Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 00:59
Static task
static1
Behavioral task
behavioral1
Sample
228109f448e66556b0b5e7ecc0e3461f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
228109f448e66556b0b5e7ecc0e3461f_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
228109f448e66556b0b5e7ecc0e3461f_JaffaCakes118.html
-
Size
67KB
-
MD5
228109f448e66556b0b5e7ecc0e3461f
-
SHA1
ce0b84311e9415173ccca52c5c62284dbdf9e907
-
SHA256
fee2850f6aa36b7bbe437553ee61f1207ada58f03d9fff96170fbd72e2ecd597
-
SHA512
52d7d78c012cf5554e380a806e60066f5e51e6a2a88a7890cd30e91f849942b69e3f9bd1037eee199af2478738080a59a6b7295210067353faa12e3f49b94cb3
-
SSDEEP
768:JihLgcMsSZ8tN99OIsEYsf1VJboTyfQCZkoTnMdtbBnfBgN8/oygcR/QFVG8c//L:JQEWZfuTePec0tbrga6cuNnzIjv
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4852 msedge.exe 4852 msedge.exe 4580 msedge.exe 4580 msedge.exe 4592 identity_helper.exe 4592 identity_helper.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4580 wrote to memory of 1528 4580 msedge.exe 84 PID 4580 wrote to memory of 1528 4580 msedge.exe 84 PID 4580 wrote to memory of 1784 4580 msedge.exe 85 PID 4580 wrote to memory of 1784 4580 msedge.exe 85 PID 4580 wrote to memory of 1784 4580 msedge.exe 85 PID 4580 wrote to memory of 1784 4580 msedge.exe 85 PID 4580 wrote to memory of 1784 4580 msedge.exe 85 PID 4580 wrote to memory of 1784 4580 msedge.exe 85 PID 4580 wrote to memory of 1784 4580 msedge.exe 85 PID 4580 wrote to memory of 1784 4580 msedge.exe 85 PID 4580 wrote to memory of 1784 4580 msedge.exe 85 PID 4580 wrote to memory of 1784 4580 msedge.exe 85 PID 4580 wrote to memory of 1784 4580 msedge.exe 85 PID 4580 wrote to memory of 1784 4580 msedge.exe 85 PID 4580 wrote to memory of 1784 4580 msedge.exe 85 PID 4580 wrote to memory of 1784 4580 msedge.exe 85 PID 4580 wrote to memory of 1784 4580 msedge.exe 85 PID 4580 wrote to memory of 1784 4580 msedge.exe 85 PID 4580 wrote to memory of 1784 4580 msedge.exe 85 PID 4580 wrote to memory of 1784 4580 msedge.exe 85 PID 4580 wrote to memory of 1784 4580 msedge.exe 85 PID 4580 wrote to memory of 1784 4580 msedge.exe 85 PID 4580 wrote to memory of 1784 4580 msedge.exe 85 PID 4580 wrote to memory of 1784 4580 msedge.exe 85 PID 4580 wrote to memory of 1784 4580 msedge.exe 85 PID 4580 wrote to memory of 1784 4580 msedge.exe 85 PID 4580 wrote to memory of 1784 4580 msedge.exe 85 PID 4580 wrote to memory of 1784 4580 msedge.exe 85 PID 4580 wrote to memory of 1784 4580 msedge.exe 85 PID 4580 wrote to memory of 1784 4580 msedge.exe 85 PID 4580 wrote to memory of 1784 4580 msedge.exe 85 PID 4580 wrote to memory of 1784 4580 msedge.exe 85 PID 4580 wrote to memory of 1784 4580 msedge.exe 85 PID 4580 wrote to memory of 1784 4580 msedge.exe 85 PID 4580 wrote to memory of 1784 4580 msedge.exe 85 PID 4580 wrote to memory of 1784 4580 msedge.exe 85 PID 4580 wrote to memory of 1784 4580 msedge.exe 85 PID 4580 wrote to memory of 1784 4580 msedge.exe 85 PID 4580 wrote to memory of 1784 4580 msedge.exe 85 PID 4580 wrote to memory of 1784 4580 msedge.exe 85 PID 4580 wrote to memory of 1784 4580 msedge.exe 85 PID 4580 wrote to memory of 1784 4580 msedge.exe 85 PID 4580 wrote to memory of 4852 4580 msedge.exe 86 PID 4580 wrote to memory of 4852 4580 msedge.exe 86 PID 4580 wrote to memory of 4024 4580 msedge.exe 87 PID 4580 wrote to memory of 4024 4580 msedge.exe 87 PID 4580 wrote to memory of 4024 4580 msedge.exe 87 PID 4580 wrote to memory of 4024 4580 msedge.exe 87 PID 4580 wrote to memory of 4024 4580 msedge.exe 87 