Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 17:05
Static task
static1
Behavioral task
behavioral1
Sample
212126ae04a318a81cae33daed72dac4_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
212126ae04a318a81cae33daed72dac4_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
212126ae04a318a81cae33daed72dac4_JaffaCakes118.html
-
Size
15KB
-
MD5
212126ae04a318a81cae33daed72dac4
-
SHA1
7db5203bfc794138b2ac1c297fd8aa6267f0d952
-
SHA256
c4b88ffc297d4145a992bb168694de63ae4ca471c04c65c2497f5daca2cfca81
-
SHA512
62efa23b04ea165fe305a78d431fe483cf2eb910cf00f3cdf0ea4e15440edf08a124335576f47ee0c9b3c90160de0929da49d8232db03f002b8ea19329aeb2c7
-
SSDEEP
384:x5uw/TlivoTh48w4il9bvDAfqvuPrBaixWgWK9F:x5NEATh48w4il9bvDAfqvMaY
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2836 msedge.exe 2836 msedge.exe 4036 msedge.exe 4036 msedge.exe 2356 identity_helper.exe 2356 identity_helper.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4036 wrote to memory of 2460 4036 msedge.exe 83 PID 4036 wrote to memory of 2460 4036 msedge.exe 83 PID 4036 wrote to memory of 2476 4036 msedge.exe 84 PID 4036 wrote to memory of 2476 4036 msedge.exe 84 PID 4036 wrote to memory of 2476 4036 msedge.exe 84 PID 4036 wrote to memory of 2476 4036 msedge.exe 84 PID 4036 wrote to memory of 2476 4036 msedge.exe 84 PID 4036 wrote to memory of 2476 4036 msedge.exe 84 PID 4036 wrote to memory of 2476 4036 msedge.exe 84 PID 4036 wrote to memory of 2476 4036 msedge.exe 84 PID 4036 wrote to memory of 2476 4036 msedge.exe 84 PID 4036 wrote to memory of 2476 4036 msedge.exe 84 PID 4036 wrote to memory of 2476 4036 msedge.exe 84 PID 4036 wrote to memory of 2476 4036 msedge.exe 84 PID 4036 wrote to memory of 2476 4036 msedge.exe 84 PID 4036 wrote to memory of 2476 4036 msedge.exe 84 PID 4036 wrote to memory of 2476 4036 msedge.exe 84 PID 4036 wrote to memory of 2476 4036 msedge.exe 84 PID 4036 wrote to memory of 2476 4036 msedge.exe 84 PID 4036 wrote to memory of 2476 4036 msedge.exe 84 PID 4036 wrote to memory of 2476 4036 msedge.exe 84 PID 4036 wrote to memory of 2476 4036 msedge.exe 84 PID 4036 wrote to memory of 2476 4036 msedge.exe 84 PID 4036 wrote to memory of 2476 4036 msedge.exe 84 PID 4036 wrote to memory of 2476 4036 msedge.exe 84 PID 4036 wrote to memory of 2476 4036 msedge.exe 84 PID 4036 wrote to memory of 2476 4036 msedge.exe 84 PID 4036 wrote to memory of 2476 4036 msedge.exe 84 PID 4036 wrote to memory of 2476 4036 msedge.exe 84 PID 4036 wrote to memory of 2476 4036 msedge.exe 84 PID 4036 wrote to memory of 2476 4036 msedge.exe 84 PID 4036 wrote to memory of 2476 4036 msedge.exe 84 PID 4036 wrote to memory of 2476 4036 msedge.exe 84 PID 4036 wrote to memory of 2476 4036 msedge.exe 84 PID 4036 wrote to memory of 2476 4036 msedge.exe 84 PID 4036 wrote to memory of 2476 4036 msedge.exe 84 PID 4036 wrote to memory of 2476 4036 msedge.exe 84 PID 4036 wrote to memory of 2476 4036 msedge.exe 84 PID 4036 wrote to memory of 2476 4036 msedge.exe 84 PID 4036 wrote to memory of 2476 4036 msedge.exe 84 PID 4036 wrote to memory of 2476 4036 msedge.exe 84 PID 4036 wrote to memory of 2476 4036 msedge.exe 84 PID 4036 wrote to memory of 2836 4036 msedge.exe 85 PID 4036 wrote to memory of 2836 4036 msedge.exe 85 PID 4036 wrote to memory of 4056 4036 msedge.exe 86 PID 4036 wrote to memory of 4056 4036 msedge.exe 86 PID 4036 wrote to memory of 4056 4036 msedge.exe 86 PID 4036 wrote to memory of 4056 4036 msedge.exe 86 PID 4036 wrote to memory of 4056 4036 msedge.exe 86 PID 4036 wrote to memory of 4056 4036 msedge.exe 86 PID 4036 wrote to memory of 4056 4036 msedge.exe 86 PID 4036 wrote to memory of 4056 4036 msedge.exe 86 PID 4036 wrote to memory of 4056 4036 msedge.exe 86 PID 4036 wrote to memory of 4056 4036 msedge.exe 86 PID 4036 wrote