Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 22:42
Static task
static1
Behavioral task
behavioral1
Sample
3166ccb9e36f22f17882b2e34803a270_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3166ccb9e36f22f17882b2e34803a270_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3166ccb9e36f22f17882b2e34803a270_JaffaCakes118.html
-
Size
31KB
-
MD5
3166ccb9e36f22f17882b2e34803a270
-
SHA1
c159163a77d933787c6be96ec8f0a8440d6d6794
-
SHA256
60fb98c58442192224dd2f5762e2fb8d77b99d49453071496a2b5f92a6122b83
-
SHA512
5a888a31b0390c6b0d29b6178b7fb42cc1345a8e2c8ed80ea70b3451c338c33b07947617741e41d170ff8bc93b389117b5636f14713239ce1698bbcd4b86f7e0
-
SSDEEP
768:ShLN/H6R/AA4iTDw+/YD/mADEKY4eQIkQO7WhGK2s:Shl6R/AA4iTDw+/YD/mADDY4eGV7WhGu
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4304 msedge.exe 4304 msedge.exe 3128 msedge.exe 3128 msedge.exe 2024 identity_helper.exe 2024 identity_helper.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3128 wrote to memory of 3016 3128 msedge.exe 82 PID 3128 wrote to memory of 3016 3128 msedge.exe 82 PID 3128 wrote to memory of 4364 3128 msedge.exe 83 PID 3128 wrote to memory of 4364 3128 msedge.exe 83 PID 3128 wrote to memory of 4364 3128 msedge.exe 83 PID 3128 wrote to memory of 4364 3128 msedge.exe 83 PID 3128 wrote to memory of 4364 3128 msedge.exe 83 PID 3128 wrote to memory of 4364 3128 msedge.exe 83 PID 3128 wrote to memory of 4364 3128 msedge.exe 83 PID 3128 wrote to memory of 4364 3128 msedge.exe 83 PID 3128 wrote to memory of 4364 3128 msedge.exe 83 PID 3128 wrote to memory of 4364 3128 msedge.exe 83 PID 3128 wrote to memory of 4364 3128 msedge.exe 83 PID 3128 wrote to memory of 4364 3128 msedge.exe 83 PID 3128 wrote to memory of 4364 3128 msedge.exe 83 PID 3128 wrote to memory of 4364 3128 msedge.exe 83 PID 3128 wrote to memory of 4364 3128 msedge.exe 83 PID 3128 wrote to memory of 4364 3128 msedge.exe 83 PID 3128 wrote to memory of 4364 3128 msedge.exe 83 PID 3128 wrote to memory of 4364 3128 msedge.exe 83 PID 3128 wrote to memory of 4364 3128 msedge.exe 83 PID 3128 wrote to memory of 4364 3128 msedge.exe 83 PID 3128 wrote to memory of 4364 3128 msedge.exe 83 PID 3128 wrote to memory of 4364 3128 msedge.exe 83 PID 3128 wrote to memory of 4364 3128 msedge.exe 83 PID 3128 wrote to memory of 4364 3128 msedge.exe 83 PID 3128 wrote to memory of 4364 3128 msedge.exe 83 PID 3128 wrote to memory of 4364 3128 msedge.exe 83 PID 3128 wrote to memory of 4364 3128 msedge.exe 83 PID 3128 wrote to memory of 4364 3128 msedge.exe 83 PID 3128 wrote to memory of 4364 3128 msedge.exe 83 PID 3128 wrote to memory of 4364 3128 msedge.exe 83 PID 3128 wrote to memory of 4364 3128 msedge.exe 83 PID 3128 wrote to memory of 4364 3128 msedge.exe 83 PID 3128 wrote to memory of 4364 3128 msedge.exe 83 PID 3128 wrote to memory of 4364 3128 msedge.exe 83 PID 3128 wrote to memory of 4364 3128 msedge.exe 83 PID 3128 wrote to memory of 4364 3128 msedge.exe 83 PID 3128 wrote to memory of 4364 3128 msedge.exe 83 PID 3128 wrote to memory of 4364 3128 msedge.exe 83 PID 3128 wrote to memory of 4364 3128 msedge.exe 83 PID 3128 wrote to memory of 4364 3128 msedge.exe 83 PID 3128 wrote to memory of 4304 3128 msedge.exe 84 PID 3128 wrote to memory of 4304 3128 msedge.exe 84 PID 3128 wrote to memory of 2948 3128 msedge.exe 85 PID 3128 wrote to memory of 2948 3128 msedge.exe 85 PID 3128 wrote to memory of 2948 3128 msedge.exe 85 PID 3128 wrote to memory of 2948 3128 msedge.exe 85 PID 3128 wrote to memory of 2948 3128 msedge.exe 85 PID 3128 wrote to memory of 2948 3128 msedge.exe 85 PID 3128 wrote to memory of 2948 3128 msedge.exe 85 PID 3128 wrote to memory of 2948 3128 msedge.exe 85 PID 3128 wrote to memory of 2948 