Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2024 07:04
Static task
static1
Behavioral task
behavioral1
Sample
1fd2959c476feef31e5eb8b5752c04c3_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1fd2959c476feef31e5eb8b5752c04c3_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
1fd2959c476feef31e5eb8b5752c04c3_JaffaCakes118.html
-
Size
465KB
-
MD5
1fd2959c476feef31e5eb8b5752c04c3
-
SHA1
3f130889e35dd2b6ac8a4e984eac2794a461a55b
-
SHA256
37c815b8dde2b529c286bac1dc79a44dea3e0e7748701562a19759332c56ccf1
-
SHA512
28d2d802f98e8ee314363062e424dfbbc88e19f57ec3d8fd200d0664df72bc0c3182b6cac8823d82d2e39007a342316fbe0992aef7f470c513c64f2d51a6b199
-
SSDEEP
6144:SmsMYod+X3oI+Y6tvu6xAmzM86P5sZpMFzBtug4r1GcFBU/b:15d+X3poCPuzmrugwG2qz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3800 msedge.exe 3800 msedge.exe 4836 msedge.exe 4836 msedge.exe 3216 identity_helper.exe 3216 identity_helper.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4836 wrote to memory of 4420 4836 msedge.exe 86 PID 4836 wrote to memory of 4420 4836 msedge.exe 86 PID 4836 wrote to memory of 4596 4836 msedge.exe 87 PID 4836 wrote to memory of 4596 4836 msedge.exe 87 PID 4836 wrote to memory of 4596 4836 msedge.exe 87 PID 4836 wrote to memory of 4596 4836 msedge.exe 87 PID 4836 wrote to memory of 4596 4836 msedge.exe 87 PID 4836 wrote to memory of 4596 4836 msedge.exe 87 PID 4836 wrote to memory of 4596 4836 msedge.exe 87 PID 4836 wrote to memory of 4596 4836 msedge.exe 87 PID 4836 wrote to memory of 4596 4836 msedge.exe 87 PID 4836 wrote to memory of 4596 4836 msedge.exe 87 PID 4836 wrote to memory of 4596 4836 msedge.exe 87 PID 4836 wrote to memory of 4596 4836 msedge.exe 87 PID 4836 wrote to memory of 4596 4836 msedge.exe 87 PID 4836 wrote to memory of 4596 4836 msedge.exe 87 PID 4836 wrote to memory of 4596 4836 msedge.exe 87 PID 4836 wrote to memory of 4596 4836 msedge.exe 87 PID 4836 wrote to memory of 4596 4836 msedge.exe 87 PID 4836 wrote to memory of 4596 4836 msedge.exe 87 PID 4836 wrote to memory of 4596 4836 msedge.exe 87 PID 4836 wrote to memory of 4596 4836 msedge.exe 87 PID 4836 wrote to memory of 4596 4836 msedge.exe 87 PID 4836 wrote to memory of 4596 4836 msedge.exe 87 PID 4836 wrote to memory of 4596 4836 msedge.exe 87 PID 4836 wrote to memory of 4596 4836 msedge.exe 87 PID 4836 wrote to memory of 4596 4836 msedge.exe 87 PID 4836 wrote to memory of 4596 4836 msedge.exe 87 PID 4836 wrote to memory of 4596 4836 msedge.exe 87 PID 4836 wrote to memory of 4596 4836 msedge.exe 87 PID 4836 wrote to memory of 4596 4836 msedge.exe 87 PID 4836 wrote to memory of 4596 4836 msedge.exe 87 PID 4836 wrote to memory of 4596 4836 msedge.exe 87 PID 4836 wrote to memory of 4596 4836 msedge.exe 87 PID 4836 wrote to memory of 4596 4836 msedge.exe 87 PID 4836 wrote to memory of 4596 4836 msedge.exe 87 PID 4836 wrote to memory of 4596 4836 msedge.exe 87 PID 4836 wrote to memory of 4596 4836 msedge.exe 87 PID 4836 wrote to memory of 4596 4836 msedge.exe 87 PID 4836 wrote to memory of 4596 4836 msedge.exe 87 PID 4836 wrote to memory of 4596 4836 msedge.exe 87 PID 4836 wrote to memory of 4596 4836 msedge.exe 87 PID 4836 wrote to memory of 3800 4836 msedge.exe 88 PID 4836 wrote to memory of 3800 4836 msedge.exe 88 PID 4836 wrote to memory of 1164 4836 msedge.exe 89 PID 4836 wrote to memory of 1164 4836 msedge.exe 89 PID 4836 wrote to memory of 1164 4836 msedge.exe 89 PID 4836 wrote to memory of 1164 4836 