Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2024 00:13
Static task
static1
Behavioral task
behavioral1
Sample
1ecd1683e9fb4eafa9d7cb88dd41f2d4_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1ecd1683e9fb4eafa9d7cb88dd41f2d4_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
1ecd1683e9fb4eafa9d7cb88dd41f2d4_JaffaCakes118.html
-
Size
41KB
-
MD5
1ecd1683e9fb4eafa9d7cb88dd41f2d4
-
SHA1
86468947ec6e49902a57d318bf64632c274f7fb8
-
SHA256
f3741f99f3f34e341856f2f5837ced9c94da16e30a9b3ca088fa76ed547a3b3a
-
SHA512
4ce86f2926e415e1d88137065a2ac1ef0cebc36ca7d0d83bb115300da67fbf3181245096cdc6adc3934f4c855ce08d6828dcab53e182d7cdd92d89a0cd1efde3
-
SSDEEP
768:6zlkbe1IwzisHalSA7qwiAdFMuLckAaHpTc5ci9/BDCK7LUn3HPyN8MORqXZz:6zlkbe1IwzisqS+qwiAdFMuLckAaHpTy
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 972 msedge.exe 972 msedge.exe 4268 msedge.exe 4268 msedge.exe 1716 identity_helper.exe 1716 identity_helper.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4268 wrote to memory of 3608 4268 msedge.exe 84 PID 4268 wrote to memory of 3608 4268 msedge.exe 84 PID 4268 wrote to memory of 3900 4268 msedge.exe 85 PID 4268 wrote to memory of 3900 4268 msedge.exe 85 PID 4268 wrote to memory of 3900 4268 msedge.exe 85 PID 4268 wrote to memory of 3900 4268 msedge.exe 85 PID 4268 wrote to memory of 3900 4268 msedge.exe 85 PID 4268 wrote to memory of 3900 4268 msedge.exe 85 PID 4268 wrote to memory of 3900 4268 msedge.exe 85 PID 4268 wrote to memory of 3900 4268 msedge.exe 85 PID 4268 wrote to memory of 3900 4268 msedge.exe 85 PID 4268 wrote to memory of 3900 4268 msedge.exe 85 PID 4268 wrote to memory of 3900 4268 msedge.exe 85 PID 4268 wrote to memory of 3900 4268 msedge.exe 85 PID 4268 wrote to memory of 3900 4268 msedge.exe 85 PID 4268 wrote to memory of 3900 4268 msedge.exe 85 PID 4268 wrote to memory of 3900 4268 msedge.exe 85 PID 4268 wrote to memory of 3900 4268 msedge.exe 85 PID 4268 wrote to memory of 3900 4268 msedge.exe 85 PID 4268 wrote to memory of 3900 4268 msedge.exe 85 PID 4268 wrote to memory of 3900 4268 msedge.exe 85 PID 4268 wrote to memory of 3900 4268 msedge.exe 85 PID 4268 wrote to memory of 3900 4268 msedge.exe 85 PID 4268 wrote to memory of 3900 4268 msedge.exe 85 PID 4268 wrote to memory of 3900 4268 msedge.exe 85 PID 4268 wrote to memory of 3900 4268 msedge.exe 85 PID 4268 wrote to memory of 3900 4268 msedge.exe 85 PID 4268 wrote to memory of 3900 4268 msedge.exe 85 PID 4268 wrote to memory of 3900 4268 msedge.exe 85 PID 4268 wrote to memory of 3900 4268 msedge.exe 85 PID 4268 wrote to memory of 3900 4268 msedge.exe 85 PID 4268 wrote to memory of 3900 4268 msedge.exe 85 PID 4268 wrote to memory of 3900 4268 msedge.exe 85 PID 4268 wrote to memory of 3900 4268 msedge.exe 85 PID 4268 wrote to memory of 3900 4268 msedge.exe 85 PID 4268 wrote to memory of 3900 4268 msedge.exe 85 PID 4268 wrote to memory of 3900 4268 msedge.exe 85 PID 4268 wrote to memory of 3900 4268 msedge.exe 85 PID 4268 wrote to memory of 3900 4268 msedge.exe 85 PID 4268 wrote to memory of 3900 4268 msedge.exe 85 PID 4268 wrote to memory of 3900 4268 msedge.exe 85 PID 4268 wrote to memory of 3900 4268 msedge.exe 85 PID 4268 wrote to memory of 972 4268 msedge.exe 86 PID 4268 wrote to memory of 972 4268 msedge.exe 86 PID 4268 wrote to memory of 5076 4268 msedge.exe 87 PID 4268 wrote to memory of 5076 4268 msedge.exe 87 PID 4268 wrote to memory of 5076 4268 msedge.exe 87 PID 4268 wrote to memory of 5076 4268 msedge.exe 87 PID 4268 wrote to memory of 5076 4268 msedge.exe 87 PID 4268 wrote to memory of 5076 4268 msedge.exe 87 PID 4268 wrote to memory of 5076 4268 msedge.exe 87 PID 4268 wrote to memory of 5076 4268 msedge.exe 87 PID 4268 wrote to memory of 5076 4268 msedge.exe 87 PID 4268 wrote to memory of 5076 4268 msedge.exe 87 PID 4268 wrote to memory of 5076 4268 msedge.exe 87 PID 4268 wrote to memory of 5076 4268 msedge.exe 87 PID 4268 wrote to memory of 5076 4268 msedge.exe 87 PID 4268 wrote to memory of 5076 4268 msedge.exe 87 PID 4268 wrote to memory of 5076 4268 msedge.exe 87 PID 4268 wrote to memory of 5076 4268 msedge.exe 87 PID 4268 wrote to memory of 5076 4268 msedge.exe 87 PID 4268 wrote to memory of 5076 4268 msedge.exe 87 PID 4268 wrote to memory of 5076 4268 msedge.exe 87 PID 4268 wrote to memory of 5076 4268 