Analysis
-
max time kernel
146s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2024, 23:55
Static task
static1
Behavioral task
behavioral1
Sample
1ebf9c661686e15da4599ea3f7b73643_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1ebf9c661686e15da4599ea3f7b73643_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
1ebf9c661686e15da4599ea3f7b73643_JaffaCakes118.html
-
Size
463KB
-
MD5
1ebf9c661686e15da4599ea3f7b73643
-
SHA1
bd1cc0ee2cd1623a13689913db2b75237e82cbfc
-
SHA256
4c1c3a7698952a140808618c3063e4819d81cf0cf0cf57425b2e3a15f5a53f40
-
SHA512
ac64d50ee13fd13e5f860f5e8f8cdeeb6863cd87f139ab595f32e4de07d1759abeb1ecf30c9285748af8a13c581d4c08092211247644affbbc2ad99f29da9e67
-
SSDEEP
6144:SWsMYod+X3oI+YCFsMYod+X3oI+YrsMYod+X3oI+YLsMYod+X3oI+YQ:b5d+X325d+X3x5d+X315d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 832 msedge.exe 832 msedge.exe 2732 msedge.exe 2732 msedge.exe 3060 identity_helper.exe 3060 identity_helper.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2732 wrote to memory of 4708 2732 msedge.exe 84 PID 2732 wrote to memory of 4708 2732 msedge.exe 84 PID 2732 wrote to memory of 1996 2732 msedge.exe 85 PID 2732 wrote to memory of 1996 2732 msedge.exe 85 PID 2732 wrote to memory of 1996 2732 msedge.exe 85 PID 2732 wrote to memory of 1996 2732 msedge.exe 85 PID 2732 wrote to memory of 1996 2732 msedge.exe 85 PID 2732 wrote to memory of 1996 2732 msedge.exe 85 PID 2732 wrote to memory of 1996 2732 msedge.exe 85 PID 2732 wrote to memory of 1996 2732 msedge.exe 85 PID 2732 wrote to memory of 1996 2732 msedge.exe 85 PID 2732 wrote to memory of 1996 2732 msedge.exe 85 PID 2732 wrote to memory of 1996 2732 msedge.exe 85 PID 2732 wrote to memory of 1996 2732 msedge.exe 85 PID 2732 wrote to memory of 1996 2732 msedge.exe 85 PID 2732 wrote to memory of 1996 2732 msedge.exe 85 PID 2732 wrote to memory of 1996 2732 msedge.exe 85 PID 2732 wrote to memory of 1996 2732 msedge.exe 85 PID 2732 wrote to memory of 1996 2732 msedge.exe 85 PID 2732 wrote to memory of 1996 2732 msedge.exe 85 PID 2732 wrote to memory of 1996 2732 msedge.exe 85 PID 2732 wrote to memory of 1996 2732 msedge.exe 85 PID 2732 wrote to memory of 1996 2732 msedge.exe 85 PID 2732 wrote to memory of 1996 2732 msedge.exe 85 PID 2732 wrote to memory of 1996 2732 msedge.exe 85 PID 2732 wrote to memory of 1996 2732 msedge.exe 85 PID 2732 wrote to memory of 1996 2732 msedge.exe 85 PID 2732 wrote to memory of 1996 2732 msedge.exe 85 PID 2732 wrote to memory of 1996 2732 msedge.exe 85 PID 2732 wrote to memory of 1996 2732 msedge.exe 85 PID 2732 wrote to memory of 1996 2732 msedge.exe 85 PID 2732 wrote to memory of 1996 2732 msedge.exe 85 PID 2732 wrote to memory of 1996 2732 msedge.exe 85 PID 2732 wrote to memory of 1996 2732 msedge.exe 85 PID 2732 wrote to memory of 1996 2732 msedge.exe 85 PID 2732 wrote to memory of 1996 2732 msedge.exe 85 PID 2732 wrote to memory of 1996 2732 msedge.exe 85 PID 2732 wrote to memory of 1996 2732 msedge.exe 85 PID 2732 wrote to memory of 1996 2732 msedge.exe 85 PID 2732 wrote to memory of 1996 2732 msedge.exe 85 PID 2732 wrote to memory of 1996 2732 msedge.exe 85 PID 2732 wrote to memory of 1996 2732 msedge.exe 85 PID 2732 wrote to memory of 832 2732 msedge.exe 86 PID 2732 wrote to memory of 832 2732 msedge.exe 86 PID 2732 wrote to memory of 4036 2732 msedge.exe 87 PID 2732 wrote to memory of 4036 2732 msedge.exe 87 PID 2732 wrote to memory of 4036 2732 msedge.exe 87 PID 2732 wrote to memory of 4036 2732 msedge.exe 87 PID 2732 wrote to memory of 4036 2732 msedge.exe 87 