msedge.exe 89 PID 4836 wrote to memory of 1164 4836 msedge.exe 89 PID 4836 wrote to memory of 1164 4836 msedge.exe 89 PID 4836 wrote to memory of 1164 4836 msedge.exe 89 PID 4836 wrote to memory of 1164 4836 msedge.exe 89 PID 4836 wrote to memory of 1164 4836 msedge.exe 89 PID 4836 wrote to memory of 1164 4836 msedge.exe 89 PID 4836 wrote to memory of 1164 4836 msedge.exe 89 PID 4836 wrote to memory of 1164 4836 msedge.exe 89 PID 4836 wrote to memory of 1164 4836 msedge.exe 89 PID 4836 wrote to memory of 1164 4836 msedge.exe 89 PID 4836 wrote to memory of 1164 4836 msedge.exe 89 PID 4836 wrote to memory of 1164 4836 msedge.exe 89 PID 4836 wrote to memory of 1164 4836 msedge.exe 89 PID 4836 wrote to memory of 1164 4836 msedge.exe 89 PID 4836 wrote to memory of 1164 4836 msedge.exe 89 PID 4836 wrote to memory of 1164 4836 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\1fd2959c476feef31e5eb8b5752c04c3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff129b46f8,0x7fff129b4708,0x7fff129b47182⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,7483108290969259301,6036129553498461857,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,7483108290969259301,6036129553498461857,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,7483108290969259301,6036129553498461857,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7483108290969259301,6036129553498461857,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7483108290969259301,6036129553498461857,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,7483108290969259301,6036129553498461857,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4744 /prefetch:82⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,7483108290969259301,6036129553498461857,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4744 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7483108290969259301,6036129553498461857,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7483108290969259301,6036129553498461857,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7483108290969259301,6036129553498461857,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7483108290969259301,6036129553498461857,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,7483108290969259301,6036129553498461857,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4880 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3552
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1584
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
Filesize
5KB
MD534f1b7ece0224a047b628c34befd007a
SHA1139c392687728720593dfd6d2cf352f72e0f9bdc
SHA2561af63275b4515ad6cb7e6a04d09f0e717a3d421f8949af4487dfa0fd55353861
SHA51299fd8983d2250f92c9f19ab17ec3ae0c2e192601c68386cdcee2b55a5dd5f3b9494b83e12aaf2ca4bd7ffdcb1c3538ea65f08376460f098383441f9c4c61db79
-
Filesize
6KB
MD5b7c2156113462e2845df85811243a750
SHA1fe1441f853f7d22149b171ce7c6fdc7241b5b2ca
SHA25603296807c6ee8046fdd9e06ffe7a4ff6ee2e5f68fb8ab28e53a04ba31f489527
SHA512fa8a33d84802ac44431d24290442e35242fc6a8e0edd15333ddfde9dcb6d2764de55869b9d9d910d5bc9f2165e7a87d48b586cd7b747f0ee072ccea6ea353220
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5eba6ee99c1925895aab939331412bc57
SHA14e29f63fd54f71373bacf4b1b8807f4ba6e8b231
SHA2560e242e98a0fa1b929767c2cb8bf4837387d63f6759026f280d24b8fd2a0f94b8
SHA51206199aaf124b5f762aedb16220436bc4c69c2d9de02923b3527d52a3fef22761ef66432015a5fd4873cd619428e06278c2ff5ff328e687b630953ac98537bc0a