Analysis
-
max time kernel
145s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 21:44
Static task
static1
Behavioral task
behavioral1
Sample
21d7ff4c9664f7f21b7cced7e2ab7c94_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
21d7ff4c9664f7f21b7cced7e2ab7c94_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
21d7ff4c9664f7f21b7cced7e2ab7c94_JaffaCakes118.html
-
Size
16KB
-
MD5
21d7ff4c9664f7f21b7cced7e2ab7c94
-
SHA1
3a756c246a08810801237b2595f9fe1e64246425
-
SHA256
2256515b3e228c71d0bc92b58a834c6688a6b3c10434f43d448bb689dc9630b5
-
SHA512
82457683e005f27a6605a3363c0e72be9480d9ae30761cb1c5909f8696bf09d9e57fcc5f09020b83a0c634a5b126b097b0cae596e8dfa229b7608d5ae9a93c87
-
SSDEEP
192:odosA94VNeqVEDhGpm1arFkIdfjCubFviFvoFDsFDnF+oU6YE/pLjIOtloml5Yu3:IRSSXZiZoiJnHR75QWtNGXGsTMBvL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4620 msedge.exe 4620 msedge.exe 4048 msedge.exe 4048 msedge.exe 4580 identity_helper.exe 4580 identity_helper.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4048 wrote to memory of 4788 4048 msedge.exe 83 PID 4048 wrote to memory of 4788 4048 msedge.exe 83 PID 4048 wrote to memory of 3028 4048 msedge.exe 84 PID 4048 wrote to memory of 3028 4048 msedge.exe 84 PID 4048 wrote to memory of 3028 4048 msedge.exe 84 PID 4048 wrote to memory of 3028 4048 msedge.exe 84 PID 4048 wrote to memory of 3028 4048 msedge.exe 84 PID 4048 wrote to memory of 3028 4048 msedge.exe 84 PID 4048 wrote to memory of 3028 4048 msedge.exe 84 PID 4048 wrote to memory of 3028 4048 msedge.exe 84 PID 4048 wrote to memory of 3028 4048 msedge.exe 84 PID 4048 wrote to memory of 3028 4048 msedge.exe 84 PID 4048 wrote to memory of 3028 4048 msedge.exe 84 PID 4048 wrote to memory of 3028 4048 msedge.exe 84 PID 4048 wrote to memory of 3028 4048 msedge.exe 84 PID 4048 wrote to memory of 3028 4048 msedge.exe 84 PID 4048 wrote to memory of 3028 4048 msedge.exe 84 PID 4048 wrote to memory of 3028 4048 msedge.exe 84 PID 4048 wrote to memory of 3028 4048 msedge.exe 84 PID 4048 wrote to memory of 3028 4048 msedge.exe 84 PID 4048 wrote to memory of 3028 4048 msedge.exe 84 PID 4048 wrote to memory of 3028 4048 msedge.exe 84 PID 4048 wrote to memory of 3028 4048 msedge.exe 84 PID 4048 wrote to memory of 3028 4048 msedge.exe 84 PID 4048 wrote to memory of 3028 4048 msedge.exe 84 PID 4048 wrote to memory of 3028 4048 msedge.exe 84 PID 4048 wrote to memory of 3028 4048 msedge.exe 84 PID 4048 wrote to memory of 3028 4048 msedge.exe 84 PID 4048 wrote to memory of 3028 4048 msedge.exe 84 PID 4048 wrote to memory of 3028 4048 msedge.exe 84 PID 4048 wrote to memory of 3028 4048 msedge.exe 84 PID 4048 wrote to memory of 3028 4048 msedge.exe 84 PID 4048 wrote to memory of 3028 4048 msedge.exe 84 PID 4048 wrote to memory of 3028 4048 msedge.exe 84 PID 4048 wrote to memory of 3028 4048 msedge.exe 84 PID 4048 wrote to memory of 3028 4048 msedge.exe 84 PID 4048 wrote to memory of 3028 4048 msedge.exe 84 PID 4048 wrote to memory of 3028 4048 msedge.exe 84 PID 4048 wrote to memory of 3028 4048 msedge.exe 84 PID 4048 wrote to memory of 3028 4048 msedge.exe 84 PID 4048 wrote to memory of 3028 4048 msedge.exe 84 PID 4048 wrote to memory of 3028 4048 msedge.exe 84 PID 4048 wrote to memory of 4620 4048 msedge.exe 85 PID 4048 wrote to memory of 4620 4048 msedge.exe 85 PID 4048 wrote to memory of 2088 4048 msedge.exe 86 PID 4048 wrote to memory of 2088 4048 msedge.exe 86 PID 4048 wrote to memory of 2088 4048 msedge.exe 86 PID 4048 wrote to memory of 2088 4048 msedge.exe 86 PID 4048 wrote to memory of 2088 4048 msedge.exe 86 PID 4048 wrote to memory of 2088 4048 msedge.exe 86 PID 4048 wrote to memory of 2088 4048 msedge.exe 86 PID 4048 wrote to memory of 2088 4048 msedge.exe 86 PID 4048 wrote to memory of 