Analysis
-
max time kernel
149s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14-05-2024 23:52
Static task
static1
Behavioral task
behavioral1
Sample
43a5a8c2c7590c53adb64afac8cfcc79_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
43a5a8c2c7590c53adb64afac8cfcc79_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
43a5a8c2c7590c53adb64afac8cfcc79_JaffaCakes118.html
-
Size
352KB
-
MD5
43a5a8c2c7590c53adb64afac8cfcc79
-
SHA1
cc7cf5b88665220977679f39fabbb1197467e6bd
-
SHA256
0ff3ab38e735ba8a1dad11f22158032a8393f5e61451b29a57c3cd5324f5350a
-
SHA512
bb8b892be62dbd0ed78dd0d945bdd41a6539dba9d08248118b8e2c3fe555fb6ace84f54a534b381fc5730da7c662c8ea0abf611d08f6aef81d83f29292cc6699
-
SSDEEP
3072:gsUfdhvHFbcQIFl+28lbV2moa7pAJ3nQJtQtHVfHzvSQ8kR:gsUfc+28lAJ3nQJtQtHV7qQ8kR
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4984 msedge.exe 4984 msedge.exe 1856 msedge.exe 1856 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 4364 identity_helper.exe 4364 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1856 wrote to memory of 2880 1856 msedge.exe 82 PID 1856 wrote to memory of 2880 1856 msedge.exe 82 PID 1856 wrote to memory of 32 1856 msedge.exe 83 PID 1856 wrote to memory of 32 1856 msedge.exe 83 PID 1856 wrote to memory of 32 1856 msedge.exe 83 PID 1856 wrote to memory of 32 1856 msedge.exe 83 PID 1856 wrote to memory of 32 1856 msedge.exe 83 PID 1856 wrote to memory of 32 1856 msedge.exe 83 PID 1856 wrote to memory of 32 1856 msedge.exe 83 PID 1856 wrote to memory of 32 1856 msedge.exe 83 PID 1856 wrote to memory of 32 1856 msedge.exe 83 PID 1856 wrote to memory of 32 1856 msedge.exe 83 PID 1856 wrote to memory of 32 1856 msedge.exe 83 PID 1856 wrote to memory of 32 1856 msedge.exe 83 PID 1856 wrote to memory of 32 1856 msedge.exe 83 PID 1856 wrote to memory of 32 1856 msedge.exe 83 PID 1856 wrote to memory of 32 1856 msedge.exe 83 PID 1856 wrote to memory of 32 1856 msedge.exe 83 PID 1856 wrote to memory of 32 1856 msedge.exe 83 PID 1856 wrote to memory of 32 1856 msedge.exe 83 PID 1856 wrote to memory of 32 1856 msedge.exe 83 PID 1856 wrote to memory of 32 1856 msedge.exe 83 PID 1856 wrote to memory of 32 1856 msedge.exe 83 PID 1856 wrote to memory of 32 1856 msedge.exe 83 PID 1856 wrote to memory of 32 1856 msedge.exe 83 PID 1856 wrote to memory of 32 1856 msedge.exe 83 PID 1856 wrote to memory of 32 1856 msedge.exe 83 PID 1856 wrote to memory of 32 1856 msedge.exe 83 PID 1856 wrote to memory of 32 1856 msedge.exe 83 PID 1856 wrote to memory of 32 1856 msedge.exe 83 PID 1856 wrote to memory of 32 1856 msedge.exe 83 PID 1856 wrote to memory of 32 1856 msedge.exe 83 PID 1856 wrote to memory of 32 1856 msedge.exe 83 PID 1856 wrote to memory of 32 1856 msedge.exe 83 PID 1856 wrote to memory of 32 1856 msedge.exe 83 PID 1856 wrote to memory of 32 1856 msedge.exe 83 PID 1856 wrote to memory of 32 1856 msedge.exe 83 PID 1856 wrote to memory of 32 1856 msedge.exe 83 PID 1856 wrote to memory of 32 1856 msedge.exe 83 PID 1856 wrote to memory of 32 1856 msedge.exe 83 PID 1856 wrote to memory of 32 1856 msedge.exe 83 PID 1856 wrote to memory of 32 1856 msedge.exe 83 PID 1856 wrote to memory of 4984 1856 msedge.exe 84 PID 1856 wrote to memory of 4984 1856 msedge.exe 84 PID 1856 wrote to memory of 1100 1856 msedge.exe 85 PID 1856 wrote to memory of 1100 1856 msedge.exe 85 PID 1856 wrote to memory of 1100 1856 msedge.exe 85 PID 1856 wrote to memory of 1100 1856 msedge.exe 85 PID 1856 wrote to memory of 1100 1856 msedge.exe 85 PID 1856 wrote to memory of 1100 1856 msedge.exe 85 PID 1856 wrote to memory of 1100 1856 msedge.exe 85 PID 1856 wrote to memory of 1100 1856 msedge.exe 85 PID 1856 wrote to memory of 1100 1856 msedge.exe 85 PID 1856 wrote to memory of 1100 1856 msedge.exe 85 PID 1856 wrote to memory of 1100 1856 msedge.exe 85 PID 1856 wrote to memory of 1100 1856 msedge.exe 85 PID 1856 wrote to memory of 1100 1856 msedge.exe 85 PID 1856 wrote to memory of 1100 1856 msedge.exe 85 PID 1856 wrote to memory of 1100 1856 msedge.exe 85 PID 1856 wrote to memory of 1100 1856 msedge.exe 85 PID 1856 wrote to memory of 1100 1856 msedge.exe 85 PID 1856 wrote to memory of 1100 1856 msedge.exe 85 PID 1856 wrote to memory of 1100 1856 msedge.exe 85 PID 1856 wrote to memory of 1100 1856 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\43a5a8c2c7590c53adb64afac8cfcc79_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff96ea246f8,0x7ff96ea24708,0x7ff96ea247182⤵PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,12685247874119597347,6183356446542079154,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2244 /prefetch:22⤵PID:32
