Analysis
-
max time kernel
135s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 09:38
Static task
static1
Behavioral task
behavioral1
Sample
244142b9464469146b79dba9f9a8d631_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
244142b9464469146b79dba9f9a8d631_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
244142b9464469146b79dba9f9a8d631_JaffaCakes118.html
-
Size
3KB
-
MD5
244142b9464469146b79dba9f9a8d631
-
SHA1
8270b2cc31dcc2c3b7992ce447b75b4fa2273795
-
SHA256
971e06ea8e402544b745f31e1bccf8dc58f63283d91801678297d537f3503101
-
SHA512
c4129e6866d0bf5c9e87b06765a79dfbda0ea983adcaa30cfcb6629539bce749c62e39a4396fe5984e2a2b074b3fb27bb7de46ba0159efb1bb6a87c71b095974
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4420 msedge.exe 4420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3540 identity_helper.exe 3540 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3420 wrote to memory of 2092 3420 msedge.exe 84 PID 3420 wrote to memory of 2092 3420 msedge.exe 84 PID 3420 wrote to memory of 4480 3420 msedge.exe 85 PID 3420 wrote to memory of 4480 3420 msedge.exe 85 PID 3420 wrote to memory of 4480 3420 msedge.exe 85 PID 3420 wrote to memory of 4480 3420 msedge.exe 85 PID 3420 wrote to memory of 4480 3420 msedge.exe 85 PID 3420 wrote to memory of 4480 3420 msedge.exe 85 PID 3420 wrote to memory of 4480 3420 msedge.exe 85 PID 3420 wrote to memory of 4480 3420 msedge.exe 85 PID 3420 wrote to memory of 4480 3420 msedge.exe 85 PID 3420 wrote to memory of 4480 3420 msedge.exe 85 PID 3420 wrote to memory of 4480 3420 msedge.exe 85 PID 3420 wrote to memory of 4480 3420 msedge.exe 85 PID 3420 wrote to memory of 4480 3420 msedge.exe 85 PID 3420 wrote to memory of 4480 3420 msedge.exe 85 PID 3420 wrote to memory of 4480 3420 msedge.exe 85 PID 3420 wrote to memory of 4480 3420 msedge.exe 85 PID 3420 wrote to memory of 4480 3420 msedge.exe 85 PID 3420 wrote to memory of 4480 3420 msedge.exe 85 PID 3420 wrote to memory of 4480 3420 msedge.exe 85 PID 3420 wrote to memory of 4480 3420 msedge.exe 85 PID 3420 wrote to memory of 4480 3420 msedge.exe 85 PID 3420 wrote to memory of 4480 3420 msedge.exe 85 PID 3420 wrote to memory of 4480 3420 msedge.exe 85 PID 3420 wrote to memory of 4480 3420 msedge.exe 85 PID 3420 wrote to memory of 4480 3420 msedge.exe 85 PID 3420 wrote to memory of 4480 3420 msedge.exe 85 PID 3420 wrote to memory of 4480 3420 msedge.exe 85 PID 3420 wrote to memory of 4480 3420 msedge.exe 85 PID 3420 wrote to memory of 4480 3420 msedge.exe 85 PID 3420 wrote to memory of 4480 3420 msedge.exe 85 PID 3420 wrote to memory of 4480 3420 msedge.exe 85 PID 3420 wrote to memory of 4480 3420 msedge.exe 85 PID 3420 wrote to memory of 4480 3420 msedge.exe 85 PID 3420 wrote to memory of 4480 3420 msedge.exe 85 PID 3420 wrote to memory of 4480 3420 msedge.exe 85 PID 3420 wrote to memory of 4480 3420 msedge.exe 85 PID 3420 wrote to memory of 4480 3420 msedge.exe 85 PID 3420 wrote to memory of 4480 3420 msedge.exe 85 PID 3420 wrote to memory of 4480 3420 msedge.exe 85 PID 3420 wrote to memory of 4480 3420 msedge.exe 85 PID 3420 wrote to memory of 4420 3420 msedge.exe 86 PID 3420 wrote to memory of 4420 3420 msedge.exe 86 PID 3420 wrote to memory of 4388 3420 msedge.exe 87 PID 3420 wrote to memory of 4388 3420 msedge.exe 87 PID 3420 wrote to memory of 4388 3420 msedge.exe 87 PID 3420 wrote to memory of 4388 3420 msedge.exe 87 PID 3420 wrote to memory of 4388 3420 msedge.exe 87 PID 3420 wrote to memory of 4388 3420 msedge.exe 87 PID 3420 wrote to memory of 4388 3420 msedge.exe 87 PID 3420 wrote to memory of 4388 3420 msedge.exe 87 PID 3420 wrote to memory of 4388 3420 msedge.exe 87 PID 3420 wrote to memory of 4388 3420 msedge.exe 87 PID 3420 wrote to memory of 4388 3420 msedge.exe 87 PID 3420 wrote to memory of 4388 3420 msedge.exe 87 PID 3420 wrote to memory of 4388 3420 msedge.exe 87 PID 3420 wrote to memory of 4388 3420 msedge.exe 87 PID 3420 wrote to memory of 4388 3420 msedge.exe 87 PID 3420 wrote to memory of 4388 3420 msedge.exe 87 PID 3420 wrote to memory of 4388 3420 msedge.exe 87 PID 3420 wrote