Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
29-05-2024 11:42
Static task
static1
Behavioral task
behavioral1
Sample
809dd152637de0ca0f23c062cd30519f_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
809dd152637de0ca0f23c062cd30519f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
809dd152637de0ca0f23c062cd30519f_JaffaCakes118.html
-
Size
13KB
-
MD5
809dd152637de0ca0f23c062cd30519f
-
SHA1
d2c57a6379968ec9d3a7121ac2e1ca509c5fe6f8
-
SHA256
6d28f546c172b9d33a66316173de0e08e0a14d1597bceaf1742bfa8c2d9915eb
-
SHA512
365b2a3cd2a4e8fae201bda118f01c0df019d4bb3a76261257926f169619c744dbfb52d1d83e56a3125412ae1c4dc170f59a501a8a1a056b51d2b8dc1e269616
-
SSDEEP
384:H/fg/4wIrFCBmtyTzvCX/YHeleR5d+EXJ+S:ffg/4wIrFCBcys+d+qJ+S
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4512 msedge.exe 4512 msedge.exe 2040 msedge.exe 2040 msedge.exe 4684 identity_helper.exe 4684 identity_helper.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2040 wrote to memory of 924 2040 msedge.exe 82 PID 2040 wrote to memory of 924 2040 msedge.exe 82 PID 2040 wrote to memory of 5112 2040 msedge.exe 83 PID 2040 wrote to memory of 5112 2040 msedge.exe 83 PID 2040 wrote to memory of 5112 2040 msedge.exe 83 PID 2040 wrote to memory of 5112 2040 msedge.exe 83 PID 2040 wrote to memory of 5112 2040 msedge.exe 83 PID 2040 wrote to memory of 5112 2040 msedge.exe 83 PID 2040 wrote to memory of 5112 2040 msedge.exe 83 PID 2040 wrote to memory of 5112 2040 msedge.exe 83 PID 2040 wrote to memory of 5112 2040 msedge.exe 83 PID 2040 wrote to memory of 5112 2040 msedge.exe 83 PID 2040 wrote to memory of 5112 2040 msedge.exe 83 PID 2040 wrote to memory of 5112 2040 msedge.exe 83 PID 2040 wrote to memory of 5112 2040 msedge.exe 83 PID 2040 wrote to memory of 5112 2040 msedge.exe 83 PID 2040 wrote to memory of 5112 2040 msedge.exe 83 PID 2040 wrote to memory of 5112 2040 msedge.exe 83 PID 2040 wrote to memory of 5112 2040 msedge.exe 83 PID 2040 wrote to memory of 5112 2040 msedge.exe 83 PID 2040 wrote to memory of 5112 2040 msedge.exe 83 PID 2040 wrote to memory of 5112 2040 msedge.exe 83 PID 2040 wrote to memory of 5112 2040 msedge.exe 83 PID 2040 wrote to memory of 5112 2040 msedge.exe 83 PID 2040 wrote to memory of 5112 2040 msedge.exe 83 PID 2040 wrote to memory of 5112 2040 msedge.exe 83 PID 2040 wrote to memory of 5112 2040 msedge.exe 83 PID 2040 wrote to memory of 5112 2040 msedge.exe 83 PID 2040 wrote to memory of 5112 2040 msedge.exe 83 PID 2040 wrote to memory of 5112 2040 msedge.exe 83 PID 2040 wrote to memory of 5112 2040 msedge.exe 83 PID 2040 wrote to memory of 5112 2040 msedge.exe 83 PID 2040 wrote to memory of 5112 2040 msedge.exe 83 PID 2040 wrote to memory of 5112 2040 msedge.exe 83 PID 2040 wrote to memory of 5112 2040 msedge.exe 83 PID 2040 wrote to memory of 5112 2040 msedge.exe 83 PID 2040 wrote to memory of 5112 2040 msedge.exe 83 PID 2040 wrote to memory of 5112 2040 msedge.exe 83 PID 2040 wrote to memory of 5112 2040 msedge.exe 83 PID 2040 wrote to memory of 5112 2040 msedge.exe 83 PID 2040 wrote to memory of 5112 2040 msedge.exe 83 PID 2040 wrote to memory of 5112 2040 msedge.exe 83 PID 2040 wrote to memory of 4512 2040 msedge.exe 84 PID 2040 wrote to memory of 4512 2040 msedge.exe 84 PID 2040 wrote to memory of 1992 2040 msedge.exe 85 PID 2040 wrote to memory of 1992 2040 msedge.exe 85 PID 2040 wrote to memory of 1992 2040 msedge.exe 85 PID 2040 wrote to memory of 1992 2040 msedge.exe 85 PID 2040 wrote to memory of 1992 2040 msedge.exe 85 PID 2040 wrote to memory of 1992 2040 msedge.exe 85 PID 2040 wrote to memory of 1992 2040 msedge.exe 85 PID 2040 wrote to memory of 1992 2040 msedge.exe 85 