Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14-05-2024 18:48
Static task
static1
Behavioral task
behavioral1
Sample
4290195d912b7864d71ef8c8f0d7cbea_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4290195d912b7864d71ef8c8f0d7cbea_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4290195d912b7864d71ef8c8f0d7cbea_JaffaCakes118.html
-
Size
71KB
-
MD5
4290195d912b7864d71ef8c8f0d7cbea
-
SHA1
45e4511dbaa56fe9b984b77c3b817bcb146c9a20
-
SHA256
62b6a8ba6acf05d5224b4bba40189f38a4780a0b0ff10d9612f3a898b82691ef
-
SHA512
87f4352c4873adf08a86eca1becf2880ea336116b10a7c96466150b22981e0dee59b98ab574f6410bb078900e7e67d9e58d5bba925da06fc6be2beef8f109faf
-
SSDEEP
1536:y7Vi+ue9dMqghFDCke8W03Gl6jI7n6Qm/pY+L5hy:y7VtlYqghFDCWW03U6jI7xm/pC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4844 msedge.exe 4844 msedge.exe 2828 msedge.exe 2828 msedge.exe 3528 identity_helper.exe 3528 identity_helper.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2828 wrote to memory of 2764 2828 msedge.exe 81 PID 2828 wrote to memory of 2764 2828 msedge.exe 81 PID 2828 wrote to memory of 3032 2828 msedge.exe 82 PID 2828 wrote to memory of 3032 2828 msedge.exe 82 PID 2828 wrote to memory of 3032 2828 msedge.exe 82 PID 2828 wrote to memory of 3032 2828 msedge.exe 82 PID 2828 wrote to memory of 3032 2828 msedge.exe 82 PID 2828 wrote to memory of 3032 2828 msedge.exe 82 PID 2828 wrote to memory of 3032 2828 msedge.exe 82 PID 2828 wrote to memory of 3032 2828 msedge.exe 82 PID 2828 wrote to memory of 3032 2828 msedge.exe 82 PID 2828 wrote to memory of 3032 2828 msedge.exe 82 PID 2828 wrote to memory of 3032 2828 msedge.exe 82 PID 2828 wrote to memory of 3032 2828 msedge.exe 82 PID 2828 wrote to memory of 3032 2828 msedge.exe 82 PID 2828 wrote to memory of 3032 2828 msedge.exe 82 PID 2828 wrote to memory of 3032 2828 msedge.exe 82 PID 2828 wrote to memory of 3032 2828 msedge.exe 82 PID 2828 wrote to memory of 3032 2828 msedge.exe 82 PID 2828 wrote to memory of 3032 2828 msedge.exe 82 PID 2828 wrote to memory of 3032 2828 msedge.exe 82 PID 2828 wrote to memory of 3032 2828 msedge.exe 82 PID 2828 wrote to memory of 3032 2828 msedge.exe 82 PID 2828 wrote to memory of 3032 2828 msedge.exe 82 PID 2828 wrote to memory of 3032 2828 msedge.exe 82 PID 2828 wrote to memory of 3032 2828 msedge.exe 82 PID 2828 wrote to memory of 3032 2828 msedge.exe 82 PID 2828 wrote to memory of 3032 2828 msedge.exe 82 PID 2828 wrote to memory of 3032 2828 msedge.exe 82 PID 2828 wrote to memory of 3032 2828 msedge.exe 82 PID 2828 wrote to memory of 3032 2828 msedge.exe 82 PID 2828 wrote to memory of 3032 2828 msedge.exe 82 PID 2828 wrote to memory of 3032 2828 msedge.exe 82 PID 2828 wrote to memory of 3032 2828 msedge.exe 82 PID 2828 wrote to memory of 3032 2828 msedge.exe 82 PID 2828 wrote to memory of 3032 2828 msedge.exe 82 PID 2828 wrote to memory of 3032 2828 msedge.exe 82 PID 2828 wrote to memory of 3032 2828 msedge.exe 82 PID 2828 wrote to memory of 3032 2828 msedge.exe 82 PID 2828 wrote to memory of 3032 2828 msedge.exe 82 PID 2828 wrote to memory of 3032 2828 msedge.exe 82 PID 2828 wrote to memory of 3032 2828 msedge.exe 82 PID 2828 wrote to memory of 4844 2828 msedge.exe 83 PID 2828 wrote to memory of 4844 2828 msedge.exe 83 PID 2828 wrote to memory of 3920 2828 msedge.exe 84 PID 2828 wrote to memory of 3920 2828 msedge.exe 84 PID 2828 wrote to memory of 3920 2828 msedge.exe 84 PID 2828 wrote to memory of 3920 2828 msedge.exe 84 PID 2828 wrote to memory of 3920 2828 msedge.exe 84 PID 2828 wrote to memory of 3920 2828 msedge.exe 84 PID 2828 wrote to memory of 3920 2828 msedge.exe 84 PID 2828 wrote to memory of 3920 2828 msedge.exe 84 PID 2828 wrote to memory of 3920 2828 msedge.exe 84 PID 2828 wrote to memory of 3920 2828 msedge.exe 84 PID 2828 wrote to memory of 3920 2828 msedge.exe 84 PID 2828 wrote to memory of 3920 2828 msedge.exe 84 PID 2828 wrote to memory of 3920 2828 msedge.exe 84 PID 2828 wrote to memory of 3920 2828 msedge.exe 84 PID 2828 wrote