Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
14-05-2024 16:38
Static task
static1
Behavioral task
behavioral1
Sample
423187a7f89b5a7b8ac5c64979be385a_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
423187a7f89b5a7b8ac5c64979be385a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
423187a7f89b5a7b8ac5c64979be385a_JaffaCakes118.html
-
Size
4KB
-
MD5
423187a7f89b5a7b8ac5c64979be385a
-
SHA1
e714a4506256a410f5ff904faac8ca182ad8649c
-
SHA256
52401cfaef981ce125ac020aa53cfceb5c4dcd768b6198ea4b3b34e5df7a98b4
-
SHA512
256990450a4ed8f2a0d42a7b695af83c85a8815444e67f3e8b798e26f0d0d46c7a5c36fa5915b0e4dfbab6c06ebacdba2c0e2be8a97a2a7087b6d8aada8b77c7
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oRe9d:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDF
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3284 msedge.exe 3284 msedge.exe 964 msedge.exe 964 msedge.exe 2232 identity_helper.exe 2232 identity_helper.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 964 wrote to memory of 4908 964 msedge.exe 84 PID 964 wrote to memory of 4908 964 msedge.exe 84 PID 964 wrote to memory of 3768 964 msedge.exe 85 PID 964 wrote to memory of 3768 964 msedge.exe 85 PID 964 wrote to memory of 3768 964 msedge.exe 85 PID 964 wrote to memory of 3768 964 msedge.exe 85 PID 964 wrote to memory of 3768 964 msedge.exe 85 PID 964 wrote to memory of 3768 964 msedge.exe 85 PID 964 wrote to memory of 3768 964 msedge.exe 85 PID 964 wrote to memory of 3768 964 msedge.exe 85 PID 964 wrote to memory of 3768 964 msedge.exe 85 PID 964 wrote to memory of 3768 964 msedge.exe 85 PID 964 wrote to memory of 3768 964 msedge.exe 85 PID 964 wrote to memory of 3768 964 msedge.exe 85 PID 964 wrote to memory of 3768 964 msedge.exe 85 PID 964 wrote to memory of 3768 964 msedge.exe 85 PID 964 wrote to memory of 3768 964 msedge.exe 85 PID 964 wrote to memory of 3768 964 msedge.exe 85 PID 964 wrote to memory of 3768 964 msedge.exe 85 PID 964 wrote to memory of 3768 964 msedge.exe 85 PID 964 wrote to memory of 3768 964 msedge.exe 85 PID 964 wrote to memory of 3768 964 msedge.exe 85 PID 964 wrote to memory of 3768 964 msedge.exe 85 PID 964 wrote to memory of 3768 964 msedge.exe 85 PID 964 wrote to memory of 3768 964 msedge.exe 85 PID 964 wrote to memory of 3768 964 msedge.exe 85 PID 964 wrote to memory of 3768 964 msedge.exe 85 PID 964 wrote to memory of 3768 964 msedge.exe 85 PID 964 wrote to memory of 3768 964 msedge.exe 85 PID 964 wrote to memory of 3768 964 msedge.exe 85 PID 964 wrote to memory of 3768 964 msedge.exe 85 PID 964 wrote to memory of 3768 964 msedge.exe 85 PID 964 wrote to memory of 3768 964 msedge.exe 85 PID 964 wrote to memory of 3768 964 msedge.exe 85 PID 964 wrote to memory of 3768 964 msedge.exe 85 PID 964 wrote to memory of 3768 964 msedge.exe 85 PID 964 wrote to memory of 3768 964 msedge.exe 85 PID 964 wrote to memory of 3768 964 msedge.exe 85 PID 964 wrote to memory of 3768 964 msedge.exe 85 PID 964 wrote to memory of 3768 964 msedge.exe 85 PID 964 wrote to memory of 3768 964 msedge.exe 85 PID 964 wrote to memory of 3768 964 msedge.exe 85 PID 964 wrote to memory of 3284 964 msedge.exe 86 PID 964 wrote to memory of 3284 964 msedge.exe 86 PID 964 wrote to memory of 1048 964 msedge.exe 87 PID 964 wrote to memory of 1048 964 msedge.exe 87 PID 964 wrote to memory of 1048 964 msedge.exe 87 PID 964 wrote to memory of 1048 964 msedge.exe 87 PID 964 wrote to memory of 1048 964 msedge.exe 87 PID 964 wrote to memory of 1048 964 msedge.exe 87 PID 964 wrote to memory of 1048 964 msedge.exe 87 PID 964 wrote to memory of 1048 964 msedge.exe 87 PID 964 wrote to memory of 1048 964 msedge.exe 87 PID 964 wrote to memory of 1048 964 msedge.exe 87 PID 964 wrote to memory of 