Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
29-05-2024 12:35
Static task
static1
Behavioral task
behavioral1
Sample
80bfcb686497489eb1bedfb2e5e63fd5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
80bfcb686497489eb1bedfb2e5e63fd5_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
80bfcb686497489eb1bedfb2e5e63fd5_JaffaCakes118.html
-
Size
37KB
-
MD5
80bfcb686497489eb1bedfb2e5e63fd5
-
SHA1
214d23bd1cd1324fec6942bae4eaa77ea428f4bc
-
SHA256
7811907c541ba1a73057c42609046b9eb7bfb6e48bc600cae2c7a139f53994f4
-
SHA512
6540d1cf7e7942ba5351d518e130f80051a2092025eb8f8b88f35c6d6e52070f7792560a6b44dc4398ac96320ff4782418a4fb41fdd51c00109740f4594bade8
-
SSDEEP
768:v/bVoRTW81D4RA+vEOjz6rdG2Gil54RZfPGnf3Gu34a/i6781DdRA4vEOjq6h8at:qRTW81D4RA+vEOjz6raA7IaqC81DdRAW
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1124 msedge.exe 1124 msedge.exe 4380 msedge.exe 4380 msedge.exe 5052 identity_helper.exe 5052 identity_helper.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4380 wrote to memory of 1496 4380 msedge.exe 83 PID 4380 wrote to memory of 1496 4380 msedge.exe 83 PID 4380 wrote to memory of 2064 4380 msedge.exe 84 PID 4380 wrote to memory of 2064 4380 msedge.exe 84 PID 4380 wrote to memory of 2064 4380 msedge.exe 84 PID 4380 wrote to memory of 2064 4380 msedge.exe 84 PID 4380 wrote to memory of 2064 4380 msedge.exe 84 PID 4380 wrote to memory of 2064 4380 msedge.exe 84 PID 4380 wrote to memory of 2064 4380 msedge.exe 84 PID 4380 wrote to memory of 2064 4380 msedge.exe 84 PID 4380 wrote to memory of 2064 4380 msedge.exe 84 PID 4380 wrote to memory of 2064 4380 msedge.exe 84 PID 4380 wrote to memory of 2064 4380 msedge.exe 84 PID 4380 wrote to memory of 2064 4380 msedge.exe 84 PID 4380 wrote to memory of 2064 4380 msedge.exe 84 PID 4380 wrote to memory of 2064 4380 msedge.exe 84 PID 4380 wrote to memory of 2064 4380 msedge.exe 84 PID 4380 wrote to memory of 2064 4380 msedge.exe 84 PID 4380 wrote to memory of 2064 4380 msedge.exe 84 PID 4380 wrote to memory of 2064 4380 msedge.exe 84 PID 4380 wrote to memory of 2064 4380 msedge.exe 84 PID 4380 wrote to memory of 2064 4380 msedge.exe 84 PID 4380 wrote to memory of 2064 4380 msedge.exe 84 PID 4380 wrote to memory of 2064 4380 msedge.exe 84 PID 4380 wrote to memory of 2064 4380 msedge.exe 84 PID 4380 wrote to memory of 2064 4380 msedge.exe 84 PID 4380 wrote to memory of 2064 4380 msedge.exe 84 PID 4380 wrote to memory of 2064 4380 msedge.exe 84 PID 4380 wrote to memory of 2064 4380 msedge.exe 84 PID 4380 wrote to memory of 2064 4380 msedge.exe 84 PID 4380 wrote to memory of 2064 4380 msedge.exe 84 PID 4380 wrote to memory of 2064 4380 msedge.exe 84 PID 4380 wrote to memory of 2064 4380 msedge.exe 84 PID 4380 wrote to memory of 2064 4380 msedge.exe 84 PID 4380 wrote to memory of 2064 4380 msedge.exe 84 PID 4380 wrote to memory of 2064 4380 msedge.exe 84 PID 4380 wrote to memory of 2064 4380 msedge.exe 84 PID 4380 wrote to memory of 2064 4380 msedge.exe 84 PID 4380 wrote to memory of 2064 4380 msedge.exe 84 PID 4380 wrote to memory of 2064 4380 msedge.exe 84 PID 4380 wrote to memory of 2064 4380 msedge.exe 84 PID 4380 wrote to memory of 2064 4380 msedge.exe 84 PID 4380 wrote to memory of 1124 4380 msedge.exe 85 PID 4380 wrote to memory of 1124 4380 msedge.exe 85 PID 4380 wrote to memory of 4512 4380 msedge.exe 86 PID 4380 wrote to memory of 4512 4380 msedge.exe 86 PID 4380 wrote to memory of 4512 4380 msedge.exe 86 PID 4380 wrote to memory of 4512 4380 msedge.exe 86 PID 4380 wrote to memory of 4512 4380 msedge.exe 86 PID 4380 wrote to memory of 4512 4380 msedge.exe 86 PID 4380 wrote to memory of 4512 4380 msedge.exe 86 PID 4380 wrote to memory of 4512 4380 msedge.exe 86 PID 4380 wrote to memory of 4512 4380 msedge.exe 86 PID 4380 wrote to memory of 4512 4380 msedge.exe 86 PID 4380 wrote to memory of 4512 4380 msedge.exe 86 PID 4380 wrote to memory of 4512 4380 msedge.exe 86 PID 4380 wrote to memory of 4512 4380 msedge.exe 86 PID 4380 wrote to