PID 2732 wrote to memory of 4036 2732 msedge.exe 87 PID 2732 wrote to memory of 4036 2732 msedge.exe 87 PID 2732 wrote to memory of 4036 2732 msedge.exe 87 PID 2732 wrote to memory of 4036 2732 msedge.exe 87 PID 2732 wrote to memory of 4036 2732 msedge.exe 87 PID 2732 wrote to memory of 4036 2732 msedge.exe 87 PID 2732 wrote to memory of 4036 2732 msedge.exe 87 PID 2732 wrote to memory of 4036 2732 msedge.exe 87 PID 2732 wrote to memory of 4036 2732 msedge.exe 87 PID 2732 wrote to memory of 4036 2732 msedge.exe 87 PID 2732 wrote to memory of 4036 2732 msedge.exe 87 PID 2732 wrote to memory of 4036 2732 msedge.exe 87 PID 2732 wrote to memory of 4036 2732 msedge.exe 87 PID 2732 wrote to memory of 4036 2732 msedge.exe 87 PID 2732 wrote to memory of 4036 2732 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\1ebf9c661686e15da4599ea3f7b73643_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7fff351a46f8,0x7fff351a4708,0x7fff351a47182⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2248,16784278871717411419,8161315061247029454,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2308 /prefetch:22⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2248,16784278871717411419,8161315061247029454,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2368 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2248,16784278871717411419,8161315061247029454,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2588 /prefetch:82⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,16784278871717411419,8161315061247029454,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,16784278871717411419,8161315061247029454,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2248,16784278871717411419,8161315061247029454,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2248,16784278871717411419,8161315061247029454,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,16784278871717411419,8161315061247029454,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,16784278871717411419,8161315061247029454,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,16784278871717411419,8161315061247029454,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:12⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,16784278871717411419,8161315061247029454,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2248,16784278871717411419,8161315061247029454,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5428 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5112
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:884
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
Filesize
5KB
MD5fbac9c748d6aaba7f0f0a31dce9c3931
SHA12ee8065240079bc67fc6f9755460bedfa8347a91
SHA256d80321ad0756d2deedf369bd9c1a0e0dbfffd20db8c4fcda98c38c613f0efeed
SHA512b076f1e79df6f859a68c4cb8fb2dac6387be1a9f2b700cf0fc6fe6153e5a7d9f7b9f37044b283ce735dbf6925be2a5dea665993d01d313f9f3dc0969ef21a22a
-
Filesize
6KB
MD53a72b7b4d0568efbc2875cda79d69735
SHA14963ce27188df5fd587c746024bfa89a3f62cb43
SHA256d16a6f132bbf09e1db2f8d53f964353b3e240a67f7d4be5c4d1a3e9ed43aaaaa
SHA512a11f00a4e822af2fa86e8691ac787134c6eb03c749ee73033d203f239798addf31f53589b268a8861c66edd8324db3e1832300b414963942cd50f6880cf80e9f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59a594bfef66e99ed350d0deb62fecd6a
SHA122fcae8b850becbab5511bb82b8c5aa35e5fbc84
SHA256c0db8cd9312518d61b71407f5fd9f354a7bcfe0ed18c8500e0e54fdf4ce8f241
SHA51296d47dadfbbd979829ee893df8094340a875756725953bd3f2d51618de6cf8c117bf42ebf4857c505ddc75cc359227a29b08c6e6a7eb619532e30b9dafd30bed