1048 964 msedge.exe 87 PID 964 wrote to memory of 1048 964 msedge.exe 87 PID 964 wrote to memory of 1048 964 msedge.exe 87 PID 964 wrote to memory of 1048 964 msedge.exe 87 PID 964 wrote to memory of 1048 964 msedge.exe 87 PID 964 wrote to memory of 1048 964 msedge.exe 87 PID 964 wrote to memory of 1048 964 msedge.exe 87 PID 964 wrote to memory of 1048 964 msedge.exe 87 PID 964 wrote to memory of 1048 964 msedge.exe 87 PID 964 wrote to memory of 1048 964 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\423187a7f89b5a7b8ac5c64979be385a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe4d6046f8,0x7ffe4d604708,0x7ffe4d6047182⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,3483835136243282399,4651548932402105790,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:3768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,3483835136243282399,4651548932402105790,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,3483835136243282399,4651548932402105790,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:1048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,3483835136243282399,4651548932402105790,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,3483835136243282399,4651548932402105790,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:2908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,3483835136243282399,4651548932402105790,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:82⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,3483835136243282399,4651548932402105790,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,3483835136243282399,4651548932402105790,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4840 /prefetch:12⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,3483835136243282399,4651548932402105790,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4108 /prefetch:12⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,3483835136243282399,4651548932402105790,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:12⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,3483835136243282399,4651548932402105790,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,3483835136243282399,4651548932402105790,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4920 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4432
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4992
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2364
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
292B
MD53baaef17fd991afb32ea823f038ebf22
SHA13783a2f553dbeedadf8074074ba124833ae0877d
SHA25679b97b9e6dd6c2b2d7a9fb42d1f15c9c1d36c6d14bfb01e05788ab8c1e608c47
SHA512249fbeaab44c06c8f370c530367ccc5128de316c71dbaa2bf0cf9a9809915a06682671d9b2bec2c5ae2b589e9438911e71816fa7c1be07a4742698f1d604643d
-
Filesize
5KB
MD5c4662bccc5e7ffd62e62fe86076f0109
SHA1734e728ab3ab9fa6b52c3a66109ef182a5321db5
SHA2562535039bedb210e963be9005ee3673a9a9b5536b3df335555e55fc9fa04daddc
SHA512e396f254fa8df8cfa2eeb38a0764702dc41e07a453375ec4f102490042805dd945412f65c90362a99669318d96e594b23ab6c70275b157cae536838414640552
-
Filesize
6KB
MD54a30bff2c4f6560f65e2e2e4e33345aa
SHA17736085bfdc27a4c506e404bdb34c99c16f7ae89
SHA2566620f24281172fdcd77cb7251667f63fff0b3915788d497bc69d2217c9111526
SHA512d5535b4883708d8f733264e4978afb248db3f6da9b89c736cd15614cb790cadd8d27c1dfaaff84f80acdaa91e41d2199a811d30dd6ff23df9758619b9e941112
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD543f689b25da10493c60a929d12853b11
SHA1f52a9d11f264c979c9e3d968815251502a30fc79
SHA256e0e0495991f73bfcd4290bbae26810f0613413364f527ac4d8ca3a4e6fe640d3
SHA5125387cda1ac8ea3bf06e707e628d438d9a4464352d528622815f66e6e31c92cc15fd97aec063a30ab9bcf79aa74383ef9e5ac4e51f35d09a5df22f1bfec66cfba