Analysis
-
max time kernel
149s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 06:05
Static task
static1
Behavioral task
behavioral1
Sample
1faeb75c8b8641a3ecb80c9db048697b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1faeb75c8b8641a3ecb80c9db048697b_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
1faeb75c8b8641a3ecb80c9db048697b_JaffaCakes118.html
-
Size
115KB
-
MD5
1faeb75c8b8641a3ecb80c9db048697b
-
SHA1
1b60ca2d8243529f9abf0a93734845860b504470
-
SHA256
cd5389b6302f9bddc5c4688536f8f64ea2fd182f7eb03f7245fe37cd98e3aedc
-
SHA512
1d3f81d1ae7ff89c54b88bf87220abe9fcc5447a9d18c3bda9dc393c0441adc0c9b8c849e712ed6de67cb426917062ef93d673cefa036bca0cdc9209cba977fa
-
SSDEEP
1536:SEx6BH4/yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy+:S+6BH4/yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4380 msedge.exe 4380 msedge.exe 4564 msedge.exe 4564 msedge.exe 3700 identity_helper.exe 3700 identity_helper.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4564 wrote to memory of 3124 4564 msedge.exe 85 PID 4564 wrote to memory of 3124 4564 msedge.exe 85 PID 4564 wrote to memory of 3876 4564 msedge.exe 86 PID 4564 wrote to memory of 3876 4564 msedge.exe 86 PID 4564 wrote to memory of 3876 4564 msedge.exe 86 PID 4564 wrote to memory of 3876 4564 msedge.exe 86 PID 4564 wrote to memory of 3876 4564 msedge.exe 86 PID 4564 wrote to memory of 3876 4564 msedge.exe 86 PID 4564 wrote to memory of 3876 4564 msedge.exe 86 PID 4564 wrote to memory of 3876 4564 msedge.exe 86 PID 4564 wrote to memory of 3876 4564 msedge.exe 86 PID 4564 wrote to memory of 3876 4564 msedge.exe 86 PID 4564 wrote to memory of 3876 4564 msedge.exe 86 PID 4564 wrote to memory of 3876 4564 msedge.exe 86 PID 4564 wrote to memory of 3876 4564 msedge.exe 86 PID 4564 wrote to memory of 3876 4564 msedge.exe 86 PID 4564 wrote to memory of 3876 4564 msedge.exe 86 PID 4564 wrote to memory of 3876 4564 msedge.exe 86 PID 4564 wrote to memory of 3876 4564 msedge.exe 86 PID 4564 wrote to memory of 3876 4564 msedge.exe 86 PID 4564 wrote to memory of 3876 4564 msedge.exe 86 PID 4564 wrote to memory of 3876 4564 msedge.exe 86 PID 4564 wrote to memory of 3876 4564 msedge.exe 86 PID 4564 wrote to memory of 3876 4564 msedge.exe 86 PID 4564 wrote to memory of 3876 4564 msedge.exe 86 PID 4564 wrote to memory of 3876 4564 msedge.exe 86 PID 4564 wrote to memory of 3876 4564 msedge.exe 86 PID 4564 wrote to memory of 3876 4564 msedge.exe 86 PID 4564 wrote to memory of 3876 4564 msedge.exe 86 PID 4564 wrote to memory of 3876 4564 msedge.exe 86 PID 4564 wrote to memory of 3876 4564 msedge.exe 86 PID 4564 wrote to memory of 3876 4564 msedge.exe 86 PID 4564 wrote to memory of 3876 4564 msedge.exe 86 PID 4564 wrote to memory of 3876 4564 msedge.exe 86 PID 4564 wrote to memory of 3876 4564 msedge.exe 86 PID 4564 wrote to memory of 3876 4564 msedge.exe 86 PID 4564 wrote to memory of 3876 4564 msedge.exe 86 PID 4564 wrote to memory of 3876 4564 msedge.exe 86 PID 4564 wrote to memory of 3876 4564 msedge.exe 86 PID 4564 wrote to memory of 3876 4564 msedge.exe 86 PID 4564 wrote to memory of 3876 4564 msedge.exe 86 PID 4564 wrote to memory of 3876 4564 msedge.exe 86 PID 4564 wrote to memory of 4380 4564 msedge.exe 87 PID 4564 wrote to memory of 4380 4564 msedge.exe 87 PID 4564 wrote to memory of 2108 4564 msedge.exe 88 PID 4564 wrote to memory of 2108 4564 msedge.exe 88 PID 4564 wrote to memory of 2108 4564 msedge.exe 88 PID 4564 wrote to memory of 2108 4564 msedge.exe 88 PID 4564 wrote to memory of 2108 4564 msedge.exe 88 PID 4564 wrote to memory of 2108 4564 msedge.exe 88 PID 4564 wrote to memory of 2108 4564 