Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12-05-2024 10:15
Static task
static1
Behavioral task
behavioral1
Sample
39967924e6442c5ee873b1f5db6d25f2_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
39967924e6442c5ee873b1f5db6d25f2_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
39967924e6442c5ee873b1f5db6d25f2_JaffaCakes118.html
-
Size
1KB
-
MD5
39967924e6442c5ee873b1f5db6d25f2
-
SHA1
8c83351b47cee6f5571b20478e0b0b632d3e8a7f
-
SHA256
8b0423cfdc4e2b4098c8b59107955428edcd0a45f999efff17449fe0aa61ac5f
-
SHA512
7d567051a31bb4ac3a6c055ba4310b2a4023ec317b08f01e6b3cc0871c37293fb02a4066fe4ffc90590762dd60628333cbbdccc5b844e0ddbb328297b7cfd0ff
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1020 msedge.exe 1020 msedge.exe 1740 msedge.exe 1740 msedge.exe 2412 identity_helper.exe 2412 identity_helper.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1740 wrote to memory of 3068 1740 msedge.exe 83 PID 1740 wrote to memory of 3068 1740 msedge.exe 83 PID 1740 wrote to memory of 4528 1740 msedge.exe 84 PID 1740 wrote to memory of 4528 1740 msedge.exe 84 PID 1740 wrote to memory of 4528 1740 msedge.exe 84 PID 1740 wrote to memory of 4528 1740 msedge.exe 84 PID 1740 wrote to memory of 4528 1740 msedge.exe 84 PID 1740 wrote to memory of 4528 1740 msedge.exe 84 PID 1740 wrote to memory of 4528 1740 msedge.exe 84 PID 1740 wrote to memory of 4528 1740 msedge.exe 84 PID 1740 wrote to memory of 4528 1740 msedge.exe 84 PID 1740 wrote to memory of 4528 1740 msedge.exe 84 PID 1740 wrote to memory of 4528 1740 msedge.exe 84 PID 1740 wrote to memory of 4528 1740 msedge.exe 84 PID 1740 wrote to memory of 4528 1740 msedge.exe 84 PID 1740 wrote to memory of 4528 1740 msedge.exe 84 PID 1740 wrote to memory of 4528 1740 msedge.exe 84 PID 1740 wrote to memory of 4528 1740 msedge.exe 84 PID 1740 wrote to memory of 4528 1740 msedge.exe 84 PID 1740 wrote to memory of 4528 1740 msedge.exe 84 PID 1740 wrote to memory of 4528 1740 msedge.exe 84 PID 1740 wrote to memory of 4528 1740 msedge.exe 84 PID 1740 wrote to memory of 4528 1740 msedge.exe 84 PID 1740 wrote to memory of 4528 1740 msedge.exe 84 PID 1740 wrote to memory of 4528 1740 msedge.exe 84 PID 1740 wrote to memory of 4528 1740 msedge.exe 84 PID 1740 wrote to memory of 4528 1740 msedge.exe 84 PID 1740 wrote to memory of 4528 1740 msedge.exe 84 PID 1740 wrote to memory of 4528 1740 msedge.exe 84 PID 1740 wrote to memory of 4528 1740 msedge.exe 84 PID 1740 wrote to memory of 4528 1740 msedge.exe 84 PID 1740 wrote to memory of 4528 1740 msedge.exe 84 PID 1740 wrote to memory of 4528 1740 msedge.exe 84 PID 1740 wrote to memory of 4528 1740 msedge.exe 84 PID 1740 wrote to memory of 4528 1740 msedge.exe 84 PID 1740 wrote to memory of 4528 1740 msedge.exe 84 PID 1740 wrote to memory of 4528 1740 msedge.exe 84 PID 1740 wrote to memory of 4528 1740 msedge.exe 84 PID 1740 wrote to memory of 4528 1740 msedge.exe 84 PID 1740 wrote to memory of 4528 1740 msedge.exe 84 PID 1740 wrote to memory of 4528 1740 msedge.exe 84 PID 1740 wrote to memory of 4528 1740 msedge.exe 84 PID 1740 wrote to memory of 1020 1740 msedge.exe 85 PID 1740 wrote to memory of 1020 1740 msedge.exe 85 PID 1740 wrote to memory of 4388 1740 msedge.exe 86 PID 1740 wrote to memory of 4388 1740 msedge.exe 86 PID 1740 wrote to memory of 4388 1740 msedge.exe 86 PID 1740 wrote to memory of 4388 1740 msedge.exe 86 PID 1740 wrote to memory of 4388 1740 msedge.exe 86 PID 1740 wrote to memory of 4388 1740 msedge.exe 86 PID 1740 wrote to memory of 4388 1740 msedge.exe 86 PID 1740 wrote to memory of 4388 1740 msedge.exe 86 PID 1740 wrote to memory of 4388 1740 msedge.exe 86 PID 1740 wrote to memory of 4388 1740 msedge.exe 86 PID 1740 wrote to memory of 4388 1740 msedge.exe 86 PID 1740 wrote to memory of 4388 1740 msedge.exe 86 PID 1740 wrote to memory of 4388 1740 msedge.exe 86 PID 1740 wrote to memory of 4388 1740 msedge.exe 86 PID 1740 wrote to memory