Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 17:10
Static task
static1
Behavioral task
behavioral1
Sample
472db8e43c47a35a1c28c325ab2b03a3_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
472db8e43c47a35a1c28c325ab2b03a3_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
472db8e43c47a35a1c28c325ab2b03a3_JaffaCakes118.html
-
Size
814B
-
MD5
472db8e43c47a35a1c28c325ab2b03a3
-
SHA1
a06dfbb5c9f840a9f65a2512849d4dbfc2be9ba0
-
SHA256
014049a67b70a33a8138f5001dbc36573ea0f794757e9447e4d809b61f7ad9c0
-
SHA512
a95118b1c5feb3f35e6f13eecf26065c99969299b6ced9a03342fbc619a65c80595e596bf5d4f578ec5b941dd81cce500c8878919cd28b041931838a5ef4384d
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2636 msedge.exe 2636 msedge.exe 5092 msedge.exe 5092 msedge.exe 3304 identity_helper.exe 3304 identity_helper.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5092 wrote to memory of 5016 5092 msedge.exe 82 PID 5092 wrote to memory of 5016 5092 msedge.exe 82 PID 5092 wrote to memory of 4428 5092 msedge.exe 83 PID 5092 wrote to memory of 4428 5092 msedge.exe 83 PID 5092 wrote to memory of 4428 5092 msedge.exe 83 PID 5092 wrote to memory of 4428 5092 msedge.exe 83 PID 5092 wrote to memory of 4428 5092 msedge.exe 83 PID 5092 wrote to memory of 4428 5092 msedge.exe 83 PID 5092 wrote to memory of 4428 5092 msedge.exe 83 PID 5092 wrote to memory of 4428 5092 msedge.exe 83 PID 5092 wrote to memory of 4428 5092 msedge.exe 83 PID 5092 wrote to memory of 4428 5092 msedge.exe 83 PID 5092 wrote to memory of 4428 5092 msedge.exe 83 PID 5092 wrote to memory of 4428 5092 msedge.exe 83 PID 5092 wrote to memory of 4428 5092 msedge.exe 83 PID 5092 wrote to memory of 4428 5092 msedge.exe 83 PID 5092 wrote to memory of 4428 5092 msedge.exe 83 PID 5092 wrote to memory of 4428 5092 msedge.exe 83 PID 5092 wrote to memory of 4428 5092 msedge.exe 83 PID 5092 wrote to memory of 4428 5092 msedge.exe 83 PID 5092 wrote to memory of 4428 5092 msedge.exe 83 PID 5092 wrote to memory of 4428 5092 msedge.exe 83 PID 5092 wrote to memory of 4428 5092 msedge.exe 83 PID 5092 wrote to memory of 4428 5092 msedge.exe 83 PID 5092 wrote to memory of 4428 5092 msedge.exe 83 PID 5092 wrote to memory of 4428 5092 msedge.exe 83 PID 5092 wrote to memory of 4428 5092 msedge.exe 83 PID 5092 wrote to memory of 4428 5092 msedge.exe 83 PID 5092 wrote to memory of 4428 5092 msedge.exe 83 PID 5092 wrote to memory of 4428 5092 msedge.exe 83 PID 5092 wrote to memory of 4428 5092 msedge.exe 83 PID 5092 wrote to memory of 4428 5092 msedge.exe 83 PID 5092 wrote to memory of 4428 5092 msedge.exe 83 PID 5092 wrote to memory of 4428 5092 msedge.exe 83 PID 5092 wrote to memory of 4428 5092 msedge.exe 83 PID 5092 wrote to memory of 4428 5092 msedge.exe 83 PID 5092 wrote to memory of 4428 5092 msedge.exe 83 PID 5092 wrote to memory of 4428 5092 msedge.exe 83 PID 5092 wrote to memory of 4428 5092 msedge.exe 83 PID 5092 wrote to memory of 4428 5092 msedge.exe 83 PID 5092 wrote to memory of 4428 5092 msedge.exe 83 PID 5092 wrote to memory of 4428 5092 msedge.exe 83 PID 5092 wrote to memory of 2636 5092 msedge.exe 84 PID 5092 wrote to memory of 2636 5092 msedge.exe 84 PID 5092 wrote to memory of 3352 5092 msedge.exe 85 PID 5092 wrote to memory of 3352 5092 msedge.exe 85 PID 5092 wrote to memory of 3352 5092 msedge.exe 85 PID 5092 wrote to memory of 3352 5092 msedge.exe 85 PID 5092 wrote to memory of 3352 5092 msedge.exe 85 PID 5092 wrote to memory of 3352 5092 msedge.exe 85 PID 5092 wrote to memory of 3352 5092 msedge.exe 85 PID 5092 wrote to memory of 3352 5092 msedge.exe 85 PID 5092 wrote to memory of 3352 5092 msedge.exe 85 PID 5092 wrote to memory of 3352 5092 msedge.exe 85 PID 5092 wrote to memory of 3352 5092 msedge.exe 85 PID 5092 wrote to memory of 3352 5092 msedge.exe 85 PID 5092 wrote to memory of 3352 5092 