Analysis
-
max time kernel
145s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 20:31
Static task
static1
Behavioral task
behavioral1
Sample
219b916518394de5d58a1eda239ee65d_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
219b916518394de5d58a1eda239ee65d_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
219b916518394de5d58a1eda239ee65d_JaffaCakes118.html
-
Size
25KB
-
MD5
219b916518394de5d58a1eda239ee65d
-
SHA1
f24637584e1d8a34ac251376a4088fd3629d9fa0
-
SHA256
64a669a69d0528b67f47746e9fd7768fb348df6794d6988340cdd38b38a028ac
-
SHA512
6c90cd986ac01cef9f40381a52c1a9a13179bcdf1a0e2aa0c5c227428f79541678731fd7033557f80093ba8ea96300779c37e025d9abec8ad82110ace7d619db
-
SSDEEP
384:9voV5sLwbqZBcMWHdvrOPJCzLl9roYBJfDVFosq2c7jPdaiCcRacLor:9voV5sLwbvrQA99isi5a+Q
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 784 msedge.exe 784 msedge.exe 1648 msedge.exe 1648 msedge.exe 3940 identity_helper.exe 3940 identity_helper.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1648 wrote to memory of 4448 1648 msedge.exe 83 PID 1648 wrote to memory of 4448 1648 msedge.exe 83 PID 1648 wrote to memory of 4460 1648 msedge.exe 84 PID 1648 wrote to memory of 4460 1648 msedge.exe 84 PID 1648 wrote to memory of 4460 1648 msedge.exe 84 PID 1648 wrote to memory of 4460 1648 msedge.exe 84 PID 1648 wrote to memory of 4460 1648 msedge.exe 84 PID 1648 wrote to memory of 4460 1648 msedge.exe 84 PID 1648 wrote to memory of 4460 1648 msedge.exe 84 PID 1648 wrote to memory of 4460 1648 msedge.exe 84 PID 1648 wrote to memory of 4460 1648 msedge.exe 84 PID 1648 wrote to memory of 4460 1648 msedge.exe 84 PID 1648 wrote to memory of 4460 1648 msedge.exe 84 PID 1648 wrote to memory of 4460 1648 msedge.exe 84 PID 1648 wrote to memory of 4460 1648 msedge.exe 84 PID 1648 wrote to memory of 4460 1648 msedge.exe 84 PID 1648 wrote to memory of 4460 1648 msedge.exe 84 PID 1648 wrote to memory of 4460 1648 msedge.exe 84 PID 1648 wrote to memory of 4460 1648 msedge.exe 84 PID 1648 wrote to memory of 4460 1648 msedge.exe 84 PID 1648 wrote to memory of 4460 1648 msedge.exe 84 PID 1648 wrote to memory of 4460 1648 msedge.exe 84 PID 1648 wrote to memory of 4460 1648 msedge.exe 84 PID 1648 wrote to memory of 4460 1648 msedge.exe 84 PID 1648 wrote to memory of 4460 1648 msedge.exe 84 PID 1648 wrote to memory of 4460 1648 msedge.exe 84 PID 1648 wrote to memory of 4460 1648 msedge.exe 84 PID 1648 wrote to memory of 4460 1648 msedge.exe 84 PID 1648 wrote to memory of 4460 1648 msedge.exe 84 PID 1648 wrote to memory of 4460 1648 msedge.exe 84 PID 1648 wrote to memory of 4460 1648 msedge.exe 84 PID 1648 wrote to memory of 4460 1648 msedge.exe 84 PID 1648 wrote to memory of 4460 1648 msedge.exe 84 PID 1648 wrote to memory of 4460 1648 msedge.exe 84 PID 1648 wrote to memory of 4460 1648 msedge.exe 84 PID 1648 wrote to memory of 4460 1648 msedge.exe 84 PID 1648 wrote to memory of 4460 1648 msedge.exe 84 PID 1648 wrote to memory of 4460 1648 msedge.exe 84 PID 1648 wrote to memory of 4460 1648 msedge.exe 84 PID 1648 wrote to memory of 4460 1648 msedge.exe 84 PID 1648 wrote to memory of 4460 1648 msedge.exe 84 PID 1648 wrote to memory of 4460 1648 msedge.exe 84 PID 1648 wrote to memory of 784 1648 msedge.exe 85 PID 1648 wrote to memory of 784 1648 msedge.exe 85 PID 1648 wrote to memory of 5080 1648 msedge.exe 86 PID 1648 wrote to memory of 5080 1648 msedge.exe 86 PID 1648 wrote to memory of 5080 1648 msedge.exe 86 PID 1648 wrote to memory of 5080 1648 msedge.exe 86 PID 1648 wrote to memory of 5080 1648 msedge.exe 86 PID 1648 wrote to memory of 5080 1648 msedge.exe 86 PID 1648 wrote to memory of 5080 1648 msedge.exe 86 PID 1648 wrote to memory of 5080 1648 msedge.exe 86 PID 1648 wrote to memory of 5080 1648 msedge.exe 86 PID 1648 wrote to memory of 5080 1648 msedge.exe 86 PID 1648 wrote to memory of 5080 1648 msedge.exe 86 PID 1648 wrote to memory of 5080 1648 msedge.exe 86 PID 1648 wrote to memory of 5080 1648 msedge.exe 86 PID 1648 wrote to memory of 5080 1648 msedge.exe 86 PID 1648 wrote to memory of 5080 1648 msedge.exe 86 PID 1648 wrote to memory of 5080 1648 msedge.exe 86 PID 1648 wrote to memory of 5080 1648 msedge.exe 86 PID 1648 wrote to memory of 5080 1648 msedge.exe 86 PID 1648 wrote to memory of 5080 1648 msedge.exe 86 PID 1648 wrote to memory of 5080 