Analysis
-
max time kernel
139s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 19:19
Static task
static1
Behavioral task
behavioral1
Sample
215c769d4557f59986fc6800cc0c5f48_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
215c769d4557f59986fc6800cc0c5f48_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
215c769d4557f59986fc6800cc0c5f48_JaffaCakes118.html
-
Size
152KB
-
MD5
215c769d4557f59986fc6800cc0c5f48
-
SHA1
3426f6f36081f5d0b24fa650cc95158125c99e40
-
SHA256
b6830434c9a2c531c1142459766c31c3d9b5d0cd7dafb0515d3b5989b00b59e7
-
SHA512
e2d05790de272f920fc767d101fd244e43988295a19ebe55f3a6af35bde3581f1a0a46d857f360e61092949c18afe81b1067a9debd6650574700228313055afc
-
SSDEEP
3072:i1INSQTxdyfkMY+BES09JXAnyrZalI+YQ:iI9TxosMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3932 msedge.exe 3932 msedge.exe 4280 msedge.exe 4280 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2552 identity_helper.exe 2552 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4280 wrote to memory of 3376 4280 msedge.exe 84 PID 4280 wrote to memory of 3376 4280 msedge.exe 84 PID 4280 wrote to memory of 4900 4280 msedge.exe 85 PID 4280 wrote to memory of 4900 4280 msedge.exe 85 PID 4280 wrote to memory of 4900 4280 msedge.exe 85 PID 4280 wrote to memory of 4900 4280 msedge.exe 85 PID 4280 wrote to memory of 4900 4280 msedge.exe 85 PID 4280 wrote to memory of 4900 4280 msedge.exe 85 PID 4280 wrote to memory of 4900 4280 msedge.exe 85 PID 4280 wrote to memory of 4900 4280 msedge.exe 85 PID 4280 wrote to memory of 4900 4280 msedge.exe 85 PID 4280 wrote to memory of 4900 4280 msedge.exe 85 PID 4280 wrote to memory of 4900 4280 msedge.exe 85 PID 4280 wrote to memory of 4900 4280 msedge.exe 85 PID 4280 wrote to memory of 4900 4280 msedge.exe 85 PID 4280 wrote to memory of 4900 4280 msedge.exe 85 PID 4280 wrote to memory of 4900 4280 msedge.exe 85 PID 4280 wrote to memory of 4900 4280 msedge.exe 85 PID 4280 wrote to memory of 4900 4280 msedge.exe 85 PID 4280 wrote to memory of 4900 4280 msedge.exe 85 PID 4280 wrote to memory of 4900 4280 msedge.exe 85 PID 4280 wrote to memory of 4900 4280 msedge.exe 85 PID 4280 wrote to memory of 4900 4280 msedge.exe 85 PID 4280 wrote to memory of 4900 4280 msedge.exe 85 PID 4280 wrote to memory of 4900 4280 msedge.exe 85 PID 4280 wrote to memory of 4900 4280 msedge.exe 85 PID 4280 wrote to memory of 4900 4280 msedge.exe 85 PID 4280 wrote to memory of 4900 4280 msedge.exe 85 PID 4280 wrote to memory of 4900 4280 msedge.exe 85 PID 4280 wrote to memory of 4900 4280 msedge.exe 85 PID 4280 wrote to memory of 4900 4280 msedge.exe 85 PID 4280 wrote to memory of 4900 4280 msedge.exe 85 PID 4280 wrote to memory of 4900 4280 msedge.exe 85 PID 4280 wrote to memory of 4900 4280 msedge.exe 85 PID 4280 wrote to memory of 4900 4280 msedge.exe 85 PID 4280 wrote to memory of 4900 4280 msedge.exe 85 PID 4280 wrote to memory of 4900 4280 msedge.exe 85 PID 4280 wrote to memory of 4900 4280 msedge.exe 85 PID 4280 wrote to memory of 4900 4280 msedge.exe 85 PID 4280 wrote to memory of 4900 4280 msedge.exe 85 PID 4280 wrote to memory of 4900 4280 msedge.exe 85 PID 4280 wrote to memory of 4900 4280 msedge.exe 85 PID 4280 wrote to memory of 3932 4280 msedge.exe 86 PID 4280 wrote to memory of 3932 4280 msedge.exe 86 PID 4280 wrote to memory of 2576 4280 msedge.exe 87 PID 4280 wrote to memory of 2576 4280 msedge.exe 87 PID 4280 wrote to memory of 2576 4280 msedge.exe 87 PID 4280 wrote to memory of 2576 4280 msedge.exe 87 PID 4280 wrote to memory of 2576 4280 msedge.exe 87 PID 4280 wrote to memory of 2576 4280 msedge.exe 87 PID 4280 wrote to memory