PID 4580 wrote to memory of 4024 4580 msedge.exe 87 PID 4580 wrote to memory of 4024 4580 msedge.exe 87 PID 4580 wrote to memory of 4024 4580 msedge.exe 87 PID 4580 wrote to memory of 4024 4580 msedge.exe 87 PID 4580 wrote to memory of 4024 4580 msedge.exe 87 PID 4580 wrote to memory of 4024 4580 msedge.exe 87 PID 4580 wrote to memory of 4024 4580 msedge.exe 87 PID 4580 wrote to memory of 4024 4580 msedge.exe 87 PID 4580 wrote to memory of 4024 4580 msedge.exe 87 PID 4580 wrote to memory of 4024 4580 msedge.exe 87 PID 4580 wrote to memory of 4024 4580 msedge.exe 87 PID 4580 wrote to memory of 4024 4580 msedge.exe 87 PID 4580 wrote to memory of 4024 4580 msedge.exe 87 PID 4580 wrote to memory of 4024 4580 msedge.exe 87 PID 4580 wrote to memory of 4024 4580 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\228109f448e66556b0b5e7ecc0e3461f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff6d6446f8,0x7fff6d644708,0x7fff6d6447182⤵PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,16615003611661511667,9114405420079521947,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2184,16615003611661511667,9114405420079521947,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2184,16615003611661511667,9114405420079521947,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2648 /prefetch:82⤵PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,16615003611661511667,9114405420079521947,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,16615003611661511667,9114405420079521947,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,16615003611661511667,9114405420079521947,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 /prefetch:82⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,16615003611661511667,9114405420079521947,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,16615003611661511667,9114405420079521947,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,16615003611661511667,9114405420079521947,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,16615003611661511667,9114405420079521947,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4556 /prefetch:12⤵PID:2040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,16615003611661511667,9114405420079521947,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,16615003611661511667,9114405420079521947,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3204 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1020
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:776
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\8ae93cd8-7a51-4527-abb9-8a6dfbe7abeb.tmp
Filesize5KB
MD51d53e6f62221ced0ff9bf22e68abe122
SHA1da50d9aaa4a3de6870af6bea406c6eac0ece3692
SHA2568c70580afd6c715f2123ba5214825c2b744d1f0752a91ddaa1960a2b2d1e9b6d
SHA512eca49d090dc2194f94e722893a8eee7cccc359888086226719ad9bd810724f0544fe171b5e549ba1784d264cd3878e0ac4083952141db7a55ce7e6fa634d2d85
-
Filesize
6KB
MD59b4f304a83bb22622154e3f7e2531bbc
SHA1603a4145136e09052c403aecb8e8f6af1026002d
SHA2569e509890742c6e13a7a502e74dbaf68759cc2d3ff1ad1289eccafbf5990d2b9a
SHA5125fec9366c9c028b3a5d699473c61062cc1ebff5a961e31d89d3db34b57f212fb03c346933b0a99cfbf94435603c0ba74823e68233c3459750f75fbaeb4f4b61c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD55df93de3138b514e0c983fe59e0bed56
SHA1b59195f52388d7261373fe341f5beb4ce59d199e
SHA2565b5231d5e0db5be5e1d0e2a6a0990c6849547a5e138decb4df208f5b796461fe
SHA512efa70192cc921391233fc003e76001d91124a4b01c6a8153edc376f262c43266f19f6550523064ea4001b51339b5718a585406d91be7e4f70c8544a700127376