memory of 4512 4380 msedge.exe 86 PID 4380 wrote to memory of 4512 4380 msedge.exe 86 PID 4380 wrote to memory of 4512 4380 msedge.exe 86 PID 4380 wrote to memory of 4512 4380 msedge.exe 86 PID 4380 wrote to memory of 4512 4380 msedge.exe 86 PID 4380 wrote to memory of 4512 4380 msedge.exe 86 PID 4380 wrote to memory of 4512 4380 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\80bfcb686497489eb1bedfb2e5e63fd5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9849246f8,0x7ff984924708,0x7ff9849247182⤵PID:1496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,5189771886576904870,2517774513199770854,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2252 /prefetch:22⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,5189771886576904870,2517774513199770854,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2372 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,5189771886576904870,2517774513199770854,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,5189771886576904870,2517774513199770854,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,5189771886576904870,2517774513199770854,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,5189771886576904870,2517774513199770854,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6088 /prefetch:82⤵PID:808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,5189771886576904870,2517774513199770854,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6088 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,5189771886576904870,2517774513199770854,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6092 /prefetch:12⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,5189771886576904870,2517774513199770854,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:2580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,5189771886576904870,2517774513199770854,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,5189771886576904870,2517774513199770854,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5900 /prefetch:12⤵PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,5189771886576904870,2517774513199770854,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4800 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3584
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3876
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2292
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
724B
MD5b16fb8f778b31b1f1029bda2128fd68d
SHA13adf82082773f61d6197f7df7fdd58bb93f9449a
SHA256ef356b5a2b469d830e5ad97e85c044569e20cc926d810da8bc2ac2a2f3c57669
SHA51258d13d5f4de06c6837fbde54f6573c778f128be506adb1660c118174b5db0fb07876aeb0caf9e55598364d075495282e95c00ce60b37e55b1f255dc2e80e1810
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD543ddccd5b4a8e157006fcda2713c54db
SHA15b23a39cb7aa60ff06738ced1163c7c22c4e6cd1
SHA25680521eeb306501de6c458e1d3225ae3781dddfa90ebc7e283c8891c67c8e92bc
SHA512845ddfbf2dce85d532634920750138f80038d00ac415a00eae527d651bcbc195ee9d8b8fe282a5cd6dbe380304cc947a0ab3f28284db59323927259fcc7c72d1
-
Filesize
6KB
MD50678916616a57ac78d22c651c89bd03d
SHA1f3c7847b5c6e24ac04264765e9378ad0d5b5f01b
SHA2569d42658bd65c78e1122c3c8e1052571d3c8bfe63ca35122986bff5dbb1cbb35a
SHA51217f616ff9183e8ffea39a540825125fa72aa8855f42ed313ea248b9b64c15dfd5987686a355765a846f4545ccac739ef80afb504a5157ca39452e6e076d86e28
-
Filesize
6KB
MD5efbaea5a3e050976c14695b967d82624
SHA15222a3bcf44329ba52b693405aca7725ebc34641
SHA256d851ca3b4e0da07857c4f8a7cabaf4172d844cfdee0b4416ef175ce98a4a51f4
SHA51287abd45906583d6ff4b424ce37c974185c4a872f55f8dd24cb94d5961ccc143f195a7cc388cc45ca821557923021e484c0dada061dbb71425eafdc6e3606acc3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD57bdf0bfebdd761cbe216f1f773d2a8db
SHA1719a3d165503c30eb7285c29418890e9850fe7d3
SHA2566d75f74ec018291fd6cadf3fd5a15490bb4517a2cf55a3e766d582d76383cf3c
SHA5126d3e7929dfcd016b30a2e8002a93525c4d37272420ab5675a7a5a8c04ac91d92b457e333fe35f8d4384166006a9def5562800b4db4caf4d5f4f601d2ab6d57a2