Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 02:01
Static task
static1
Behavioral task
behavioral1
Sample
1f11ed72a7b5e053d33b93308c19d3a7_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1f11ed72a7b5e053d33b93308c19d3a7_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
1f11ed72a7b5e053d33b93308c19d3a7_JaffaCakes118.html
-
Size
85KB
-
MD5
1f11ed72a7b5e053d33b93308c19d3a7
-
SHA1
16a5ebcfbff6e060942c2333d32fa9dcb5713fe8
-
SHA256
8a7a1abcef8fcd84b4755b6b48c01aaa47784ecb56cd8c569af30c444bb7a3c2
-
SHA512
9c7a437d4e7ae5e2349302065326e8c4642540d84ea0cc9fd5a5baf956c4914cf43d0fa26e73eb0f212d5cf83a14bca6eb2242212055dc5e032d0eaa50a9dd06
-
SSDEEP
1536:SM1f0rMxsE89xJAk9zvgXPefTbDmtAUO8gj+2IdGyzkbt7+vNAnnzak:SM1fI9PAkVvLfKtA68+ndxzkbl+vNAnd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4792 msedge.exe 4792 msedge.exe 4848 msedge.exe 4848 msedge.exe 4360 identity_helper.exe 4360 identity_helper.exe 5924 msedge.exe 5924 msedge.exe 5924 msedge.exe 5924 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4848 wrote to memory of 2780 4848 msedge.exe 83 PID 4848 wrote to memory of 2780 4848 msedge.exe 83 PID 4848 wrote to memory of 4664 4848 msedge.exe 84 PID 4848 wrote to memory of 4664 4848 msedge.exe 84 PID 4848 wrote to memory of 4664 4848 msedge.exe 84 PID 4848 wrote to memory of 4664 4848 msedge.exe 84 PID 4848 wrote to memory of 4664 4848 msedge.exe 84 PID 4848 wrote to memory of 4664 4848 msedge.exe 84 PID 4848 wrote to memory of 4664 4848 msedge.exe 84 PID 4848 wrote to memory of 4664 4848 msedge.exe 84 PID 4848 wrote to memory of 4664 4848 msedge.exe 84 PID 4848 wrote to memory of 4664 4848 msedge.exe 84 PID 4848 wrote to memory of 4664 4848 msedge.exe 84 PID 4848 wrote to memory of 4664 4848 msedge.exe 84 PID 4848 wrote to memory of 4664 4848 msedge.exe 84 PID 4848 wrote to memory of 4664 4848 msedge.exe 84 PID 4848 wrote to memory of 4664 4848 msedge.exe 84 PID 4848 wrote to memory of 4664 4848 msedge.exe 84 PID 4848 wrote to memory of 4664 4848 msedge.exe 84 PID 4848 wrote to memory of 4664 4848 msedge.exe 84 PID 4848 wrote to memory of 4664 4848 msedge.exe 84 PID 4848 wrote to memory of 4664 4848 msedge.exe 84 PID 4848 wrote to memory of 4664 4848 msedge.exe 84 PID 4848 wrote to memory of 4664 4848 msedge.exe 84 PID 4848 wrote to memory of 4664 4848 msedge.exe 84 PID 4848 wrote to memory of 4664 4848 msedge.exe 84 PID 4848 wrote to memory of 4664 4848 msedge.exe 84 PID 4848 wrote to memory of 4664 4848 msedge.exe 84 PID 4848 wrote to memory of 4664 4848 msedge.exe 84 PID 4848 wrote to memory of 4664 4848 msedge.exe 84 PID 4848 wrote to memory of 4664 4848 msedge.exe 84 PID 4848 wrote to memory of 4664 4848 msedge.exe 84 PID 4848 wrote to memory of 4664 4848 msedge.exe 84 PID 4848 wrote to memory of 4664 4848 msedge.exe 84 PID 4848 wrote to memory of 4664 4848 msedge.exe 84 PID 4848 wrote to memory of 4664 4848 msedge.exe 84 PID 4848 wrote to memory of 4664 4848 msedge.exe 84 PID 4848 wrote to memory of 4664 4848 msedge.exe 84 PID 4848 wrote to memory of 4664 4848 msedge.exe 84 PID 4848 wrote to memory of 4664 4848 msedge.exe 84 PID 4848 wrote to memory of 4664 4848 msedge.exe 84 PID 4848 wrote to memory of 4664 4848 msedge.exe 84 PID 4848 wrote to memory of 4792 4848 msedge.exe 85 PID 4848 wrote to memory of 4792 4848 msedge.exe 85 PID 4848 wrote to memory of 3520 4848 msedge.exe 86 PID 4848 wrote to memory of 3520 4848 msedge.exe 86 PID 4848 wrote to memory of 3520 4848 msedge.exe 86 PID 4848 wrote to memory of 3520 4848 msedge.exe 86 PID 4848 wrote to memory of 3520 4848 msedge.exe 86 PID 4848 wrote to memory of 3520 4848 msedge.exe 86 PID 4848 wrote to memory of 3520 4848 msedge.exe 86 PID 4848 wrote to memory of 3520 4848 msedge.exe 86 PID 4848 wrote to memory of 3520 4848 msedge.exe 86 PID 4848 wrote to memory of 3520 4848 msedge.exe 86 PID 4848 wrote to memory of 3520 4848 msedge.exe 86 PID 4848 wrote to memory of 3520 4848 msedge.exe 86 PID 4848 wrote to memory of 3520 4848 msedge.exe 86 PID 4848 wrote to memory of 3520 4848 msedge.exe 86 PID 4848 wrote to memory of 3520 4848 msedge.exe 86 PID 4848 wrote to memory of 3520 4848 msedge.exe 86 PID 4848 wrote to memory of 3520 4848 msedge.exe 86 PID 4848 wrote to memory of 3520 4848 msedge.exe 86 PID 4848 wrote to memory of 3520 4848 msedge.exe 86 PID 4848 wrote to memory of 3520 4848 