Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 05:58
Static task
static1
Behavioral task
behavioral1
Sample
23813bd39a20867374d1ef93329b509c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
23813bd39a20867374d1ef93329b509c_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
23813bd39a20867374d1ef93329b509c_JaffaCakes118.html
-
Size
12KB
-
MD5
23813bd39a20867374d1ef93329b509c
-
SHA1
089df8a69a00ed3d63856385933ee44d68105095
-
SHA256
ebd2fc226c8db518fe03f7b4106a77a7c9615ab154ab331bcf35c26547e2830f
-
SHA512
a61de6fb4e2325fa7a408b0ce0b097a8b8b60a09c31e5238b9f56cbcf2ba56b3bece2d4a9eb644b8016472158354f5b4fd9f4edb2f04d46387fa533f7f9eb540
-
SSDEEP
192:Q0/DvZCciZkiZk0/eq1R5wrxT3LId7uK4vC8zPFMKMEuFN6Bo0f:BtCuiZk0/eY7wNv1z9xMEuFNp0f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3300 msedge.exe 3300 msedge.exe 4152 msedge.exe 4152 msedge.exe 5012 identity_helper.exe 5012 identity_helper.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4152 wrote to memory of 592 4152 msedge.exe 83 PID 4152 wrote to memory of 592 4152 msedge.exe 83 PID 4152 wrote to memory of 3004 4152 msedge.exe 84 PID 4152 wrote to memory of 3004 4152 msedge.exe 84 PID 4152 wrote to memory of 3004 4152 msedge.exe 84 PID 4152 wrote to memory of 3004 4152 msedge.exe 84 PID 4152 wrote to memory of 3004 4152 msedge.exe 84 PID 4152 wrote to memory of 3004 4152 msedge.exe 84 PID 4152 wrote to memory of 3004 4152 msedge.exe 84 PID 4152 wrote to memory of 3004 4152 msedge.exe 84 PID 4152 wrote to memory of 3004 4152 msedge.exe 84 PID 4152 wrote to memory of 3004 4152 msedge.exe 84 PID 4152 wrote to memory of 3004 4152 msedge.exe 84 PID 4152 wrote to memory of 3004 4152 msedge.exe 84 PID 4152 wrote to memory of 3004 4152 msedge.exe 84 PID 4152 wrote to memory of 3004 4152 msedge.exe 84 PID 4152 wrote to memory of 3004 4152 msedge.exe 84 PID 4152 wrote to memory of 3004 4152 msedge.exe 84 PID 4152 wrote to memory of 3004 4152 msedge.exe 84 PID 4152 wrote to memory of 3004 4152 msedge.exe 84 PID 4152 wrote to memory of 3004 4152 msedge.exe 84 PID 4152 wrote to memory of 3004 4152 msedge.exe 84 PID 4152 wrote to memory of 3004 4152 msedge.exe 84 PID 4152 wrote to memory of 3004 4152 msedge.exe 84 PID 4152 wrote to memory of 3004 4152 msedge.exe 84 PID 4152 wrote to memory of 3004 4152 msedge.exe 84 PID 4152 wrote to memory of 3004 4152 msedge.exe 84 PID 4152 wrote to memory of 3004 4152 msedge.exe 84 PID 4152 wrote to memory of 3004 4152 msedge.exe 84 PID 4152 wrote to memory of 3004 4152 msedge.exe 84 PID 4152 wrote to memory of 3004 4152 msedge.exe 84 PID 4152 wrote to memory of 3004 4152 msedge.exe 84 PID 4152 wrote to memory of 3004 4152 msedge.exe 84 PID 4152 wrote to memory of 3004 4152 msedge.exe 84 PID 4152 wrote to memory of 3004 4152 msedge.exe 84 PID 4152 wrote to memory of 3004 4152 msedge.exe 84 PID 4152 wrote to memory of 3004 4152 msedge.exe 84 PID 4152 wrote to memory of 3004 4152 msedge.exe 84 PID 4152 wrote to memory of 3004 4152 msedge.exe 84 PID 4152 wrote to memory of 3004 4152 msedge.exe 84 PID 4152 wrote to memory of 3004 4152 msedge.exe 84 PID 4152 wrote to memory of 3004 4152 msedge.exe 84 PID 4152 wrote to memory of 3300 4152 msedge.exe 85 PID 4152 wrote to memory of 3300 4152 msedge.exe 85 PID 4152 wrote to memory of 1240 4152 msedge.exe 86 PID 4152 wrote to memory of 1240 4152 msedge.exe 86 PID 4152 wrote to memory of 1240 4152 msedge.exe 86 PID 4152 wrote to memory of 1240 4152 msedge.exe 86 PID 4152 wrote to memory of 1240 4152 msedge.exe 86 PID 4152 wrote to memory of 1240 4152 msedge.exe 86 PID 4152 wrote to memory of 1240 4152 msedge.exe 86 PID 4152 wrote to memory of 1240 4152 msedge.exe 86 PID 4152 wrote to memory of 1240 4152 msedge.exe 86 PID 4152 wrote to memory of 1240 4152 msedge.exe 86 PID 4152 wrote to memory of 1240 4152 msedge.exe 86 PID 4152 wrote to memory of 1240 4152 msedge.exe 86 PID 4152 wrote to memory of 1240 4152 msedge.exe 86 PID 4152 wrote to memory of 1240 4152 msedge.exe 86 PID 4152 wrote to memory of 