msedge.exe 85 PID 5092 wrote to memory of 3352 5092 msedge.exe 85 PID 5092 wrote to memory of 3352 5092 msedge.exe 85 PID 5092 wrote to memory of 3352 5092 msedge.exe 85 PID 5092 wrote to memory of 3352 5092 msedge.exe 85 PID 5092 wrote to memory of 3352 5092 msedge.exe 85 PID 5092 wrote to memory of 3352 5092 msedge.exe 85 PID 5092 wrote to memory of 3352 5092 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\472db8e43c47a35a1c28c325ab2b03a3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8591c46f8,0x7ff8591c4708,0x7ff8591c47182⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,1736477202386023872,1514893354241175308,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,1736477202386023872,1514893354241175308,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,1736477202386023872,1514893354241175308,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1736477202386023872,1514893354241175308,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1736477202386023872,1514893354241175308,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1736477202386023872,1514893354241175308,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4144 /prefetch:12⤵PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1736477202386023872,1514893354241175308,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:12⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1736477202386023872,1514893354241175308,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,1736477202386023872,1514893354241175308,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5584 /prefetch:82⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,1736477202386023872,1514893354241175308,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5584 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1736477202386023872,1514893354241175308,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1736477202386023872,1514893354241175308,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:12⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1736477202386023872,1514893354241175308,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1736477202386023872,1514893354241175308,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1736477202386023872,1514893354241175308,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3068 /prefetch:12⤵PID:1064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1736477202386023872,1514893354241175308,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1048 /prefetch:12⤵PID:1928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,1736477202386023872,1514893354241175308,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4040 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2144
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3708
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4800
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD5eae59413ed4da1adff2c4bfc2d665696
SHA19ae785c6f818b66fca19448737ebca2751a53d78
SHA25675c4ce5b88af4768ee6735489f01ba17c0fbefca50e8f2789ed3668e1d78983d
SHA51253a10cbfe4e5e22812e6b07af7159c1e39b92f816a18d693736bcf8f4a0b2ecb2cfa734d04f401e6239131d7c121077ca19a678b7d95cd360da045600b106687
-
Filesize
6KB
MD53f3f643a9a410ceb5e391fd1330a2963
SHA1705ee183f9b4e1b463daac940f4ed0c3e8123bdf
SHA256d345373304e33331ebc4e2476cd057493518d31ae9cb37e266a9805faa7043f1
SHA51238dd2ef0526a2f93989b8c33c420f6b2c04ef72b5ae8f0d5eb5e55565c47b52874320b4b150d1bde4cbe06472463c8e42071ef95ad676dfecee748a4a8e358f8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD521123332e321b352fd0023291e826923
SHA14eb99b59eeb230c357ecffbc4c14a1b6cf67e45d
SHA256044b4553f9f840a25d0c0e0b4553c8c02329482f0e6ed05cb845bc1d06b38ac2
SHA512b1f67612ffece4c14f7708569f3039e853e5ed6e4f555b835d2c25f93d20dc60f9eb5437c76f927ded97e3cb71c0798680ca53898f89933e662b2cc42f060c77