Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 16:22
Static task
static1
Behavioral task
behavioral1
Sample
600933b11e0929fbef4791178b5e6e96_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
600933b11e0929fbef4791178b5e6e96_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
600933b11e0929fbef4791178b5e6e96_JaffaCakes118.html
-
Size
63KB
-
MD5
600933b11e0929fbef4791178b5e6e96
-
SHA1
aaa0f428013e8c24337c3515871d5ae03ee631dd
-
SHA256
ac606db86fdc69e240ae55827d1cf95d78392a5900532c68fa9c3916bd0a54be
-
SHA512
a211e3c4eead938e5931c941efcd1439885bb37752ca39fedc3e06ec81cfaf2d3606d2d7f17786e5590a034989fc6eb407be0dca6439555799e105285a8c463d
-
SSDEEP
1536:pIRIOITIwIgIiKZgNDfIwIGI5IVJ7SqIRIOITIwIgIiKZgNDfIwIGI5IVJ7SZWep:MWevdkxeGGprzIurzIK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5040 msedge.exe 5040 msedge.exe 1948 msedge.exe 1948 msedge.exe 3500 identity_helper.exe 3500 identity_helper.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1948 wrote to memory of 3432 1948 msedge.exe 82 PID 1948 wrote to memory of 3432 1948 msedge.exe 82 PID 1948 wrote to memory of 3300 1948 msedge.exe 83 PID 1948 wrote to memory of 3300 1948 msedge.exe 83 PID 1948 wrote to memory of 3300 1948 msedge.exe 83 PID 1948 wrote to memory of 3300 1948 msedge.exe 83 PID 1948 wrote to memory of 3300 1948 msedge.exe 83 PID 1948 wrote to memory of 3300 1948 msedge.exe 83 PID 1948 wrote to memory of 3300 1948 msedge.exe 83 PID 1948 wrote to memory of 3300 1948 msedge.exe 83 PID 1948 wrote to memory of 3300 1948 msedge.exe 83 PID 1948 wrote to memory of 3300 1948 msedge.exe 83 PID 1948 wrote to memory of 3300 1948 msedge.exe 83 PID 1948 wrote to memory of 3300 1948 msedge.exe 83 PID 1948 wrote to memory of 3300 1948 msedge.exe 83 PID 1948 wrote to memory of 3300 1948 msedge.exe 83 PID 1948 wrote to memory of 3300 1948 msedge.exe 83 PID 1948 wrote to memory of 3300 1948 msedge.exe 83 PID 1948 wrote to memory of 3300 1948 msedge.exe 83 PID 1948 wrote to memory of 3300 1948 msedge.exe 83 PID 1948 wrote to memory of 3300 1948 msedge.exe 83 PID 1948 wrote to memory of 3300 1948 msedge.exe 83 PID 1948 wrote to memory of 3300 1948 msedge.exe 83 PID 1948 wrote to memory of 3300 1948 msedge.exe 83 PID 1948 wrote to memory of 3300 1948 msedge.exe 83 PID 1948 wrote to memory of 3300 1948 msedge.exe 83 PID 1948 wrote to memory of 3300 1948 msedge.exe 83 PID 1948 wrote to memory of 3300 1948 msedge.exe 83 PID 1948 wrote to memory of 3300 1948 msedge.exe 83 PID 1948 wrote to memory of 3300 1948 msedge.exe 83 PID 1948 wrote to memory of 3300 1948 msedge.exe 83 PID 1948 wrote to memory of 3300 1948 msedge.exe 83 PID 1948 wrote to memory of 3300 1948 msedge.exe 83 PID 1948 wrote to memory of 3300 1948 msedge.exe 83 PID 1948 wrote to memory of 3300 1948 msedge.exe 83 PID 1948 wrote to memory of 3300 1948 msedge.exe 83 PID 1948 wrote to memory of 3300 1948 msedge.exe 83 PID 1948 wrote to memory of 3300 1948 msedge.exe 83 PID 1948 wrote to memory of 3300 1948 msedge.exe 83 PID 1948 wrote to memory of 3300 1948 msedge.exe 83 PID 1948 wrote to memory of 3300 1948 msedge.exe 83 PID 1948 wrote to memory of 3300 1948 msedge.exe 83 PID 1948 wrote to memory of 5040 1948 msedge.exe 84 PID 1948 wrote to memory of 5040 1948 msedge.exe 84 PID 1948 wrote to memory of 4792 1948 msedge.exe 85 PID 1948 wrote to memory of 4792 1948 msedge.exe 85 PID 1948 wrote to memory of 4792 1948 msedge.exe 85 PID 1948 wrote to memory of 4792 1948 msedge.exe 85 PID 1948 wrote to memory of 4792 1948 msedge.exe 85 PID 1948 wrote to memory of 4792 1948 msedge.exe 85 PID 1948 wrote to memory of 4792 1948 msedge.exe 85 PID 1948 wrote to memory of 4792 1948 msedge.exe 85 PID 1948 wrote to memory of 4792 1948 msedge.exe 85 PID 1948 wrote to memory of 4792 1948 msedge.exe 85 PID 1948 wrote to memory of 4792 1948 msedge.exe 85 PID 1948 wrote