2088 4048 msedge.exe 86 PID 4048 wrote to memory of 2088 4048 msedge.exe 86 PID 4048 wrote to memory of 2088 4048 msedge.exe 86 PID 4048 wrote to memory of 2088 4048 msedge.exe 86 PID 4048 wrote to memory of 2088 4048 msedge.exe 86 PID 4048 wrote to memory of 2088 4048 msedge.exe 86 PID 4048 wrote to memory of 2088 4048 msedge.exe 86 PID 4048 wrote to memory of 2088 4048 msedge.exe 86 PID 4048 wrote to memory of 2088 4048 msedge.exe 86 PID 4048 wrote to memory of 2088 4048 msedge.exe 86 PID 4048 wrote to memory of 2088 4048 msedge.exe 86 PID 4048 wrote to memory of 2088 4048 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\21d7ff4c9664f7f21b7cced7e2ab7c94_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa322e46f8,0x7ffa322e4708,0x7ffa322e47182⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,18252198334386324443,2117705804033327508,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,18252198334386324443,2117705804033327508,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2688 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,18252198334386324443,2117705804033327508,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:82⤵PID:2088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,18252198334386324443,2117705804033327508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,18252198334386324443,2117705804033327508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,18252198334386324443,2117705804033327508,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5480 /prefetch:82⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,18252198334386324443,2117705804033327508,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5480 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,18252198334386324443,2117705804033327508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,18252198334386324443,2117705804033327508,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,18252198334386324443,2117705804033327508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4180 /prefetch:12⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,18252198334386324443,2117705804033327508,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:12⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,18252198334386324443,2117705804033327508,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5044 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2444
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2024
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
190B
MD571cf0c165a94e939afca0b88dd928fc1
SHA1e30ed869899e48659201456860a647a915fd5759
SHA256fed4dc0c8d96ab490d345afe4345c66efad7fad0c0b9361e8bfdc315e5309f9d
SHA5123be068a6229944a93ea0269dd51a85ac68f8afa39fd1c31832d1004fe9c7ae61443867b289b7711f353e03cb583ed48f2aaccc039014416dc13486e8095233b4
-
Filesize
6KB
MD5e22ac76d84ea7383dc60fc2b9acbff8d
SHA13c67cc8558514b17e51bd92610864d53348014dd
SHA2560f6b418f5758c36e12a1153d0f161150e206c5339c75c62bce1e242312ede44e
SHA5121fd609e0924df0ec78478c21e16d0aae2e5f30de1f6e07f9ce7335a7fc4340fb4b49e6449cb322d05cfe0b9c3c600555c5aa23df752645754f4864642675e651
-
Filesize
6KB
MD529c2bee414b830caee848ae3a49b4bd0
SHA18485b6f52bfb848ac038b26cfed585a809a7b7fc
SHA256c9b92c8c0eba0a28f62a12fc8979aa55884441f0dd300fcfd2c42b7335616341
SHA512a239332e6432d7123b74edab4d56828c81c9d8f801fe03e468ed1815546cf004238f7360cb5865ec8c104ac9e81ddd7757a3beb457c5e9866f13564f26a03af1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5819e2d2f534b2257858820593694ffba
SHA150a07b428399b3a61888a566df2025d2573130a7
SHA256dde66b3e9079d08e813d3f49e00c05844470603e0035f79807d05b938061b472
SHA512bd1e2682e2fe487b8c8cfafdd6f013df6690dfe3039fef0526dd72fcc50c2e59d110ead1e0a986bc5e310bfd4b16d6a9b53a45feeed27aa3181287c048c88a95