Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
14-05-2024 19:37
Static task
static1
Behavioral task
behavioral1
Sample
42bcaed0be9af562a2a2b3655de0f6d7_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
42bcaed0be9af562a2a2b3655de0f6d7_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
42bcaed0be9af562a2a2b3655de0f6d7_JaffaCakes118.html
-
Size
22KB
-
MD5
42bcaed0be9af562a2a2b3655de0f6d7
-
SHA1
2d4d4ed6a1c075b5b9244f8a818649af3946c8cb
-
SHA256
771fef094c81e56dfe12d40093973022c68563ccd6964f8a5c3e17bc22c638d7
-
SHA512
796e65fef599154c8f844fdb32e1856c00bbd9b5c52abe4b1d437ad16e08fc8cdc22a16fac6a6c3295a4b649ac64acd29806a0482902b44bd7efe8f78ea7dcb1
-
SSDEEP
192:uwLlb5n2pgtnQjxn5Q/snQie/Nnf8InQOkEntwqnQTbnZnQmSExX5xHMBfqnYnQh:CQ/JsjxmE0k
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3608 msedge.exe 3608 msedge.exe 3120 msedge.exe 3120 msedge.exe 4608 identity_helper.exe 4608 identity_helper.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3120 wrote to memory of 932 3120 msedge.exe 83 PID 3120 wrote to memory of 932 3120 msedge.exe 83 PID 3120 wrote to memory of 3156 3120 msedge.exe 84 PID 3120 wrote to memory of 3156 3120 msedge.exe 84 PID 3120 wrote to memory of 3156 3120 msedge.exe 84 PID 3120 wrote to memory of 3156 3120 msedge.exe 84 PID 3120 wrote to memory of 3156 3120 msedge.exe 84 PID 3120 wrote to memory of 3156 3120 msedge.exe 84 PID 3120 wrote to memory of 3156 3120 msedge.exe 84 PID 3120 wrote to memory of 3156 3120 msedge.exe 84 PID 3120 wrote to memory of 3156 3120 msedge.exe 84 PID 3120 wrote to memory of 3156 3120 msedge.exe 84 PID 3120 wrote to memory of 3156 3120 msedge.exe 84 PID 3120 wrote to memory of 3156 3120 msedge.exe 84 PID 3120 wrote to memory of 3156 3120 msedge.exe 84 PID 3120 wrote to memory of 3156 3120 msedge.exe 84 PID 3120 wrote to memory of 3156 3120 msedge.exe 84 PID 3120 wrote to memory of 3156 3120 msedge.exe 84 PID 3120 wrote to memory of 3156 3120 msedge.exe 84 PID 3120 wrote to memory of 3156 3120 msedge.exe 84 PID 3120 wrote to memory of 3156 3120 msedge.exe 84 PID 3120 wrote to memory of 3156 3120 msedge.exe 84 PID 3120 wrote to memory of 3156 3120 msedge.exe 84 PID 3120 wrote to memory of 3156 3120 msedge.exe 84 PID 3120 wrote to memory of 3156 3120 msedge.exe 84 PID 3120 wrote to memory of 3156 3120 msedge.exe 84 PID 3120 wrote to memory of 3156 3120 msedge.exe 84 PID 3120 wrote to memory of 3156 3120 msedge.exe 84 PID 3120 wrote to memory of 3156 3120 msedge.exe 84 PID 3120 wrote to memory of 3156 3120 msedge.exe 84 PID 3120 wrote to memory of 3156 3120 msedge.exe 84 PID 3120 wrote to memory of 3156 3120 msedge.exe 84 PID 3120 wrote to memory of 3156 3120 msedge.exe 84 PID 3120 wrote to memory of 3156 3120 msedge.exe 84 PID 3120 wrote to memory of 3156 3120 msedge.exe 84 PID 3120 wrote to memory of 3156 3120 msedge.exe 84 PID 3120 wrote to memory of 3156 3120 msedge.exe 84 PID 3120 wrote to memory of 3156 3120 msedge.exe 84 PID 3120 wrote to memory of 3156 3120 msedge.exe 84 PID 3120 wrote to memory of 3156 3120 msedge.exe 84 PID 3120 wrote to memory of 3156 3120 msedge.exe 84 PID 3120 wrote to memory of 3156 3120 msedge.exe 84 PID 3120 wrote to memory of 3608 3120 msedge.exe 85 PID 3120 wrote to memory of 3608 3120 msedge.exe 85 PID 3120 wrote to memory of 3712 3120 msedge.exe 86 PID 3120 wrote to memory of 3712 3120 msedge.exe 86 PID 3120 wrote to memory of 3712 3120 msedge.exe 86 PID 3120 wrote to memory of 3712 3120 msedge.exe 86 PID 3120 wrote