to memory of 4792 1948 msedge.exe 85 PID 1948 wrote to memory of 4792 1948 msedge.exe 85 PID 1948 wrote to memory of 4792 1948 msedge.exe 85 PID 1948 wrote to memory of 4792 1948 msedge.exe 85 PID 1948 wrote to memory of 4792 1948 msedge.exe 85 PID 1948 wrote to memory of 4792 1948 msedge.exe 85 PID 1948 wrote to memory of 4792 1948 msedge.exe 85 PID 1948 wrote to memory of 4792 1948 msedge.exe 85 PID 1948 wrote to memory of 4792 1948 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\600933b11e0929fbef4791178b5e6e96_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd092d46f8,0x7ffd092d4708,0x7ffd092d47182⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,10437858809747131906,7236135557010181962,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:3300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,10437858809747131906,7236135557010181962,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,10437858809747131906,7236135557010181962,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10437858809747131906,7236135557010181962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10437858809747131906,7236135557010181962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,10437858809747131906,7236135557010181962,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6036 /prefetch:82⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,10437858809747131906,7236135557010181962,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6036 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10437858809747131906,7236135557010181962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10437858809747131906,7236135557010181962,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10437858809747131906,7236135557010181962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5960 /prefetch:12⤵PID:1364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10437858809747131906,7236135557010181962,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,10437858809747131906,7236135557010181962,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4876 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3484
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3464
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2124
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
308B
MD578522e5df9051442c2805dc5d1c74c8b
SHA18bbf7828c3c3226e4b198cb9a45bc86d4342bd0d
SHA2566ace347d5d8844c3dee80fc909766347df68039299626e3126cecbe5ac7c7acb
SHA51237e734eb242779550c56589920128665c40d86281683ce9839b25f2868a03e62e356e0c31dba873b837d92898577fbc3dc016d5d852b366f7b085cd77205d9d4
-
Filesize
5KB
MD5b590cbda9b3e777f5ab581e1a4ca1610
SHA1c6e19c6eb031f38e77d9c13a14e6b3e2e73faf5c
SHA256c3bf1174073939239af8cac328b15c34238eeec445b19fce3257d8db98767a85
SHA5123e28b5f8a227498dfc21c33b5447c74321b8397d606ad351cf1c3f8c6c67aaf0fa05ce4dd7a45be036948e73d279819de119743c0500862164e3ae9cc83f7963
-
Filesize
6KB
MD5e8f6f7fbc4b0274a4ebefe6525a750c4
SHA1f5cf8cea833321b8d95227161fda4a32ff6edae7
SHA256ff5d0e9173d38da323b1d6ee06f7fb97d6aca6a07d56f1e706ed21e479c7581e
SHA512be9da47ca44e73f239a128eacfeba3d47b1b790e12cb3bdca7233d7db6d5d9309b3f1610d57cbb0c7db2a272dca2e390e9fcb2bf26f25bf7e629737a0736febd
-
Filesize
6KB
MD549a050bed393e27f180c40c49bfacdce
SHA10eb7d2a9dc2f3dd34d0ed485db2b67cd91f05cdc
SHA256168e1e9519e0b0a185be30ba3812aa280952a95fc3640242fbc468b41d81a26c
SHA51255831e459206b492ff8b66dd1e45c2d50cac46afd1c8ad33c0497cc6eafef0c97f5ee5d732dc20fe6e0babea1ef6f775aea33c62a9fc794e56f09969ed3d4ddd
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b9bcb9341bb61888d61ce4e1ce8fa852
SHA1e8956ec8f73de88962e4c7e1e92de3decb04b635
SHA256430b4adfda4d585429adcd828ffc052260336e1499b1318555c40858080ee168
SHA5127cf9cff5c7b4066dde39139adcc60059fe427533250299b4f768b70168621f0ca577f8a0ef349477592629774447da51dc08e147a3cf8f8acef5c1d10334969d