Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30-05-2024 23:11
Static task
static1
Behavioral task
behavioral1
Sample
853942f1b5935f558c855c2807df7dfa_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
853942f1b5935f558c855c2807df7dfa_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
853942f1b5935f558c855c2807df7dfa_JaffaCakes118.html
-
Size
129KB
-
MD5
853942f1b5935f558c855c2807df7dfa
-
SHA1
462901f8c8dc61d933ff387ff62217b29115c3d3
-
SHA256
cef7b6554daedf933d4688c304448f7dec09e9801322e691cd06b2d1f254a4ef
-
SHA512
383d6b87c4b5c21c9d8347b65c4727a2bcf29a08fa7f958b57567d8b6bc6d9a6b5fba755dfce58f9a8531da610df8ac92b36110214d028cbb7b5b14af061ed1e
-
SSDEEP
3072:ltBGq1KzriYn5OL/T/WQc3iyp4GZuV8wZQAPJBEd:ltv1CiC8L/T/WQc3iyp4GZuV8wZQAPJg
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1948 msedge.exe 1948 msedge.exe 4368 msedge.exe 4368 msedge.exe 2684 identity_helper.exe 2684 identity_helper.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4368 wrote to memory of 4568 4368 msedge.exe 81 PID 4368 wrote to memory of 4568 4368 msedge.exe 81 PID 4368 wrote to memory of 2776 4368 msedge.exe 82 PID 4368 wrote to memory of 2776 4368 msedge.exe 82 PID 4368 wrote to memory of 2776 4368 msedge.exe 82 PID 4368 wrote to memory of 2776 4368 msedge.exe 82 PID 4368 wrote to memory of 2776 4368 msedge.exe 82 PID 4368 wrote to memory of 2776 4368 msedge.exe 82 PID 4368 wrote to memory of 2776 4368 msedge.exe 82 PID 4368 wrote to memory of 2776 4368 msedge.exe 82 PID 4368 wrote to memory of 2776 4368 msedge.exe 82 PID 4368 wrote to memory of 2776 4368 msedge.exe 82 PID 4368 wrote to memory of 2776 4368 msedge.exe 82 PID 4368 wrote to memory of 2776 4368 msedge.exe 82 PID 4368 wrote to memory of 2776 4368 msedge.exe 82 PID 4368 wrote to memory of 2776 4368 msedge.exe 82 PID 4368 wrote to memory of 2776 4368 msedge.exe 82 PID 4368 wrote to memory of 2776 4368 msedge.exe 82 PID 4368 wrote to memory of 2776 4368 msedge.exe 82 PID 4368 wrote to memory of 2776 4368 msedge.exe 82 PID 4368 wrote to memory of 2776 4368 msedge.exe 82 PID 4368 wrote to memory of 2776 4368 msedge.exe 82 PID 4368 wrote to memory of 2776 4368 msedge.exe 82 PID 4368 wrote to memory of 2776 4368 msedge.exe 82 PID 4368 wrote to memory of 2776 4368 msedge.exe 82 PID 4368 wrote to memory of 2776 4368 msedge.exe 82 PID 4368 wrote to memory of 2776 4368 msedge.exe 82 PID 4368 wrote to memory of 2776 4368 msedge.exe 82 PID 4368 wrote to memory of 2776 4368 msedge.exe 82 PID 4368 wrote to memory of 2776 4368 msedge.exe 82 PID 4368 wrote to memory of 2776 4368 msedge.exe 82 PID 4368 wrote to memory of 2776 4368 msedge.exe 82 PID 4368 wrote to memory of 2776 4368 msedge.exe 82 PID 4368 wrote to memory of 2776 4368 msedge.exe 82 PID 4368 wrote to memory of 2776 4368 msedge.exe 82 PID 4368 wrote to memory of 2776 4368 msedge.exe 82 PID 4368 wrote to memory of 2776 4368 msedge.exe 82 PID 4368 wrote to memory of 2776 4368 msedge.exe 82 PID 4368 wrote to memory of 2776 4368 msedge.exe 82 PID 4368 wrote to memory of 2776 4368 msedge.exe 82 PID 4368 wrote to memory of 2776 4368 msedge.exe 82 PID 4368 wrote to memory of 2776 4368 msedge.exe 82 PID 4368 wrote to memory of 1948 4368 msedge.exe 83 PID 4368 wrote to memory of 1948 4368 msedge.exe 83 PID 4368 wrote to memory of 3144 4368 msedge.exe 84 PID 4368 wrote to memory of 3144 4368 msedge.exe 84 PID 4368 wrote to memory of 3144 4368 msedge.exe 84 PID 4368 wrote to memory of 3144 4368 msedge.exe 84 PID 4368 wrote to memory of 3144 4368 msedge.exe 84 PID 4368 wrote to memory of 3144 4368 msedge.exe 84 PID 4368 wrote to memory of 3144 4368 msedge.exe 84 PID 4368 wrote to memory of 3144 4368 msedge.exe 84 PID 4368 wrote to memory of 3144 4368 msedge.exe 84 PID 4368 wrote to memory of 3144 4368 msedge.exe 84 PID 4368 wrote to memory of 3144 4368 msedge.exe 84 PID 4368 wrote to memory of 3144 4368 msedge.exe 84 PID 4368 