msedge.exe 88 PID 4564 wrote to memory of 2108 4564 msedge.exe 88 PID 4564 wrote to memory of 2108 4564 msedge.exe 88 PID 4564 wrote to memory of 2108 4564 msedge.exe 88 PID 4564 wrote to memory of 2108 4564 msedge.exe 88 PID 4564 wrote to memory of 2108 4564 msedge.exe 88 PID 4564 wrote to memory of 2108 4564 msedge.exe 88 PID 4564 wrote to memory of 2108 4564 msedge.exe 88 PID 4564 wrote to memory of 2108 4564 msedge.exe 88 PID 4564 wrote to memory of 2108 4564 msedge.exe 88 PID 4564 wrote to memory of 2108 4564 msedge.exe 88 PID 4564 wrote to memory of 2108 4564 msedge.exe 88 PID 4564 wrote to memory of 2108 4564 msedge.exe 88 PID 4564 wrote to memory of 2108 4564 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\1faeb75c8b8641a3ecb80c9db048697b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe3ded46f8,0x7ffe3ded4708,0x7ffe3ded47182⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,9241903953250281009,6216045358040177782,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,9241903953250281009,6216045358040177782,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,9241903953250281009,6216045358040177782,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9241903953250281009,6216045358040177782,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9241903953250281009,6216045358040177782,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,9241903953250281009,6216045358040177782,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5404 /prefetch:82⤵PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,9241903953250281009,6216045358040177782,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5404 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9241903953250281009,6216045358040177782,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9241903953250281009,6216045358040177782,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9241903953250281009,6216045358040177782,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9241903953250281009,6216045358040177782,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3464 /prefetch:12⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,9241903953250281009,6216045358040177782,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4636
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4384
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4304
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a9e55f5864d6e2afd2fd84e25a3bc228
SHA1a5efcff9e3df6252c7fe8535d505235f82aab276
SHA2560f4df3120e4620555916be8e51c29be8d600d68ae5244efad6a0268aabc8c452
SHA51212f45fa73a6de6dfe17acc8b52b60f2d79008da130730b74cc138c1dcd73ccc99487165e3c8c90dc247359fde272f1ec6b3cf2c5fcb04e5093936144d0558b75
-
Filesize
6KB
MD5960a92b29089660cd3e1023b465ebcf7
SHA1868e44e3658bbb47f2f34ea8ca06f9d29b0e2ab7
SHA256a92b59acda9f86941a1500d82945060b96ffe4c51302a723299b617bce3f3861
SHA5123bf4b0f798c5d2f87cc234e672d69c24c184fb07f91427269bed658a5c68174915ecb45728a9d98f312a6bb4c3abd75443b953d8c45f111c9a04083fcf311a9c
-
Filesize
5KB
MD5d20b706f85ca8689315f6e17d2d70d09
SHA1c90c7f51696f402355ddd75e98599558d9e518ae
SHA256f9218063556a074b81c18aae77a9f92fdbb951dece4c1c0e04b9951ceb93f286
SHA512c15d1bee862dbd0a8d83ab0cd0b2061030f0c4d75a0ef69ddfd6011e8a78985872eb11ea13080091708b89b72330a0c462d8a3491207eb4e4cf96a74ac0e7686
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d421a07609ae681c09776858e0eacab9
SHA1404d527430271b969d80469bea04ede59bdb18cf
SHA25624b0b2681caee4745ca5653f25f39c25ca7659ef5a74513dca4caf7f128d08e4
SHA51228ef5f6c490ec2005fb97b06d4cbc47215baf08ad35e86cfe0f9d2fcb17e0b9961038f2adbd7c576d58baf2d48e5dbb12d704a3ebb1dd00d1a80113bda560e9d