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\1f11ed72a7b5e053d33b93308c19d3a7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe3bd946f8,0x7ffe3bd94708,0x7ffe3bd947182⤵PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,3983430281558281792,11788791863147976688,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:22⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2192,3983430281558281792,11788791863147976688,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2192,3983430281558281792,11788791863147976688,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,3983430281558281792,11788791863147976688,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,3983430281558281792,11788791863147976688,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,3983430281558281792,11788791863147976688,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:12⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,3983430281558281792,11788791863147976688,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,3983430281558281792,11788791863147976688,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,3983430281558281792,11788791863147976688,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,3983430281558281792,11788791863147976688,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3404 /prefetch:82⤵PID:1264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,3983430281558281792,11788791863147976688,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3404 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,3983430281558281792,11788791863147976688,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:12⤵PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,3983430281558281792,11788791863147976688,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6124 /prefetch:12⤵PID:1156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,3983430281558281792,11788791863147976688,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:12⤵PID:5272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,3983430281558281792,11788791863147976688,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5900 /prefetch:12⤵PID:5280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,3983430281558281792,11788791863147976688,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5876 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5924
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4528
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1248
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52a70f1bd4da893a67660d6432970788d
SHA1ddf4047e0d468f56ea0c0d8ff078a86a0bb62873
SHA256c550af5ba51f68ac4d18747edc5dea1a655dd212d84bad1e6168ba7a97745561
SHA51226b9a365e77df032fc5c461d85d1ba313eafead38827190608c6537ec12b2dfdbed4e1705bfd1e61899034791ad6fa88ea7490c3a48cdaec4d04cd0577b11343
-
Filesize
152B
MD5fbe1ce4d182aaffb80de94263be1dd35
SHA1bc6c9827aa35a136a7d79be9e606ff359e2ac3ea
SHA2560021f72dbca789f179762b0e17c28fe0b93a12539b08294800e47469905aeb51
SHA5123fb0a3b38e7d4a30f5560594b1d14e6e58419e274255fb68dfe0ca897aa181f9ce8cb2048403f851fd36a17b0e34d272d03927769d41a500b2fe64806354902f
-
Filesize
1KB
MD5619828139f3594bbae0d82a2b31db291
SHA10f71d9182ecc0b50aa6930bbc1c7657ab0ffd6fe
SHA256cf9d4ccd5726c7b58c44f392514784ee9a91cae006d03bd0beb8fc2ffe2421cb
SHA512c2f3f1fae313dd27ac6721779e1564903d83690570cb06b35e9fc0ac72def969704e70874969670618ddcd171cd6c6d0bb8f3e206353da3069ac8d2c38a57871
-
Filesize
5KB
MD57a24c0bfaacd6cbedbac702440e53de0
SHA19c48124cf095a0682b620456d31053ad532ee1c8
SHA256820fd24bb5604fd6bb69f15570e9b292407f4966cceb6bd1b5fbdbc89e33c370
SHA512df16e620d00a4e24438a0bed9104f7e36b34667b929fcc524667589ed73818f6985bcee4ed2f4ebbc09b3cf3def924d12c5f17cbf0ad74ca8b8bb3d21fa93b97
-
Filesize
7KB
MD50075a1cbda446a051e6e620a3e784c59
SHA1d40b8964fd6cb151de5c3527f361d28322dbca77
SHA25673a73d78d01f79f2f41e06a97609f72a169b83a2ad7c9998dec1157aa25ba178
SHA51296dece0ad580e56538ecf6ee7ee3f61c887394d29a8bb3270d0f642b809695dc2556536cd4d44a36069a06c72487131c27f64b9cebb98d63223826adcdae4b81
-
Filesize
7KB
MD5b3565f374e38eae8ba6dd93d00cb2c4c
SHA1bd65dde50e5954dacbd8a39b9ae8d83f00e7c66e
SHA2561f874cb6e8cb28910dabccfe8c9618953fdb933d0556b291611d66aa94df379c
SHA51248fc36acf0460a247933bf58b15f1221335c10f5f450fb25ac4a7bf30b9fbb668ff7b8744c74493a45f9eca641bbde9f5228785549854add474bbaafa45b8693
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a9e0273430a672bf7a4a9d6608adb981
SHA1eb609a1f15a5869c5f1608854e3fa4f5393dfa32
SHA25679b5dd81e94120180b9c719f3f6596f373993fcd3f5d1c37f8af3de678cdae20
SHA512492cc362f01b19dd75e25493d8d7f61cbf4d00251946b8b45d6bc0cadfca48f87afe6b71208a1e111e998a0287576ad61577c01095aef8230b20cd752addb44b