to memory of 4388 3420 msedge.exe 87 PID 3420 wrote to memory of 4388 3420 msedge.exe 87 PID 3420 wrote to memory of 4388 3420 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\244142b9464469146b79dba9f9a8d631_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd919f46f8,0x7ffd919f4708,0x7ffd919f47182⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1888,4084858956352530032,3575378766304771217,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1892 /prefetch:22⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1888,4084858956352530032,3575378766304771217,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2600 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1888,4084858956352530032,3575378766304771217,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,4084858956352530032,3575378766304771217,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,4084858956352530032,3575378766304771217,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1888,4084858956352530032,3575378766304771217,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1888,4084858956352530032,3575378766304771217,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,4084858956352530032,3575378766304771217,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,4084858956352530032,3575378766304771217,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,4084858956352530032,3575378766304771217,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,4084858956352530032,3575378766304771217,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,4084858956352530032,3575378766304771217,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,4084858956352530032,3575378766304771217,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3924 /prefetch:12⤵PID:636
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3932
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3188
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
Filesize
264KB
MD57d1fb333b561156c84cdc79b5c396841
SHA180205d9e09b73fb2e997621350c2cd8e75c6c72f
SHA256e64b59322f45b0912c349c90ed5a2ae8c5dcbfe4318bfd49c9dec16cd7d1ff46
SHA512c15234df8325d6d03f93c3af3f8b0e739f2e08c1d073cb4e92ff15fc59dc3acce4097b2c133df88903e16f2cbaae7153d855e47c61d00b3052bfd95043e12fd8
-
Filesize
185B
MD516e81634c717cb5947ed9aa070ddc2b7
SHA1022d7f21c91255339bc19c6da4bf31ab2ba0dab8
SHA2566f1a26fc5ffafc2290377b138faf803ebe1c9456aaba65232d89509fd750a29e
SHA512558affbcfc751a0b49af4aa9327b2cc8d1b51b1a9f1fe0591a70a1c7d29e5c8ed323d4db9bf804dcd4d2cc01eef27f0e4ec26cbdf7eb770ef11d98be213a924d
-
Filesize
5KB
MD5b572a8ca19731aeb4885d566aa31de13
SHA10935729f85dff761f3357e53f177e466fe21a7cd
SHA25660b2bec4708a50fd6954f43c5f64453e521656b04ea5a08ad467f213f43f14c7
SHA5127c14eea06c7d5dbfad0e5c7b17fa2b5a4d42ade35d42a9db0999a3c50359cf2798148c0fd9436b9b1ba3327dd620b87bde5cb7a75f7cd5bba9535926f0a51aa0
-
Filesize
6KB
MD59fee303f677ac46fbf42cc5899b73482
SHA191510816979b8c3dd9b351988321c26de96a6d73
SHA2560ef2fd6e21044f5799c7f474801b4f10668cb2d6e97a87980fb391ae8588133d
SHA51286f346fb0db8878327342da8b6c4f7c057e0be6bc98a4a30b10d1ab3db55b7f314601222c97796c63d971cdb14b58ad0a44cfc47401bee8db98660af987d3705
-
Filesize
6KB
MD53debe6e669ed44bd91e6d45893fe3a53
SHA14dbfe87ad15415e5726a79eda318e931eea6a61a
SHA256266c9794ed900cb9942cf0160da57cedd7b18723f056b311766380752c9d4b11
SHA51265984115ddf98c3abac0b4a52acd5a77bf89bc5f24cb59ec12933cbd9cac010bc9af70b76f37d58e8513f62f11171fec433d5a87c713ab402b1cd0a4890bcf4c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b7e75081a4c42b00f3826cf70b219598
SHA17460c46bebee5aeaaaefe391414908a814bd01e9
SHA256b3ef2590ff2983a44fb183be68c3e98021fc88aa3ef5e2c749165d24cf8cc7f4
SHA512fecd70c658dc26355ca5d349f41760508379957a643f8cfc07face9a3dbcdba3b4a01ed712d11b887394e02dcd0cb76ec059b22473f51882f0cdb5abbfca4f08
-
Filesize
12KB
MD58489789be509e0a1c041fe6ddb4204d4
SHA1bb815458c88df23ce4d1ad44481a25c536dba7cb
SHA2564828450967336c2e1eefe0a606ca61302ac0cc26a834fb52c1e7ce2a7bed1412
SHA512a7c4464b8ec898e0a507eb1aab9ffdd2ab316c85ad4994e4e81ba2ad0d275a7d392fbeb80e607d60cff8ca19bf6247068f49ed9ba85a6071ea41ec2960278c30