to memory of 3712 3120 msedge.exe 86 PID 3120 wrote to memory of 3712 3120 msedge.exe 86 PID 3120 wrote to memory of 3712 3120 msedge.exe 86 PID 3120 wrote to memory of 3712 3120 msedge.exe 86 PID 3120 wrote to memory of 3712 3120 msedge.exe 86 PID 3120 wrote to memory of 3712 3120 msedge.exe 86 PID 3120 wrote to memory of 3712 3120 msedge.exe 86 PID 3120 wrote to memory of 3712 3120 msedge.exe 86 PID 3120 wrote to memory of 3712 3120 msedge.exe 86 PID 3120 wrote to memory of 3712 3120 msedge.exe 86 PID 3120 wrote to memory of 3712 3120 msedge.exe 86 PID 3120 wrote to memory of 3712 3120 msedge.exe 86 PID 3120 wrote to memory of 3712 3120 msedge.exe 86 PID 3120 wrote to memory of 3712 3120 msedge.exe 86 PID 3120 wrote to memory of 3712 3120 msedge.exe 86 PID 3120 wrote to memory of 3712 3120 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\42bcaed0be9af562a2a2b3655de0f6d7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff895ee46f8,0x7ff895ee4708,0x7ff895ee47182⤵PID:932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,10545906129741272271,15230293725331842911,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:3156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,10545906129741272271,15230293725331842911,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,10545906129741272271,15230293725331842911,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:82⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,10545906129741272271,15230293725331842911,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,10545906129741272271,15230293725331842911,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,10545906129741272271,15230293725331842911,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,10545906129741272271,15230293725331842911,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,10545906129741272271,15230293725331842911,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,10545906129741272271,15230293725331842911,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,10545906129741272271,15230293725331842911,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:1496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,10545906129741272271,15230293725331842911,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,10545906129741272271,15230293725331842911,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3108 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4852
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4172
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
6KB
MD5b2a8960e5d3f6408595d6604cffa972b
SHA19eacf5295f6be51d0e783ba6eb1ab30c3fbb2c38
SHA2565bc49ec6d9fd32a711c638c2d8063f1bc760f98e18d128bb92f7f0847ec951db
SHA512694bb7c4b1b48b58ee4d3e6e44f73f5e6c26b4a067a80976f39909337110f41747e123631c43e414155c7637a77cee92a1d42e221dcc333cf6eea1476f40e511
-
Filesize
5KB
MD5977f7c8656b2c3617aa7bb27a4c61971
SHA1172875c73bf1e157489be85a6f046694339c8186
SHA2560631abd65e802caf59900a745fb689f5b06a5d0049590e928caae6821dd59fab
SHA51242add2c6a87c5316f6c45449ed94470b44d570551c2348ebff97a603463d2302029adab7aa287b7ab8b93bb188dc2e30cf7fbb0da89cd51c8bdd517a155cdfe2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD557456f3af231ccb0f7d8171e3c423bd2
SHA1450faa2cb93b2511a7d348111679e4c31110c11f
SHA2565a257c453d34def97159c88455fbcf328e4e9bcaff46c3ba0263d534d69fd177
SHA512be8335de61d9981221dfc435fcb9d2c525a257d02c9561702b104124433cc2aff2df179ef4fd09837955711ec3ba1d9bc0c22b14ebc8503c230593add73c6464