to memory of 4056 4036 msedge.exe 86 PID 4036 wrote to memory of 4056 4036 msedge.exe 86 PID 4036 wrote to memory of 4056 4036 msedge.exe 86 PID 4036 wrote to memory of 4056 4036 msedge.exe 86 PID 4036 wrote to memory of 4056 4036 msedge.exe 86 PID 4036 wrote to memory of 4056 4036 msedge.exe 86 PID 4036 wrote to memory of 4056 4036 msedge.exe 86 PID 4036 wrote to memory of 4056 4036 msedge.exe 86 PID 4036 wrote to memory of 4056 4036 msedge.exe 86 PID 4036 wrote to memory of 4056 4036 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\212126ae04a318a81cae33daed72dac4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe39fc46f8,0x7ffe39fc4708,0x7ffe39fc47182⤵PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,16073317186573762229,11663468623670026616,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,16073317186573762229,11663468623670026616,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,16073317186573762229,11663468623670026616,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16073317186573762229,11663468623670026616,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16073317186573762229,11663468623670026616,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,16073317186573762229,11663468623670026616,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4964 /prefetch:82⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,16073317186573762229,11663468623670026616,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4964 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16073317186573762229,11663468623670026616,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:2660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16073317186573762229,11663468623670026616,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16073317186573762229,11663468623670026616,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16073317186573762229,11663468623670026616,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,16073317186573762229,11663468623670026616,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1716 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3496
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5088
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58b2290ca03b4ca5fe52d82550c7e7d69
SHA120583a7851a906444204ce8ba4fa51153e6cd494
SHA256f9ff4871fc5317299de907489d466e630be63d698c8f7cb77cc81faddbecc6d2
SHA512704ec8122cc1c263dff67ddbb5c20ee0db8a438674d716bc3be5b266ee5629a219b0049d721f9eb2dd8f2d8fda0163659eaa4d3e1f0a6e9072a8ffb92bb2b25d
-
Filesize
152B
MD5919c29d42fb6034fee2f5de14d573c63
SHA124a2e1042347b3853344157239bde3ed699047a8
SHA25617cd6de97a0c020cb4935739cfef4ec4e074e8d127ac4c531b6dc496580c8141
SHA512bb7eadd087bbcec8b1b8a49b102b454333f2f9708d36b6ffc3c82fdc52e46873398d967238c3bfe9ac6caef45b017a5fe3938ebf5f3053e4ef9be7b2752b563d
-
Filesize
5KB
MD58145d60fdad7e516d3a8a0faa1c580e2
SHA17d59ef2b88357e42e3df3d0894f09adad1ec7004
SHA256b41addbdf0c9db834fb8b954576f4bc2ce1a4ab7d8e66a240c2b162811147f4d
SHA512198a5e92f1bfb26431fd10f987243b661ce51082a4872855cee8ef448a276d6e8edc133606eb7e01c8bb87e4a456d130dfced8d976f42681cb8a514937da4b7e
-
Filesize
6KB
MD517b05b157f96a64de3180763dfd8d23d
SHA1938fadc7f8358db2063a99183ccb27619e45e64c
SHA25660590b197139502c9bd0b6d14578dc3deff7b3e60c7cca9f8582da6b7f77d10d
SHA5126b3b082109b936ef5957244e6cf1beaf22737b13fedca8ec33352bc66d0e169cbefe59c666f49c97356a37d5742763d5fab13f0c389fb8a34da7d4a028307676
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5fa2081f84547bdae8f610ce3e3bcfc77
SHA182203268788ca5daeeb18cb19529c44de4507074
SHA256807e393a1bd0a6ed5e1d533a79fd87b2df1cb1fe35138cec47399380f69102e8
SHA512a7f9ab251c5a446e5a8a1161f10edf2cf5a650b80fbfd296e4e5738e82dfe759ea2726aec18053c1c5651b2c91bfbff60492a23519fbcc3202967e7bf9bd9a08