to memory of 3920 2828 msedge.exe 84 PID 2828 wrote to memory of 3920 2828 msedge.exe 84 PID 2828 wrote to memory of 3920 2828 msedge.exe 84 PID 2828 wrote to memory of 3920 2828 msedge.exe 84 PID 2828 wrote to memory of 3920 2828 msedge.exe 84 PID 2828 wrote to memory of 3920 2828 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4290195d912b7864d71ef8c8f0d7cbea_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8c04046f8,0x7ff8c0404708,0x7ff8c04047182⤵PID:2764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,3031659903241132311,13188313469644821027,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,3031659903241132311,13188313469644821027,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,3031659903241132311,13188313469644821027,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2428 /prefetch:82⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3031659903241132311,13188313469644821027,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3031659903241132311,13188313469644821027,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,3031659903241132311,13188313469644821027,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:82⤵PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,3031659903241132311,13188313469644821027,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3031659903241132311,13188313469644821027,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:1036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3031659903241132311,13188313469644821027,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4180 /prefetch:12⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3031659903241132311,13188313469644821027,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3031659903241132311,13188313469644821027,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,3031659903241132311,13188313469644821027,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5324 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4700
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2264
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4284
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
670B
MD55c1c27887b1680bfd221a836d531ef94
SHA13dfc5cf295298f3e96a966c8581e8c93da24809d
SHA256eade9c6c4c8cb0ec2b49068b9d94af6b77496dddb706d18c343fd78c8d1159a1
SHA512df64e82d5ad1c5fe8cff9f507e2ade2fbe2ccc6538e0f92f06e29461f15aad98e11c080a472981d01cfe40c43e327d14ea34e6d166d29eaf17063b043b4bd69f
-
Filesize
6KB
MD52bc8acf4f65c521086cac99f61a6ce05
SHA10520dbd05d76dd9534848c796014d51b97798917
SHA256fa5596b126e5f3c99dc50bbd9ee2c603bdd87b252a77c61c8ce08b5527796599
SHA512310dcb5e2404fc26c124fb78691ab86fbee9f4c5373051dc4ec80ec3d87cf21c57ff7939c262e3ef780942ccfe1b2f0f0120a46e521b371a92d42d2ab396bffd
-
Filesize
6KB
MD588f7f671d9ae8b913c8e66e9c0761341
SHA172515566a70027b27c96d3c514b937f5bec80bdb
SHA256a291d8dee96325e8b0a753c0827c2cc0389cf68aa7878ac4d5e7bd50213ed377
SHA51261b51e867a95366012a7ca23af092df47d779bdaad677c29db5d037672c36cb5665ab419ae1f54611aa7691978ac69505d2decebca2c73d022b5f674b61149b8
-
Filesize
532B
MD56688e6e108c6ae67e5cccfe24101db21
SHA157c7dc252d7aa2d8abb02c01a3284fee9d441eaa
SHA2562a0a9579696c4aec200f505ffe5c57fe8ac04f3da8f4c39bf4b448ce1f989cd2
SHA512059351e92cae0bd38c598c048f128b63a2bd1b369d33ddd55385ec9bebe9d2a0b92da18cfc4ce0c4a9b5c459aca2c5d47532870f89cc63e0b2d473f25f0819a8
-
Filesize
367B
MD569f4604a83769f0208e6ca0780509887
SHA119e3bf17bfa110b8b27b4d2951a0d7e0f60cedfc
SHA256aa301d6f082b2a6ee08407c842245ffc54e86eafd99ebc30884cacd9b801d949
SHA5121fe8dcd5d9cb9253edefefe7efff939f77dc1ca56dda10984931d928ca4f0be9310461cbbb5af92dc2287a7414b56f379c582046c1d10b1b39f0f9aa1b63d933
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d908f7cbc89b7ccbc2c4070bdad88717
SHA18c6181a82a054c7f9cb8d3fe43cb9174649ff9dd
SHA25669994bd52dd0a87feb5d330a8d9c699d8853c50dc3f7ebb3a34625b993717979
SHA512a1bb76e1d560c49e1be42df74170101ec3b9d53e37248a3c9c063b54e84535e2ae305429cfcc9fcc9d53152fce5828cc71238183578aa89e69dee10c435fb705