Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 05:45
Static task
static1
Behavioral task
behavioral1
Sample
23751069fd43f099ddfd1bc063e6b572_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
23751069fd43f099ddfd1bc063e6b572_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
23751069fd43f099ddfd1bc063e6b572_JaffaCakes118.html
-
Size
46KB
-
MD5
23751069fd43f099ddfd1bc063e6b572
-
SHA1
afdeb8e6fef73220f2b4cd3e481923cbc7de51ed
-
SHA256
691381c9e7ea0f531cace02bc0ca9e9fd51f1f43addd87c2d5baaaf4c2d5924d
-
SHA512
e4c214c7eb686e46ea66ee0eb6b3d9833d1bbdff762d89f66a8fa66eee062891139e3bad01c13c0b6dd0cf4353e33f0cae2b1d7df954ddcd003a2e43c664ec73
-
SSDEEP
384:sqNcCt0Tn2ODsFYejFE3tHaajexVzb04JAaEaupn4xPTudYSXjV3N:WV64pepE3tHPIAaERC0YCb
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2360 msedge.exe 2360 msedge.exe 664 msedge.exe 664 msedge.exe 672 identity_helper.exe 672 identity_helper.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 664 wrote to memory of 4136 664 msedge.exe 84 PID 664 wrote to memory of 4136 664 msedge.exe 84 PID 664 wrote to memory of 2472 664 msedge.exe 87 PID 664 wrote to memory of 2472 664 msedge.exe 87 PID 664 wrote to memory of 2472 664 msedge.exe 87 PID 664 wrote to memory of 2472 664 msedge.exe 87 PID 664 wrote to memory of 2472 664 msedge.exe 87 PID 664 wrote to memory of 2472 664 msedge.exe 87 PID 664 wrote to memory of 2472 664 msedge.exe 87 PID 664 wrote to memory of 2472 664 msedge.exe 87 PID 664 wrote to memory of 2472 664 msedge.exe 87 PID 664 wrote to memory of 2472 664 msedge.exe 87 PID 664 wrote to memory of 2472 664 msedge.exe 87 PID 664 wrote to memory of 2472 664 msedge.exe 87 PID 664 wrote to memory of 2472 664 msedge.exe 87 PID 664 wrote to memory of 2472 664 msedge.exe 87 PID 664 wrote to memory of 2472 664 msedge.exe 87 PID 664 wrote to memory of 2472 664 msedge.exe 87 PID 664 wrote to memory of 2472 664 msedge.exe 87 PID 664 wrote to memory of 2472 664 msedge.exe 87 PID 664 wrote to memory of 2472 664 msedge.exe 87 PID 664 wrote to memory of 2472 664 msedge.exe 87 PID 664 wrote to memory of 2472 664 msedge.exe 87 PID 664 wrote to memory of 2472 664 msedge.exe 87 PID 664 wrote to memory of 2472 664 msedge.exe 87 PID 664 wrote to memory of 2472 664 msedge.exe 87 PID 664 wrote to memory of 2472 664 msedge.exe 87 PID 664 wrote to memory of 2472 664 msedge.exe 87 PID 664 wrote to memory of 2472 664 msedge.exe 87 PID 664 wrote to memory of 2472 664 msedge.exe 87 PID 664 wrote to memory of 2472 664 msedge.exe 87 PID 664 wrote to memory of 2472 664 msedge.exe 87 PID 664 wrote to memory of 2472 664 msedge.exe 87 PID 664 wrote to memory of 2472 664 msedge.exe 87 PID 664 wrote to memory of 2472 664 msedge.exe 87 PID 664 wrote to memory of 2472 664 msedge.exe 87 PID 664 wrote to memory of 2472 664 msedge.exe 87 PID 664 wrote to memory of 2472 664 msedge.exe 87 PID 664 wrote to memory of 2472 664 msedge.exe 87 PID 664 wrote to memory of 2472 664 msedge.exe 87 PID 664 wrote to memory of 2472 664 msedge.exe 87 PID 664 wrote to memory of 2472 664 msedge.exe 87 PID 664 wrote to memory of 2360 664 msedge.exe 88 PID 664 wrote to memory of 2360 664 msedge.exe 88 PID 664 wrote to memory of 2920 664 msedge.exe 89 PID 664 wrote to memory of 2920 664 msedge.exe 89 PID 664 wrote to memory of 2920 664 msedge.exe 89 PID 664 wrote to memory of 2920 664 msedge.exe 89 PID 664 wrote to memory of 2920 664 msedge.exe 89 PID 664 wrote to memory of 2920 664 msedge.exe 89 PID 664 wrote to memory of 2920 664 msedge.exe 89 PID 664 wrote to memory of 2920 664 msedge.exe 89 PID 664 wrote to memory of 2920 664 msedge.exe 89 PID 664 wrote to memory of 2920 664 msedge.exe 89 PID 664 wrote to memory of 2920 664 msedge.exe 89 PID 664 wrote to memory of 2920 664 msedge.exe 89 PID 664 wrote to memory of 2920 664 msedge.exe 89 PID 664 wrote to memory of 2920 664 msedge.exe 89 PID 664 wrote to memory of 2920 664 msedge.exe 89 PID 664 wrote to memory of 2920 664 msedge.exe 89 PID 664 wrote to memory of 2920 664 msedge.exe 89 PID 664 wrote to memory of 2920 664 msedge.exe 89 PID 664 wrote to memory of 2920 664 msedge.exe 89 PID 664 wrote to memory of 2920 664 