1240 4152 msedge.exe 86 PID 4152 wrote to memory of 1240 4152 msedge.exe 86 PID 4152 wrote to memory of 1240 4152 msedge.exe 86 PID 4152 wrote to memory of 1240 4152 msedge.exe 86 PID 4152 wrote to memory of 1240 4152 msedge.exe 86 PID 4152 wrote to memory of 1240 4152 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\23813bd39a20867374d1ef93329b509c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc0db446f8,0x7ffc0db44708,0x7ffc0db447182⤵PID:592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,9156919502132917827,2734866712459684204,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,9156919502132917827,2734866712459684204,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,9156919502132917827,2734866712459684204,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:1240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,9156919502132917827,2734866712459684204,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,9156919502132917827,2734866712459684204,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:3364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,9156919502132917827,2734866712459684204,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:82⤵PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,9156919502132917827,2734866712459684204,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,9156919502132917827,2734866712459684204,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3968 /prefetch:12⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,9156919502132917827,2734866712459684204,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,9156919502132917827,2734866712459684204,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,9156919502132917827,2734866712459684204,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:12⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,9156919502132917827,2734866712459684204,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4988 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2012
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2516
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4784
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dbac49e66219979194c79f1cf1cb3dd1
SHA14ef87804a04d51ae1fac358f92382548b27f62f2
SHA256f24ed6c5bf4b734a9af4d64e14a80a160bea569f50849f70bf7b7277c4f48562
SHA512bb314d61f53cf7774f6dfb6b772c72f5daf386bc3d27d2bb7a14c65848ee86e6c48e9c5696693ded31846b69b9372a530175df48494e3d61a228e49d43401ad1
-
Filesize
152B
MD5a9e55f5864d6e2afd2fd84e25a3bc228
SHA1a5efcff9e3df6252c7fe8535d505235f82aab276
SHA2560f4df3120e4620555916be8e51c29be8d600d68ae5244efad6a0268aabc8c452
SHA51212f45fa73a6de6dfe17acc8b52b60f2d79008da130730b74cc138c1dcd73ccc99487165e3c8c90dc247359fde272f1ec6b3cf2c5fcb04e5093936144d0558b75
-
Filesize
5KB
MD5674ee0861ad94f0c47db55e078803903
SHA1817321e9e48ddece40266dc7b6a32e393497f675
SHA25666113c4249c8e43402eebe34f8d275895fc7622269b95ea67061e9c599fc90ac
SHA512a94ae7c1ca1fd833c4d692dc1796c2d6e962b97f1a23012d9022a123d77a49af4b4a9187a6e43e7ea86357f0ddb8903d6a78d4d4e149857e7933a60ce975365a
-
Filesize
6KB
MD5608652230218c9e4fed8a18bf3a66941
SHA1a41cfa6845fb4aa1118ee68769a3986a9d1d3227
SHA2563966d408d84e0c6b2e20be7104c18a5ae518b214581d45018c207c00c9001dfd
SHA5128ecfaaf56e5f802e63ed7f83513e7808aa947ca2328d6a8ea4431ad8cf22805de97669b6df9c81ba4c261654a543589ba41b48111b8e8ebdb405cab068b8443f
-
Filesize
6KB
MD52fd7790a999475cd3611ac11c111e3de
SHA1bd5ff97912acbe6d29650ea8e2043e1fb4b883c9
SHA25696569733297a65c496008e2a2851c638ed7e2814f5d80b6479b1b9b41729169a
SHA5124b952490776b73ea512a1b4e54de57def5df3bc02275fdca1e496c13cf783a5f24c3503f4254f9a92163c6d148a9e7ac4a13dbbe7627126a0c559b152cd51aec
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f298b6911e299cdb83d7cb68b7989025
SHA10ef906cee1e57946887a8fe2f5218f7c9ea38d43
SHA256d5fcd8e5a77f3656ebcfd92b28ed1e6211f4b25fb923c33605bd3988f2478f7e
SHA51239c438046711d395f0304fb9ebc524bfc9e15834c7b363ee8482d4843f4591762e5b19e0f5645a2f49f4f96ad5560dacea13bf68b1076529bd7c0e9ca807df0e