Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2024 11:53
Static task
static1
Behavioral task
behavioral1
Sample
207d5b56cd8d9ea8a077791071835925_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
207d5b56cd8d9ea8a077791071835925_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
207d5b56cd8d9ea8a077791071835925_JaffaCakes118.html
-
Size
908B
-
MD5
207d5b56cd8d9ea8a077791071835925
-
SHA1
f051438f39acce8cb5186b559d92b69ccee471c6
-
SHA256
4c719627d5f32adc9c57e471dd80d6ad27366d2afe7b0932a005198c94b6de68
-
SHA512
c9f0a430bedd494be5c02ff3b75e67e65a41e4326d1f2d9c41c2e191d433b1223d0f3d96182cb97274a4f49b1db4b03d2cf24d7b7676d80392acfe63cc8e8a08
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2604 msedge.exe 2604 msedge.exe 4304 msedge.exe 4304 msedge.exe 4780 identity_helper.exe 4780 identity_helper.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4304 wrote to memory of 2108 4304 msedge.exe 85 PID 4304 wrote to memory of 2108 4304 msedge.exe 85 PID 4304 wrote to memory of 4256 4304 msedge.exe 88 PID 4304 wrote to memory of 4256 4304 msedge.exe 88 PID 4304 wrote to memory of 4256 4304 msedge.exe 88 PID 4304 wrote to memory of 4256 4304 msedge.exe 88 PID 4304 wrote to memory of 4256 4304 msedge.exe 88 PID 4304 wrote to memory of 4256 4304 msedge.exe 88 PID 4304 wrote to memory of 4256 4304 msedge.exe 88 PID 4304 wrote to memory of 4256 4304 msedge.exe 88 PID 4304 wrote to memory of 4256 4304 msedge.exe 88 PID 4304 wrote to memory of 4256 4304 msedge.exe 88 PID 4304 wrote to memory of 4256 4304 msedge.exe 88 PID 4304 wrote to memory of 4256 4304 msedge.exe 88 PID 4304 wrote to memory of 4256 4304 msedge.exe 88 PID 4304 wrote to memory of 4256 4304 msedge.exe 88 PID 4304 wrote to memory of 4256 4304 msedge.exe 88 PID 4304 wrote to memory of 4256 4304 msedge.exe 88 PID 4304 wrote to memory of 4256 4304 msedge.exe 88 PID 4304 wrote to memory of 4256 4304 msedge.exe 88 PID 4304 wrote to memory of 4256 4304 msedge.exe 88 PID 4304 wrote to memory of 4256 4304 msedge.exe 88 PID 4304 wrote to memory of 4256 4304 msedge.exe 88 PID 4304 wrote to memory of 4256 4304 msedge.exe 88 PID 4304 wrote to memory of 4256 4304 msedge.exe 88 PID 4304 wrote to memory of 4256 4304 msedge.exe 88 PID 4304 wrote to memory of 4256 4304 msedge.exe 88 PID 4304 wrote to memory of 4256 4304 msedge.exe 88 PID 4304 wrote to memory of 4256 4304 msedge.exe 88 PID 4304 wrote to memory of 4256 4304 msedge.exe 88 PID 4304 wrote to memory of 4256 4304 msedge.exe 88 PID 4304 wrote to memory of 4256 4304 msedge.exe 88 PID 4304 wrote to memory of 4256 4304 msedge.exe 88 PID 4304 wrote to memory of 4256 4304 msedge.exe 88 PID 4304 wrote to memory of 4256 4304 msedge.exe 88 PID 4304 wrote to memory of 4256 4304 msedge.exe 88 PID 4304 wrote to memory of 4256 4304 msedge.exe 88 PID 4304 wrote to memory of 4256 4304 msedge.exe 88 PID 4304 wrote to memory of 4256 4304 msedge.exe 88 PID 4304 wrote to memory of 4256 4304 msedge.exe 88 PID 4304 wrote to memory of 4256 4304 msedge.exe 88 PID 4304 wrote to memory of 4256 4304 msedge.exe 88 PID 4304 wrote to memory of 2604 4304 msedge.exe 89 PID 4304 wrote to memory of 2604 4304 msedge.exe 89 PID 4304 wrote to memory of 804 4304 msedge.exe 90 PID 4304 wrote to memory of 804 4304 msedge.exe 90 PID 4304 wrote to memory of 804 4304 msedge.exe 90 PID 4304 wrote to memory of 804 4304 msedge.exe 90 PID 4304 wrote to memory of 804 4304 msedge.exe 90 PID 4304 wrote to memory of 804 4304 msedge.exe 90 PID 4304 wrote to memory of 804 4304 msedge.exe 90 PID 4304 wrote to memory of 804 4304 msedge.exe 90 PID 4304 wrote to memory of 804 4304 msedge.exe 90 PID 4304 wrote to memory of 804 4304 msedge.exe 90 PID 4304 wrote to memory of 804 4304 msedge.exe 90 PID 4304 wrote to memory of 804 4304 msedge.exe 90 PID 4304 wrote to memory of 804 4304 msedge.exe 90 PID 4304 wrote to memory of 