Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 01:02
Static task
static1
Behavioral task
behavioral1
Sample
43e2a63ba3a077967908578c98569912_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
43e2a63ba3a077967908578c98569912_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
43e2a63ba3a077967908578c98569912_JaffaCakes118.html
-
Size
36KB
-
MD5
43e2a63ba3a077967908578c98569912
-
SHA1
48c491896ca3b163419347c9c9b5c5719d80931e
-
SHA256
7b594d1c7e349bdfd81472ea80346b008ffc9cc21f49823efc8cb93df8d63d7a
-
SHA512
ee275d2b51e3eb262e24245a3be0db777f98dc361dfeed590f843b3f9c393296a5af63bf0c77cc7932e667dcaa6929673d3127a6b938cb19d5dbc27756dc67ea
-
SSDEEP
384:KjNAourX9iSWKLiAi4S+Ht4EJFudWzoyXgbe388IfeP2thtR7SUiR7d2oadlh+DZ:SOoawEVi4S+HtnJEAsyEx8slh+DDw1Rc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2756 msedge.exe 2756 msedge.exe 1144 msedge.exe 1144 msedge.exe 3044 identity_helper.exe 3044 identity_helper.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1144 wrote to memory of 4808 1144 msedge.exe 83 PID 1144 wrote to memory of 4808 1144 msedge.exe 83 PID 1144 wrote to memory of 1900 1144 msedge.exe 84 PID 1144 wrote to memory of 1900 1144 msedge.exe 84 PID 1144 wrote to memory of 1900 1144 msedge.exe 84 PID 1144 wrote to memory of 1900 1144 msedge.exe 84 PID 1144 wrote to memory of 1900 1144 msedge.exe 84 PID 1144 wrote to memory of 1900 1144 msedge.exe 84 PID 1144 wrote to memory of 1900 1144 msedge.exe 84 PID 1144 wrote to memory of 1900 1144 msedge.exe 84 PID 1144 wrote to memory of 1900 1144 msedge.exe 84 PID 1144 wrote to memory of 1900 1144 msedge.exe 84 PID 1144 wrote to memory of 1900 1144 msedge.exe 84 PID 1144 wrote to memory of 1900 1144 msedge.exe 84 PID 1144 wrote to memory of 1900 1144 msedge.exe 84 PID 1144 wrote to memory of 1900 1144 msedge.exe 84 PID 1144 wrote to memory of 1900 1144 msedge.exe 84 PID 1144 wrote to memory of 1900 1144 msedge.exe 84 PID 1144 wrote to memory of 1900 1144 msedge.exe 84 PID 1144 wrote to memory of 1900 1144 msedge.exe 84 PID 1144 wrote to memory of 1900 1144 msedge.exe 84 PID 1144 wrote to memory of 1900 1144 msedge.exe 84 PID 1144 wrote to memory of 1900 1144 msedge.exe 84 PID 1144 wrote to memory of 1900 1144 msedge.exe 84 PID 1144 wrote to memory of 1900 1144 msedge.exe 84 PID 1144 wrote to memory of 1900 1144 msedge.exe 84 PID 1144 wrote to memory of 1900 1144 msedge.exe 84 PID 1144 wrote to memory of 1900 1144 msedge.exe 84 PID 1144 wrote to memory of 1900 1144 msedge.exe 84 PID 1144 wrote to memory of 1900 1144 msedge.exe 84 PID 1144 wrote to memory of 1900 1144 msedge.exe 84 PID 1144 wrote to memory of 1900 1144 msedge.exe 84 PID 1144 wrote to memory of 1900 1144 msedge.exe 84 PID 1144 wrote to memory of 1900 1144 msedge.exe 84 PID 1144 wrote to memory of 1900 1144 msedge.exe 84 PID 1144 wrote to memory of 1900 1144 msedge.exe 84 PID 1144 wrote to memory of 1900 1144 msedge.exe 84 PID 1144 wrote to memory of 1900 1144 msedge.exe 84 PID 1144 wrote to memory of 1900 1144 msedge.exe 84 PID 1144 wrote to memory of 1900 1144 msedge.exe 84 PID 1144 wrote to memory of 1900 1144 msedge.exe 84 PID 1144 wrote to memory of 1900 1144 msedge.exe 84 PID 1144 wrote to memory of 2756 1144 msedge.exe 85 PID 1144 wrote to memory of 2756 1144 msedge.exe 85 PID 1144 wrote to memory of 1500 1144 msedge.exe 86 PID 1144 wrote to memory of 1500 1144 msedge.exe 86 PID 1144 wrote to memory of 1500 1144 msedge.exe 86 PID 1144 wrote to memory of 1500 1144 msedge.exe 86 PID 1144 wrote to memory of 1500 1144 msedge.exe 86 PID 1144 wrote to memory of 1500 1144 msedge.exe 86 PID 1144 wrote to memory of 1500 1144 msedge.exe 86 PID 1144 wrote to memory of 1500 1144 msedge.exe 86 PID 1144 wrote to memory of 1500 1144 msedge.exe 86 PID 1144 wrote to memory of 1500 1144 msedge.exe 86 PID 1144 wrote to memory of 1500 1144 msedge.exe 86 PID 1144 wrote to memory of 1500 1144 msedge.exe 86 PID 1144 wrote to memory of 1500 1144 msedge.exe 86 PID 