of 2576 4280 msedge.exe 87 PID 4280 wrote to memory of 2576 4280 msedge.exe 87 PID 4280 wrote to memory of 2576 4280 msedge.exe 87 PID 4280 wrote to memory of 2576 4280 msedge.exe 87 PID 4280 wrote to memory of 2576 4280 msedge.exe 87 PID 4280 wrote to memory of 2576 4280 msedge.exe 87 PID 4280 wrote to memory of 2576 4280 msedge.exe 87 PID 4280 wrote to memory of 2576 4280 msedge.exe 87 PID 4280 wrote to memory of 2576 4280 msedge.exe 87 PID 4280 wrote to memory of 2576 4280 msedge.exe 87 PID 4280 wrote to memory of 2576 4280 msedge.exe 87 PID 4280 wrote to memory of 2576 4280 msedge.exe 87 PID 4280 wrote to memory of 2576 4280 msedge.exe 87 PID 4280 wrote to memory of 2576 4280 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\215c769d4557f59986fc6800cc0c5f48_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff95ad46f8,0x7fff95ad4708,0x7fff95ad47182⤵PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,16280270267143454394,4117571098098644827,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2272 /prefetch:22⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,16280270267143454394,4117571098098644827,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2440 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,16280270267143454394,4117571098098644827,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2452 /prefetch:82⤵PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16280270267143454394,4117571098098644827,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16280270267143454394,4117571098098644827,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,16280270267143454394,4117571098098644827,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,16280270267143454394,4117571098098644827,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵PID:1324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,16280270267143454394,4117571098098644827,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16280270267143454394,4117571098098644827,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2252 /prefetch:12⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16280270267143454394,4117571098098644827,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4604 /prefetch:12⤵PID:3196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16280270267143454394,4117571098098644827,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5532 /prefetch:12⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16280270267143454394,4117571098098644827,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:3124
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4240
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
Filesize
6KB
MD555023ef60313b5b61cf45ecfe70d492f
SHA17ded9cf9f4ebcb0e3e001db42d4c0d23fffd7c17
SHA2563742ccdcb3e5d8a4580c83ce6629db987442776a3332db7d302fbba59c6c8165
SHA5123b69eb72c88eae175cb2f0cbc1a20d8f40b54a70292f2bda4908efd7f8d69bc2b2fa4706a7b9d53a6ad4327745d74f0432ae8cc68b98fc2661a88d3a33f83355
-
Filesize
5KB
MD5004f60259c6afd03c728d0cfe109376c
SHA16903f27a35807cb54a2f70097173b98d487aac51
SHA256a6aabe54eab6d45f9ea9ab0efa14d090fbf8ea3e364db7daa61e29c6af6cef68
SHA512aad729098c0fec8153970401585530f2b0a64af1cb67233720b532d67cfca1728e2544aa22392f1c4b7d5393c6ee951da8ea09b03b002c4a4a2410db3747162d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54641072c4dfa878e4fb9ae36c56a484e
SHA14f225b2269e3e7019bd2caca0ecf1d2e90127acf
SHA2564a4e1e6976fd5176ece74d022a71d3011ed11de93d54dd7ab9a018032ca8e322
SHA512e93b1dc654ca14f42ca3830ff9ad3ccd3025433cf053eb3af078897f2a5c21c24a1e71d19fd2f47d8c8a0db5be3d4fee58dfe709cdd99ed363aacaf67ea68acf