3128 msedge.exe 85 PID 3128 wrote to memory of 2948 3128 msedge.exe 85 PID 3128 wrote to memory of 2948 3128 msedge.exe 85 PID 3128 wrote to memory of 2948 3128 msedge.exe 85 PID 3128 wrote to memory of 2948 3128 msedge.exe 85 PID 3128 wrote to memory of 2948 3128 msedge.exe 85 PID 3128 wrote to memory of 2948 3128 msedge.exe 85 PID 3128 wrote to memory of 2948 3128 msedge.exe 85 PID 3128 wrote to memory of 2948 3128 msedge.exe 85 PID 3128 wrote to memory of 2948 3128 msedge.exe 85 PID 3128 wrote to memory of 2948 3128 msedge.exe 85 PID 3128 wrote to memory of 2948 3128 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3166ccb9e36f22f17882b2e34803a270_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcfc0446f8,0x7ffcfc044708,0x7ffcfc0447182⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,4396730933037897856,11944261400366288646,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,4396730933037897856,11944261400366288646,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,4396730933037897856,11944261400366288646,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2984 /prefetch:82⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,4396730933037897856,11944261400366288646,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,4396730933037897856,11944261400366288646,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,4396730933037897856,11944261400366288646,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6092 /prefetch:82⤵PID:2128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,4396730933037897856,11944261400366288646,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6092 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,4396730933037897856,11944261400366288646,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:1764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,4396730933037897856,11944261400366288646,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4036 /prefetch:12⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,4396730933037897856,11944261400366288646,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,4396730933037897856,11944261400366288646,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,4396730933037897856,11944261400366288646,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4748 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4580
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4296
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD547b6ede425b4a919996129e590640de4
SHA151552c246fd8751c0af561e52fe19f6de27ec42f
SHA256dd25941185cedd2e6fd9942d9489dbb24bdf4fdd0be9b27528477b028e007f55
SHA5125137abcdefab9447868813d164219ccd0c15d96874611955394a188ab84bd81a8bf73f266c04785141a63ef7fc01bf7a6a60a2278eb14c860733771a5f77c825
-
Filesize
6KB
MD5ea81319f60e1fe2ea704eec39e4e07c6
SHA1283fafa8fb814e733f9c3bed60976252b23f5c69
SHA256f9ce636b16b2da945c46e8e341f572c1b1c1499c7c8b0a98e2d5609a12bf5341
SHA512ef4c910b1bbbcb1f34771f9697373e6d200f6dec97806b11070de1251d712e46083b5306eb71336e4d88ef3c9642ddf17ed72b5fd99e343b488e44770f3f1257
-
Filesize
6KB
MD502e16c8533bf89377e7eec33e7ee7279
SHA1deb7d0a2178df7900b772247de5abeef9360cc1a
SHA2565daaee3a1953741f94743cd531fdc854f49d2601e51ab8f1b1e4a46dcdfbae33
SHA512f25362e32f916aa458eff477f21b161d853e76e3e99d12e98367ed580825364db57372a4710ce5bf6582f69e1c0045ba02f9089afbf858e9a4edd0c12e5aff24
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD582e53c15a597fd96e06a60c55553e38b
SHA18aee29288e5ee948a5de6aeff2ae41986cedfb20
SHA2566c9289b7acfc25c77469eeea490410558355073f76b85fcd3e1a47291024e7e7
SHA512fbecb46b5d9a1f1a6e261822a5a0ddd0ac5e56d81ef1af101592799601dd99e93ef8e37ddf52ed9334518f58622e19694d5e8cf11da46c5a0f16877bd0b2f6cc