1648 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\219b916518394de5d58a1eda239ee65d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff80ad846f8,0x7ff80ad84708,0x7ff80ad847182⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1940,14396635108147666502,12925519445812852530,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1984 /prefetch:22⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1940,14396635108147666502,12925519445812852530,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2076 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1940,14396635108147666502,12925519445812852530,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2436 /prefetch:82⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,14396635108147666502,12925519445812852530,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,14396635108147666502,12925519445812852530,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1940,14396635108147666502,12925519445812852530,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6012 /prefetch:82⤵PID:1248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1940,14396635108147666502,12925519445812852530,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6012 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,14396635108147666502,12925519445812852530,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,14396635108147666502,12925519445812852530,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,14396635108147666502,12925519445812852530,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2288 /prefetch:12⤵PID:2508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,14396635108147666502,12925519445812852530,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4936 /prefetch:12⤵PID:2744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1940,14396635108147666502,12925519445812852530,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4744 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4592
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3812
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1664
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
Filesize
821B
MD5fb92b76928ff8909d68706aba83388f6
SHA1507e8f9c090b9bd824067b91c1d646ae6cef5b8d
SHA256f5811e42f274129b63e292e8b17ae18a73d2c5e49f6af4cd86a501dc5e50fd86
SHA5125d74aec1af95c15dccabb53fb4042bf485e303aa8dd3232d389da315ce6d2e451ed99ac35022143b8cf213246b1a642d3597ee57f86c8f4a5161f0719bfc4ec2
-
Filesize
5KB
MD5235147bcc9a27192c5762223ddd824a5
SHA1a082d1fdb1e8780e117f2008651a83130169cb7a
SHA256249adcd14a32a4df308e1e6bc979b8a3aa87d35932d651ce31c45cd76e620382
SHA512427a05d75bfe9505f0397bcf096f90ac32e9040d281f4b830980cb7ceaca355864032b839121db867bc1a10eda8956f194b5a8a07f5083193d557c49b6e8ee92
-
Filesize
6KB
MD5764e752dcada632ad05d7cd092d6e7b2
SHA16cee211b97abaea2682f7729283af46d1edabd00
SHA256e3caa057bfcb3bbd2b380a031744c6680887acca7999700101e1a3884eb9154f
SHA51227e9a84689a8a7608e706d6a8c9f85dfb8562713ba004a741fcf1eeb16230e972d9f89c95b56c69406d5112c60cda668fd35a8466c63f022fc528af8d613d0ba
-
Filesize
6KB
MD5bfb8044f72a5ca22e68a734448d8d48f
SHA1347a6bd2576e62b2a2907c9cd282bedd3da8b5b5
SHA2561ecd8bf3a0c2d3bd8eeeb3180061f460a919b1a5f306e038726aabee4b685a70
SHA512565d390286f068dae631bf05b2fcd530486ed2d081020ccd60dda3797a46e5747c18c194919fa40f5ec172b31f5ac640788f13c36ac1d4f875d6371efc7cbb2e
-
Filesize
539B
MD555f804de6839d833c9cbfd2ae3ce6909
SHA1753abc466346776bb0fb895351eafd8d8727d3de
SHA256492be4c3bcdcd9450e3d6c7d75129e1c6b4b5966b9923e9017302b3c01cfbc24
SHA512dc47a51cdceb08c96200e5f08ff619be56a99870cd6c5c24f81a016de45cc8b225bc1decb4cb110b616fe86af3e4653eea382de2dda759e05531c0a5511210cb
-
Filesize
539B
MD5c68f2763e5fbe01b8d5bbe55931adb55
SHA17d6ee40b44b7b1cf758bf7685bfaae696d57d652
SHA2568e3bb5d2164d23596955f2627466c87de8114546e11ab041db6681aca05c265e
SHA5124326989d81f1156526673fcbc869d02d4c4e5e7cfdfda47b0eb9761cce0a7a969b4190c019a58744f72573d96f05079f0a5a9acb9478c52983a0d2ca0f60d6cf
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD545c4bdce7fcd38e976be8e6e17c983a8
SHA13674415e270d913690dd28a0b1d431431eacf22e
SHA256c7f7095690dab8192b712943544cb1df807e2be2f6ebb7019ee31f56c6c52330
SHA5124c8a2647a6405c6135fecbf47644e8f70419ab30a07f690bc95902f2c1b1b9b64c95b3bf09810f43ed6256045f5a64ff744d02c8025cde452412332a0abe1a41