PID 2040 wrote to memory of 1992 2040 msedge.exe 85 PID 2040 wrote to memory of 1992 2040 msedge.exe 85 PID 2040 wrote to memory of 1992 2040 msedge.exe 85 PID 2040 wrote to memory of 1992 2040 msedge.exe 85 PID 2040 wrote to memory of 1992 2040 msedge.exe 85 PID 2040 wrote to memory of 1992 2040 msedge.exe 85 PID 2040 wrote to memory of 1992 2040 msedge.exe 85 PID 2040 wrote to memory of 1992 2040 msedge.exe 85 PID 2040 wrote to memory of 1992 2040 msedge.exe 85 PID 2040 wrote to memory of 1992 2040 msedge.exe 85 PID 2040 wrote to memory of 1992 2040 msedge.exe 85 PID 2040 wrote to memory of 1992 2040 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\809dd152637de0ca0f23c062cd30519f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb428446f8,0x7ffb42844708,0x7ffb428447182⤵PID:924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,15624596119167186638,3350166377158253040,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,15624596119167186638,3350166377158253040,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2324 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,15624596119167186638,3350166377158253040,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2472 /prefetch:82⤵PID:1992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15624596119167186638,3350166377158253040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15624596119167186638,3350166377158253040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,15624596119167186638,3350166377158253040,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 /prefetch:82⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,15624596119167186638,3350166377158253040,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15624596119167186638,3350166377158253040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15624596119167186638,3350166377158253040,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15624596119167186638,3350166377158253040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15624596119167186638,3350166377158253040,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:12⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,15624596119167186638,3350166377158253040,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4744 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4868
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5020
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
5KB
MD51eb3cb1f3dd3d2e2ed6d0ebddb064f51
SHA187d8085ccdcf61a01ff3cc982cfe9bfd2ff3fc14
SHA256a7a85dc30af60cf67548ea0d249623b2bfd4900bb1d9d7076a65eaab9599799f
SHA5123875b3a36f75b2d8c9bccd8e428666a0b73cda36500772ae027df6ab1d63204088b8cbdfdbb2e495c399dbf95e1b7849c62e7f2dfbb772f3b55bc5f57a7979e2
-
Filesize
6KB
MD567915af21f8ff2eeba4bfb5b8528925b
SHA12cbad1967d3270319114ce3c4eee4fe2f2bcb9f7
SHA25664c959f0b879389dc842258bbd9e98def30e193bc811807f251e0baddb7b0881
SHA51251be16f67aa83eadc925820b82c4d46b2e4e5ad87af505ba779311e394a509f5a637adfcec1dbb216048ead66c4a65e67f91d456ce22ced59c34901d7a249e43
-
Filesize
6KB
MD595a808e407e856e54b65362e4e8c11db
SHA1488e6ecefa612095affbf5330b56cd4fa7171351
SHA256c283a4a0a0ad688c651fd70ce9f4617b436dc6e2ec0020788331f30a4f8bf03e
SHA512ff13b3ad181f0e9c3095699b94a33cbd1010c8c7365ba00ee9fb2ca3f5e91dd428cdabfcb6346a8fb11695c32d720df7181ecae427946f851a94210fe4c27e14
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5af5dd6ae94675297dc5b73ad5c639458
SHA1d90560603bab2f1e691b028fd4332d638ecf36dd
SHA2565739f4a6b462390248ed582b5e4b2ec3441221858e58eec23f9a477c18a475fb
SHA512540f019d60f1c5d564484923e5ff26cdc7d08b4c685455ed47fccd3298a7e1fcc8df2f35ed003440e90f44d3dae9bd1ad65844d1a9e40951dba8b4d9ccd9fd2b