wrote to memory of 3144 4368 msedge.exe 84 PID 4368 wrote to memory of 3144 4368 msedge.exe 84 PID 4368 wrote to memory of 3144 4368 msedge.exe 84 PID 4368 wrote to memory of 3144 4368 msedge.exe 84 PID 4368 wrote to memory of 3144 4368 msedge.exe 84 PID 4368 wrote to memory of 3144 4368 msedge.exe 84 PID 4368 wrote to memory of 3144 4368 msedge.exe 84 PID 4368 wrote to memory of 3144 4368 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\853942f1b5935f558c855c2807df7dfa_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa4a9b46f8,0x7ffa4a9b4708,0x7ffa4a9b47182⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,18237077031757305127,8858073271256354089,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:2776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,18237077031757305127,8858073271256354089,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,18237077031757305127,8858073271256354089,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18237077031757305127,8858073271256354089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18237077031757305127,8858073271256354089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18237077031757305127,8858073271256354089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6140 /prefetch:12⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18237077031757305127,8858073271256354089,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6100 /prefetch:12⤵PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,18237077031757305127,8858073271256354089,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5580 /prefetch:82⤵PID:2304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,18237077031757305127,8858073271256354089,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5580 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18237077031757305127,8858073271256354089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4092 /prefetch:12⤵PID:416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18237077031757305127,8858073271256354089,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,18237077031757305127,8858073271256354089,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4892 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:236
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4224
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
1KB
MD54b3a7b7788c0e92b1d2ded00daf83581
SHA19e7a14b73f4834c2cd96f8ced6dc7b6e846fb0ac
SHA256fa3365b167a3c4efe0078f2f7c27f8c4c96e5778ddddd5f1c75dcd6078a2811f
SHA512fa10c500c364b91bb2d023d50856ee426c96305019ca26ca20174cd6983c550490b37d1feb32ad1afd1e07b868dbabbb747aa5e791d6ffd29842cf787b01fe29
-
Filesize
5KB
MD5aaf5fc61b1acc6710cb067e39c375b5d
SHA18e05dca00a5fe00ef176a378d415ca7a1e3c53f1
SHA256d66a2772e77dee406a491d9da38eddc9d8f7bba8b4d72e27fe4b844d451f350f
SHA512afa401dc779f1274709325f68f727958eb912ac2e96da5c128f1ba02b7643e600cbad34517aecb061cbde657d7572c30c6a01d9e37727d0fb9e1415e3ba5b738
-
Filesize
6KB
MD5bf7233276b84534ccbf92f2824ae0b0f
SHA1676791f6a6dc3f9ed2563d440c208d99dd4e0db9
SHA256311b703ec7d801da78a4a37a777dc9e1562a775e95ffc0c9b7598d9345d3ef10
SHA512c54e1bc37c4275ea9d9563bfde4888fb0525d06e193d30136109cbea9aca1d1a485da380bfbb82a9d46c2e7272833fb512813b9e3855cc18385734e609c8fa01
-
Filesize
6KB
MD5d0e6ffb9769a929e16a7906746dd8b22
SHA1762efcb5dabd222ef41eee893ffd268cc7cfdf68
SHA25684bfc34368e24fd278326376e7d66ff4e44563f6f2388397ca5112f4b8619545
SHA512ffc4b7aa470df2d5fcff2507131d64fdd9ee69f99bfe45d503a3e075a5de02fca243c4dbf5f31e9926d508cbd890289aad15246e92e4712367b8961a4695fd9b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD59f45b4ded8028830c0555ecc29c6e315
SHA14c5fc2ee28dfbadb6c8f8152b47937fd03096e2e
SHA2567c7158e1f143053833f69563c045cb39321e4abdcc31ce3308bd986a848c8f32
SHA51223e5634f5d7d9df8eb34630504c96e01dd8632d93ef5c2e5880edb80b328c58fc27e42de9a174114d95fe685530e8da6202c1b593363451d34c4c3764807cd96