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\23751069fd43f099ddfd1bc063e6b572_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffe0af46f8,0x7fffe0af4708,0x7fffe0af47182⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,18315892108413558814,10625959321757847837,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:2472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,18315892108413558814,10625959321757847837,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,18315892108413558814,10625959321757847837,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2632 /prefetch:82⤵PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,18315892108413558814,10625959321757847837,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,18315892108413558814,10625959321757847837,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,18315892108413558814,10625959321757847837,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:2304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,18315892108413558814,10625959321757847837,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:12⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,18315892108413558814,10625959321757847837,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,18315892108413558814,10625959321757847837,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6020 /prefetch:82⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,18315892108413558814,10625959321757847837,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6020 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,18315892108413558814,10625959321757847837,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:1316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,18315892108413558814,10625959321757847837,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,18315892108413558814,10625959321757847837,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6004 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4528
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5116
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dbac49e66219979194c79f1cf1cb3dd1
SHA14ef87804a04d51ae1fac358f92382548b27f62f2
SHA256f24ed6c5bf4b734a9af4d64e14a80a160bea569f50849f70bf7b7277c4f48562
SHA512bb314d61f53cf7774f6dfb6b772c72f5daf386bc3d27d2bb7a14c65848ee86e6c48e9c5696693ded31846b69b9372a530175df48494e3d61a228e49d43401ad1
-
Filesize
152B
MD5a9e55f5864d6e2afd2fd84e25a3bc228
SHA1a5efcff9e3df6252c7fe8535d505235f82aab276
SHA2560f4df3120e4620555916be8e51c29be8d600d68ae5244efad6a0268aabc8c452
SHA51212f45fa73a6de6dfe17acc8b52b60f2d79008da130730b74cc138c1dcd73ccc99487165e3c8c90dc247359fde272f1ec6b3cf2c5fcb04e5093936144d0558b75
-
Filesize
668B
MD5e9c8a5512bac9034ef88eed8cbe9df71
SHA110efce0c3d67516e72d5fef3382c0a323c8a32bf
SHA25643803584c7ef57ff2e197324ac9fa8fd4ecd3ee9365a35a74955426612e9bdd5
SHA512d38fdc15f33f5cdc160c01e68487f3d976cd5cfacbc2a46347c25ab7f69c1be82f7a1d56db3dcc5872ea4bcd57704c67f1ed4ca2a14e5a1fed86ca7dcb961004
-
Filesize
5KB
MD58bf975bfe53c9bd06494f1ed704d65de
SHA121350376aa2b5f17cbcdbe9d67f46866a23fc6e7
SHA2562cb33b2df5793d3ce94ac2b02198478c30a6670b537beadac5c97c60f828bfe0
SHA512b3c79d572e356781803540eeaf9c84e82aee5a0cea362c756025558aaa3b55ee989034a1210a0aee5a17358447296fa55cf951538336b1f3318df11c88552230
-
Filesize
6KB
MD55cbe769ac10cc5392c7bed440d49d071
SHA1d9cc80465f6fa3c6a6eef6fe6ee666745741047f
SHA256f78e695568b71ce902c0d424464ca90b34e0dd1cc2555d0bb1d3d2ad1b4fdaf7
SHA5125e62762eb5e20438d6e687600bde233f1a2f81be4b4f7cd7870d3e0273eea2b85af705aeebac6d375a9c669f6697989fd00ea6bd4e990e4bd9dee3f9057be28b
-
Filesize
6KB
MD560ccfe3da88f308d2269e4f5399d3521
SHA189d370c039e544243ffef0d91c9cf68221d750b6
SHA256bbd8bfc373d9064bf0fd988e1216e6f300b295ee82dbb8938520b9860dd6d853
SHA51295d64bf7354bfd5a0c1320ac0e80934c6f30f4de8507c1b3f90ee16ab4b49d75b8636a4a16da733e7effac16be32d67a4efd325ad83805aac533b94465545c61
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5cd430b177ecb12ad355160691f6fafeb
SHA16cba491048e93b298e6ed8b4567d1f49335138f0
SHA256d0336aee3f5f6bcfaccf98cc3af43bee510542d936e1ead8324b993b1e1c0368
SHA512e0d7c0ce94d7cd7ba3d6f691f263be32ce3c10b9da7753367ce75cfbd7bfa5de9c8f86fece30bf7e0a850158566a3330e4e18ab8e92b6dafa16f248a5d545352