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\1ecd1683e9fb4eafa9d7cb88dd41f2d4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff855746f8,0x7fff85574708,0x7fff855747182⤵PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,3392929860618694502,2655103170408395980,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,3392929860618694502,2655103170408395980,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,3392929860618694502,2655103170408395980,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:82⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,3392929860618694502,2655103170408395980,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,3392929860618694502,2655103170408395980,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:2192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,3392929860618694502,2655103170408395980,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3812 /prefetch:82⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,3392929860618694502,2655103170408395980,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3812 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,3392929860618694502,2655103170408395980,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,3392929860618694502,2655103170408395980,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,3392929860618694502,2655103170408395980,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:2532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,3392929860618694502,2655103170408395980,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:1816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,3392929860618694502,2655103170408395980,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5272 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4564
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3564
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52a70f1bd4da893a67660d6432970788d
SHA1ddf4047e0d468f56ea0c0d8ff078a86a0bb62873
SHA256c550af5ba51f68ac4d18747edc5dea1a655dd212d84bad1e6168ba7a97745561
SHA51226b9a365e77df032fc5c461d85d1ba313eafead38827190608c6537ec12b2dfdbed4e1705bfd1e61899034791ad6fa88ea7490c3a48cdaec4d04cd0577b11343
-
Filesize
152B
MD5fbe1ce4d182aaffb80de94263be1dd35
SHA1bc6c9827aa35a136a7d79be9e606ff359e2ac3ea
SHA2560021f72dbca789f179762b0e17c28fe0b93a12539b08294800e47469905aeb51
SHA5123fb0a3b38e7d4a30f5560594b1d14e6e58419e274255fb68dfe0ca897aa181f9ce8cb2048403f851fd36a17b0e34d272d03927769d41a500b2fe64806354902f
-
Filesize
180B
MD5e75179806fdb60b3337e8cd5b04cd6cf
SHA1434a695c7607996cc4d1a0698d9214afe4d9fd38
SHA256a121c6f8b11a0682ab639049f50ef2a1b00b3a2a565d7686cc64f501056b7b19
SHA512e1e2f888005696fb33453f369efda963c71c15270338db02d812a1ad503c1dfd2a0f693c3f6a02ca2abb7cad631524b0481141646353c7b39adf44b09bf8464f
-
Filesize
5KB
MD5849b86837772e1619dc461ac32153187
SHA1216abd28c5b121bad1f11e395dfe9a63a1ab86df
SHA25683a2924b566aa7b62524773f19315e61fba6faa05e01cf8c2c89219f28506d5d
SHA512c3f2adab4882ffd3e76ec00641dd2b1a370fff970a9f4e53ac2322310afc207d26534f8c5df8714c8082c83a9b9e2f9787c6d6e54433da2bbd8e1fab96b241cb
-
Filesize
6KB
MD5e193359403f89ef3aad3eaa0588c6695
SHA13301bf4d4cd2525db1a373131b8f139f48b05715
SHA2565c9f6644f6581a994af38fed387e657d6a65e0c99b8fa3a79fad8b0352eba69f
SHA512f4da7a148a32340e48c2a754b29f7eb2371d8035c57c6242f2dd6109c67fcd706d1066be6ded7cc4ca5e7720b04834eb51d222ec731807cdc0e95090b4d72e09
-
Filesize
372B
MD5db7fb82affdcf80c15fa90871e814b10
SHA1bba51ab6b739e83a280af38558eb4ad0b441d22e
SHA25668305f40539a7751ca58799b416cc44d545a7930e1ddfcb1d319c8edca6e9c51
SHA512c20f6828ea808ae6d1c70ec9254d42b9fbad8aa90196b6bd283da87c2e6880b5ed5a3209e94b32ff072e4841924a901f9f006c21bb469c16b124f43699e39707
-
Filesize
372B
MD549fd896e98ac540a7c2fe9354ebe5d78
SHA1364dc642dec8ec412bc05555c204f1ae95ec8c27
SHA256eb1587d14c1cd715d163e232f52bc2afc07e23a4770c1469e67eb05fa20fac20
SHA5123b374b6901fb3a70314a1ebbb350436fdf8e0f26ae15beaaf0d034257ed856424045090f037d0d87e60fdb6c3a1bdf6e23771581563a1d4b4e2c621ba7cf48c4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54317786123a863824582ce607ebc1be3
SHA1dc9a03187adc1dafdba9db61b0f05d9deb54f9a9
SHA2561574089a10d4d2fb6ca0c2eca075facf1e52a0e0e1a662257dc2a01d6d00876f
SHA5124e5722851b96770e22062b55a508e7e831d5312fbcf35098f3cc7a3f560c050edd285b51e0550ed7bebd65da8a8733050409eee7c014981a7d1ec7b46c6dc1db