of 4388 1740 msedge.exe 86 PID 1740 wrote to memory of 4388 1740 msedge.exe 86 PID 1740 wrote to memory of 4388 1740 msedge.exe 86 PID 1740 wrote to memory of 4388 1740 msedge.exe 86 PID 1740 wrote to memory of 4388 1740 msedge.exe 86 PID 1740 wrote to memory of 4388 1740 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\39967924e6442c5ee873b1f5db6d25f2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa0ee646f8,0x7ffa0ee64708,0x7ffa0ee647182⤵PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,15421582848064492488,3885555798168807559,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,15421582848064492488,3885555798168807559,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,15421582848064492488,3885555798168807559,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15421582848064492488,3885555798168807559,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15421582848064492488,3885555798168807559,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,15421582848064492488,3885555798168807559,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4900 /prefetch:82⤵PID:1304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,15421582848064492488,3885555798168807559,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4900 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15421582848064492488,3885555798168807559,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15421582848064492488,3885555798168807559,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15421582848064492488,3885555798168807559,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2716 /prefetch:12⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15421582848064492488,3885555798168807559,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15421582848064492488,3885555798168807559,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3940 /prefetch:12⤵PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15421582848064492488,3885555798168807559,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:12⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15421582848064492488,3885555798168807559,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3968 /prefetch:12⤵PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15421582848064492488,3885555798168807559,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15421582848064492488,3885555798168807559,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3036 /prefetch:12⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15421582848064492488,3885555798168807559,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3000 /prefetch:12⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,15421582848064492488,3885555798168807559,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5932 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2528
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5064
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4600
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
6KB
MD5bfeae590ff87780782ab9fd6c747a5f7
SHA182d746dd85395b1358df39f04e9924196a9f5676
SHA256d0f064c942445e860efdc1ffc2580abe7b78be343b248a50911161aee1830609
SHA512608d592a79f25b70fb6fdce99aa842215e252a21b76b0180e848a78eedd0d260ef993376f6573817ac39923dff0d50e3d44598b923d11e4b950045a1e87229b6
-
Filesize
6KB
MD57f89ea2268e40820b55bfecfca32150e
SHA19d2b69f6e8794fa4cbfc9f9312087b6a152aee73
SHA256783e104ab9e735e395d32171c136c59f19a1756de344db7dbae62c59e6f4e115
SHA51214b4d2152a3876df3149049833344c75097e7bb7c728a451510bf5313a9984e70f992bcc32574c69e0d08240b2210870d141a51c1d3d8f0fc5445e75430842d8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b11c471292b2bab89ea697c895ba7088
SHA1ce51ed608753f64af00bc28012d8962b44344afc
SHA256783b0dae3260bd40d65b0ab92fdac83bffe6bd758cba1b3bbf792db4b7628ef7
SHA512d538e2a150a869ae045d50c754c6b12727003c0c86316319bfe88c52bcb3b9f64695ce2edec61ad4ebcac63b11a79ec14457bae301502c37ac0526846c7eee47