1144 wrote to memory of 1500 1144 msedge.exe 86 PID 1144 wrote to memory of 1500 1144 msedge.exe 86 PID 1144 wrote to memory of 1500 1144 msedge.exe 86 PID 1144 wrote to memory of 1500 1144 msedge.exe 86 PID 1144 wrote to memory of 1500 1144 msedge.exe 86 PID 1144 wrote to memory of 1500 1144 msedge.exe 86 PID 1144 wrote to memory of 1500 1144 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\43e2a63ba3a077967908578c98569912_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaeba946f8,0x7ffaeba94708,0x7ffaeba947182⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,6429827507865326474,16598720683959507171,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2240 /prefetch:22⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2204,6429827507865326474,16598720683959507171,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2204,6429827507865326474,16598720683959507171,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,6429827507865326474,16598720683959507171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:2040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,6429827507865326474,16598720683959507171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,6429827507865326474,16598720683959507171,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4876 /prefetch:82⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,6429827507865326474,16598720683959507171,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4876 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,6429827507865326474,16598720683959507171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2840 /prefetch:12⤵PID:1124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,6429827507865326474,16598720683959507171,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,6429827507865326474,16598720683959507171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:12⤵PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,6429827507865326474,16598720683959507171,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:12⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,6429827507865326474,16598720683959507171,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2592 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4456
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3624
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1252
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
191B
MD56bb0e1d8bab7ce211a058d8817f73035
SHA1125a3b2a1187f2f70351cfc97c8b88d4094ef05e
SHA256ff92bc2ea67f586d5de3bf6d0d22651fbc091b1e6fe822a8f003df5e1d27e888
SHA512b592ad470dfe2cad76587bfef3afab3dcfa836d00a33cf7a134fec0f3de77c86e27f225e1d2a40be27a1c3ef662e83fa510052c1dde824d2d510ec25a8c18533
-
Filesize
5KB
MD5dc3c320c80435b521d20ebcc5fe65c8f
SHA1ad1389bbb850b912f6968260c65bee4def0347f2
SHA256aa01705ac6243adad4abafa52edafe5b43f65063d8bd82a6aa0682f3f096ed94
SHA512c91c6f21fd8ed8695b509262bc49a6ed7845eca91fefcab846271f258fd47b799e5c35bb95cd793b491228b6bd637baa43e8ba54955e8992270c24e64ac2f86f
-
Filesize
6KB
MD5ce2a6cb25954f07e15ce0d8327614195
SHA1231ceda04ab2ab8df39c662f648b712f711ee6f0
SHA2566dfbbe0c614d07ca89130523c795c121ed78ef85311b072b440e71ae4db5b419
SHA512dfb066bfae07b81b9a4d3b49bce85c623ef3ea49855c4ffefcf4c8b284aae420898dbc4604b47df835529d14a5bb7d6270cffb8f2acce15dc4b046134572e0c9
-
Filesize
6KB
MD55610409fec1d57869670ee3d7ac07423
SHA1b6a42d2f2e8431567e15c6e4a804e9a6251d5109
SHA256b7c97b70ae82fa59f587a4b246ef8980d0e4189504b19b15e344c1999b36485b
SHA512852794acf0c174fb7b7cc52ef1e5954f79d638d81ad4e38d0944d5a1d5a956447144d86309a0b29896f30d11ed1112042ed1f9dde35b8ba2d1a965d9879b60dc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50ab7eb0b783f80d70cc927786701378c
SHA1e3ec9ef1070a722ca60e7a4e604153ece5c8fc19
SHA256e8afbf9fffa3284639e3264aa266ccbf544fe32a7ca44ea787716fc907287123
SHA51221c5536bb55f963d1e22485985121225d196b5606d6e9fe0d48a373e0bb036419bf6292ff9f15e6d0fc37729621c6f3b350f78e4c68243111446935eedefd7b7