.exe 88 PID 4692 wrote to memory of 4612 4692 msedge.exe 88 PID 4692 wrote to memory of 4612 4692 msedge.exe 88 PID 4692 wrote to memory of 4612 4692 msedge.exe 88 PID 4692 wrote to memory of 4612 4692 msedge.exe 88 PID 4692 wrote to memory of 4612 4692 msedge.exe 88 PID 4692 wrote to memory of 4612 4692 msedge.exe 88 PID 4692 wrote to memory of 4612 4692 msedge.exe 88 PID 4692 wrote to memory of 4612 4692 msedge.exe 88 PID 4692 wrote to memory of 4612 4692 msedge.exe 88 PID 4692 wrote to memory of 4612 4692 msedge.exe 88 PID 4692 wrote to memory of 4612 4692 msedge.exe 88 PID 4692 wrote to memory of 4612 4692 msedge.exe 88 PID 4692 wrote to memory of 4612 4692 msedge.exe 88 PID 4692 wrote to memory of 4612 4692 msedge.exe 88 PID 4692 wrote to memory of 4612 4692 msedge.exe 88 PID 4692 wrote to memory of 4612 4692 msedge.exe 88 PID 4692 wrote to memory of 4612 4692 msedge.exe 88 PID 4692 wrote to memory of 4612 4692 msedge.exe 88 PID 4692 wrote to memory of 4612 4692 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\18383d1a654ad5a799bd5d89884fec19_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd329346f8,0x7ffd32934708,0x7ffd329347182⤵PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2372,3847795580690822496,14487379386561141983,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2388 /prefetch:22⤵PID:3284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2372,3847795580690822496,14487379386561141983,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2436 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2372,3847795580690822496,14487379386561141983,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2648 /prefetch:82⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2372,3847795580690822496,14487379386561141983,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2372,3847795580690822496,14487379386561141983,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2372,3847795580690822496,14487379386561141983,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:82⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2372,3847795580690822496,14487379386561141983,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2372,3847795580690822496,14487379386561141983,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2372,3847795580690822496,14487379386561141983,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:12⤵PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2372,3847795580690822496,14487379386561141983,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2372,3847795580690822496,14487379386561141983,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4188 /prefetch:12⤵PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2372,3847795580690822496,14487379386561141983,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4476
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4720
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4832
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
6KB
MD5c7429928d6ee41af1de0057358e29bd7
SHA1956f806ba9c22cff0fefc34338982aa6b8d50785
SHA2561ba5cd0941e4fb5404001e0f16922fc8ecfa6488f1423d4bac6fd755dfd19a12
SHA51279e7702ce2d3cdae22cfc0a44c2fa1d8d7d7b63a08892b64945ca3de947c96de2f7d5bb586c7c03c71b8707c0e1108b277ee4c4b69895542f83ba47b5e270ffc
-
Filesize
6KB
MD516d3ab7ab2ac7a3baf6b05a89400fcb6
SHA1589984cb832e0c9f5664292fe4bbd8e99811109f
SHA25637a6972acc6d8cc3bea60a324c78c668fabe73d2b43d406751c1ede0410b90d3
SHA512e217815be084f5fb99eb126610fef12a83fe6a44b5ca57526af0f82ebf55ea48e4329b0c7c4ac4e422654ee6c3cffa695c9593ec78122a56b51642ced244fcbc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD53bc1d2d2b42f189f479d4f89701c4378
SHA1f53889e12e4158c8f61b7d442d0801b02f1c2b99
SHA25609e36cbcd2c46e02bd89f91b228ac5ada06e50b48664dd0b3ee57886f68ccb06
SHA5121831886e01cb82033f28cb56b6039c74c3c3b34f932e8df5291c49a78fc54fc15f973cb55e6d5f666f7ead5f4a21fce4f0da1fde99c85b3cbbaf0e62d85dac49