Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 08:33
Static task
static1
Behavioral task
behavioral1
Sample
200ae21483c8492b95707c5251cf5a91_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
200ae21483c8492b95707c5251cf5a91_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
200ae21483c8492b95707c5251cf5a91_JaffaCakes118.html
-
Size
2KB
-
MD5
200ae21483c8492b95707c5251cf5a91
-
SHA1
6545b4ec29100797fc5185d3527906a55cf34238
-
SHA256
c9b56522764faeb62336f0a8f3ccf080b4dd75b438da7084d46f8d8f4f0f85a3
-
SHA512
b08c1890ba059010fc49ba81bb848dc28639f691ba67be067994f7dda976a10e7bf761e2d444544a70bbfbdfe8a59e29ba108a31a1a96a2aa1171736d52906bd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3744 msedge.exe 3744 msedge.exe 4800 msedge.exe 4800 msedge.exe 4232 identity_helper.exe 4232 identity_helper.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4800 wrote to memory of 4756 4800 msedge.exe 83 PID 4800 wrote to memory of 4756 4800 msedge.exe 83 PID 4800 wrote to memory of 3404 4800 msedge.exe 84 PID 4800 wrote to memory of 3404 4800 msedge.exe 84 PID 4800 wrote to memory of 3404 4800 msedge.exe 84 PID 4800 wrote to memory of 3404 4800 msedge.exe 84 PID 4800 wrote to memory of 3404 4800 msedge.exe 84 PID 4800 wrote to memory of 3404 4800 msedge.exe 84 PID 4800 wrote to memory of 3404 4800 msedge.exe 84 PID 4800 wrote to memory of 3404 4800 msedge.exe 84 PID 4800 wrote to memory of 3404 4800 msedge.exe 84 PID 4800 wrote to memory of 3404 4800 msedge.exe 84 PID 4800 wrote to memory of 3404 4800 msedge.exe 84 PID 4800 wrote to memory of 3404 4800 msedge.exe 84 PID 4800 wrote to memory of 3404 4800 msedge.exe 84 PID 4800 wrote to memory of 3404 4800 msedge.exe 84 PID 4800 wrote to memory of 3404 4800 msedge.exe 84 PID 4800 wrote to memory of 3404 4800 msedge.exe 84 PID 4800 wrote to memory of 3404 4800 msedge.exe 84 PID 4800 wrote to memory of 3404 4800 msedge.exe 84 PID 4800 wrote to memory of 3404 4800 msedge.exe 84 PID 4800 wrote to memory of 3404 4800 msedge.exe 84 PID 4800 wrote to memory of 3404 4800 msedge.exe 84 PID 4800 wrote to memory of 3404 4800 msedge.exe 84 PID 4800 wrote to memory of 3404 4800 msedge.exe 84 PID 4800 wrote to memory of 3404 4800 msedge.exe 84 PID 4800 wrote to memory of 3404 4800 msedge.exe 84 PID 4800 wrote to memory of 3404 4800 msedge.exe 84 PID 4800 wrote to memory of 3404 4800 msedge.exe 84 PID 4800 wrote to memory of 3404 4800 msedge.exe 84 PID 4800 wrote to memory of 3404 4800 msedge.exe 84 PID 4800 wrote to memory of 3404 4800 msedge.exe 84 PID 4800 wrote to memory of 3404 4800 msedge.exe 84 PID 4800 wrote to memory of 3404 4800 msedge.exe 84 PID 4800 wrote to memory of 3404 4800 msedge.exe 84 PID 4800 wrote to memory of 3404 4800 msedge.exe 84 PID 4800 wrote to memory of 3404 4800 msedge.exe 84 PID 4800 wrote to memory of 3404 4800 msedge.exe 84 PID 4800 wrote to memory of 3404 4800 msedge.exe 84 PID 4800 wrote to memory of 3404 4800 msedge.exe 84 PID 4800 wrote to memory of 3404 4800 msedge.exe 84 PID 4800 wrote to memory of 3404 4800 msedge.exe 84 PID 4800 wrote to memory of 3744 4800 msedge.exe 85 PID 4800 wrote to memory of 3744 4800 msedge.exe 85 PID 4800 wrote to memory of 1460 4800 msedge.exe 86 PID 4800 wrote to memory of 1460 4800 msedge.exe 86 PID 4800 wrote to memory of 1460 4800 msedge.exe 86 PID 4800 wrote to memory of 1460 4800 msedge.exe 86 PID 4800 wrote to memory of 1460 4800 msedge.exe 86 PID 4800 wrote to memory of 1460 4800 msedge.exe 86 PID 4800 wrote to memory of 1460 4800 msedge.exe 86 PID 4800 wrote to memory of 1460 4800 msedge.exe 86 PID 4800 wrote to memory of 