804 4304 msedge.exe 90 PID 4304 wrote to memory of 804 4304 msedge.exe 90 PID 4304 wrote to memory of 804 4304 msedge.exe 90 PID 4304 wrote to memory of 804 4304 msedge.exe 90 PID 4304 wrote to memory of 804 4304 msedge.exe 90 PID 4304 wrote to memory of 804 4304 msedge.exe 90 PID 4304 wrote to memory of 804 4304 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\207d5b56cd8d9ea8a077791071835925_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9fe2046f8,0x7ff9fe204708,0x7ff9fe2047182⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,12009084753426667019,2345596474516190150,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,12009084753426667019,2345596474516190150,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,12009084753426667019,2345596474516190150,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12009084753426667019,2345596474516190150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12009084753426667019,2345596474516190150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:1796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12009084753426667019,2345596474516190150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4624 /prefetch:12⤵PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,12009084753426667019,2345596474516190150,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵PID:1144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,12009084753426667019,2345596474516190150,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12009084753426667019,2345596474516190150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4604 /prefetch:12⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12009084753426667019,2345596474516190150,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3972 /prefetch:12⤵PID:1348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12009084753426667019,2345596474516190150,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4624 /prefetch:12⤵PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,12009084753426667019,2345596474516190150,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4948 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:116
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5056
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3432
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dbac49e66219979194c79f1cf1cb3dd1
SHA14ef87804a04d51ae1fac358f92382548b27f62f2
SHA256f24ed6c5bf4b734a9af4d64e14a80a160bea569f50849f70bf7b7277c4f48562
SHA512bb314d61f53cf7774f6dfb6b772c72f5daf386bc3d27d2bb7a14c65848ee86e6c48e9c5696693ded31846b69b9372a530175df48494e3d61a228e49d43401ad1
-
Filesize
152B
MD5a9e55f5864d6e2afd2fd84e25a3bc228
SHA1a5efcff9e3df6252c7fe8535d505235f82aab276
SHA2560f4df3120e4620555916be8e51c29be8d600d68ae5244efad6a0268aabc8c452
SHA51212f45fa73a6de6dfe17acc8b52b60f2d79008da130730b74cc138c1dcd73ccc99487165e3c8c90dc247359fde272f1ec6b3cf2c5fcb04e5093936144d0558b75
-
Filesize
5KB
MD5b9a858d945dd576d84eda43da5df58ff
SHA1463f0b6431012d9b4d6dfb2dbf258685442c8479
SHA2562c09918e2af290910cbe9ca7260aef3d475c0a6f0aea93faa55ba0d3e71d72f9
SHA5127647b4892309797714d4a4ff9a8b97dfabed63f402165740d73fdf65a42e9eb9bd320c71c72bbb09ff6e44c961ca5cc93f40c3aa05fee330286ef401e5405854
-
Filesize
6KB
MD5485a2353f85a41329cecf05578b54e88
SHA187263eae3a72a78842320ca6d1b2105d896d7d96
SHA25604d7054da4d3beaba087ab31810f31b38b5f71487ce65eec2333b99cee13b4f3
SHA5127c0079a6bb3c5c3efb05146de99b6bdeb3b607aa79169a3e30a5479ccff269e1cfb5e950f33490b083488deada1368195f4836cae107f92816d518b2668ed3d3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a751e7975c9aa05be669f0199ead2f31
SHA12726a4c6f78ce4cf7171f26293f4ccca3480e5a7
SHA256f42c2a375a2d0ed3c02d622b4f87327ecd6ad33869ba3c01a05d0fb9fe4dc901
SHA512d4fc9a70e50d8e8f8be677343df571f0c84a50bb35ed052f5e2a3b23cd8859e692da90e406a18e3045a43ea8096d7311b3af00cac169f7610bd0179d3a968a3b