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2224,12685247874119597347,6183356446542079154,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2432 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2224,12685247874119597347,6183356446542079154,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2616 /prefetch:82⤵PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,12685247874119597347,6183356446542079154,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:1572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,12685247874119597347,6183356446542079154,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,12685247874119597347,6183356446542079154,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4764 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,12685247874119597347,6183356446542079154,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5460 /prefetch:82⤵PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,12685247874119597347,6183356446542079154,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5460 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,12685247874119597347,6183356446542079154,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,12685247874119597347,6183356446542079154,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:12⤵PID:2628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,12685247874119597347,6183356446542079154,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6060 /prefetch:12⤵PID:760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,12685247874119597347,6183356446542079154,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:3844
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2116
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
956B
MD5f07f47101b0accbb0ad221180b850c9f
SHA15a74b25ecf1d97c14c747dafbe61641022ab1f09
SHA256ec9258d41b8b4231d459f1804ac036896cc855b41e81337fbcf79c1b4805f412
SHA512ed81dc75d1a666bdde91d4fed70c5d25306b216144735f10d799baca5aacdd5201b7e819b74f472de69015ccc35322dc5573aa346cc55d294645dc303f1b99fc
-
Filesize
470B
MD579d34e43608a123867c35292b0b63d76
SHA177dea625cb9192a8e8ff7fd497c191ff52e0de5c
SHA256f6b3a32ee6cef51ad2fbc0736a2d40652fdefe910a95880652e93a890f1317d9
SHA512a296290ccdd64478da5f561c3011aaf6a7eb7526f8e87dc2caa308cab4a9a72f179813277b5f8a8a48e23cb0ded0483fca405b9e0a4444c99f7cb80d0fafbfcc
-
Filesize
6KB
MD52b38f58abe83856504634b66097ee0c6
SHA1d1f3bd39580ad778f679a95a2c8afae159d76f1b
SHA25692b9af43add923b9d6ef86fc6b031adef9d2d2de5f8a5dda46c4b71fa63c3d74
SHA512cdc69d59f296fca82017598ee2ebd55e58a1aa36d965f4347738b02599443f3a5e5e31e35571f158a1978fe4b181a5b106972c9c77e7a7d109862a7f13ccc464
-
Filesize
6KB
MD544e883b98b8871553c291384993de15b
SHA1aaa51781f3389921db3c9eddcdeeb4cab8f64d97
SHA25604d0d952a3f0d0ac503bf4275a253ec9c3df15ec2f875b50d1f495f9be860e20
SHA5126cbc73f3c80a1a43f5c1676d29835b13c74f4c807d62c04b93c22842e83d4a8e682718a70beeaedf86c1bcc9f2e469f396a33d7cf715efb00eb4adf386b40f4f
-
Filesize
6KB
MD50e51ee51300a8daf3d3a93f11de449a0
SHA1080b021960b9b2b11026029daf328fdadf98fecf
SHA2564ed0357ebdc5795e611cd483d7fe1dcfd8a38c455553f80527cb0f65cbffd5de
SHA512884925a13472ab66a1c5278019eb8d2a41f715669c4d902a2a16b7ddd80ed1ef8fe7337ba9833ebaa6721a6ba60b01ca78d0d9a7a3be8661a0597b679e4b1e3c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a56a3140ab1f1c87723b5e11d9c3a95d
SHA1cc5363a3e5a9bc7c0cd694071b3257a657e36b3a
SHA25657f01d3ae6a2e2a8bb2147a858ac79d4dc682cf49d53026465ec9866140b5672
SHA512dc121ae795fa4f365cdfe2f9c1d70cf4393d3315d02f4a7fdda2c8c823901d4b2550e11a5067221404ed3ae403f5ad20211a200fed3a41a4564d0968cc3a8e6c