1460 4800 msedge.exe 86 PID 4800 wrote to memory of 1460 4800 msedge.exe 86 PID 4800 wrote to memory of 1460 4800 msedge.exe 86 PID 4800 wrote to memory of 1460 4800 msedge.exe 86 PID 4800 wrote to memory of 1460 4800 msedge.exe 86 PID 4800 wrote to memory of 1460 4800 msedge.exe 86 PID 4800 wrote to memory of 1460 4800 msedge.exe 86 PID 4800 wrote to memory of 1460 4800 msedge.exe 86 PID 4800 wrote to memory of 1460 4800 msedge.exe 86 PID 4800 wrote to memory of 1460 4800 msedge.exe 86 PID 4800 wrote to memory of 1460 4800 msedge.exe 86 PID 4800 wrote to memory of 1460 4800 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\200ae21483c8492b95707c5251cf5a91_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffafc8246f8,0x7ffafc824708,0x7ffafc8247182⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,4565627185435009014,17860086312077460819,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2044 /prefetch:22⤵PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2004,4565627185435009014,17860086312077460819,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2004,4565627185435009014,17860086312077460819,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵PID:1460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,4565627185435009014,17860086312077460819,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,4565627185435009014,17860086312077460819,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,4565627185435009014,17860086312077460819,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5860 /prefetch:82⤵PID:3768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,4565627185435009014,17860086312077460819,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5860 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,4565627185435009014,17860086312077460819,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,4565627185435009014,17860086312077460819,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4648 /prefetch:12⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,4565627185435009014,17860086312077460819,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:1808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,4565627185435009014,17860086312077460819,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5816 /prefetch:12⤵PID:1348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,4565627185435009014,17860086312077460819,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2544 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4904
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3888
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\52679192-06c1-4428-a042-2fd7a0377271.tmp
Filesize6KB
MD5f1c50d494b77342365a7462815953698
SHA153f01f59571d3357a5667e82e8dc16301cbd8a26
SHA2566239a9dd78b32dd00fff20fb2e271985b05f9067c279632b1039e8a7a3bbf0a9
SHA5127e67b7a85cb09e584f3e0b630ea0d40ddb7ed944cdf13b7e9b73a0bb4be767067cadfcf27d24aa0e3f9cd0f1cf31836dc9810eeecaa9f290294b889831dc2b55
-
Filesize
5KB
MD580d5877c555e126fe815a2d7e29c0714
SHA1849a5edc69c3dc7f880d23f386fb94ce4c50dcca
SHA2563f584e068b5a1d2790a7e49956d79c2e264ae4100817f82e8c49a5992c8bb42d
SHA5122ead9a186ad804c2d7136a117367549ab59d619cc2fc09f02e46e0430599d259beef17976e6964649feaeb9a32072f13f3307f93c4b8bba920d150acb6d187da
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5489f75a76ad037df7d9279ee786d2614
SHA1663b520923b83df7a1155c409a6aad67c504bd08
SHA25641c2057b61086f7b306ed6f8c956191109b3e4b18b17a26560defb5ba6b7165f
SHA512ccf324b79da282c3b96438ec42964d9b04658d43b395ac12825e6826eb79f9c3259cd1ce4baf5a556cbc54543c6fbb8a0dd3bd50157570f6caf89a36ce342817