Analysis
-
max time kernel
145s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30/05/2024, 04:55
Static task
static1
Behavioral task
behavioral1
Sample
831705560c4cfde8a22cb961465484ae_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
831705560c4cfde8a22cb961465484ae_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
831705560c4cfde8a22cb961465484ae_JaffaCakes118.html
-
Size
25KB
-
MD5
831705560c4cfde8a22cb961465484ae
-
SHA1
126f557f5e273debefe9f0ddd173301ad6895f45
-
SHA256
8372236f5b7dcc7ef773e40652953e76f8f8d82f1e0dcf2168f5e35b32dd6744
-
SHA512
18022bdf96232b1c192fda29b427de39e7d85033ef0c9542c2b4315dcc778cb17ae1a8ed0f9a94d039839d3ce80a857afb06e6b095d79bc0f2a3689c2df214b2
-
SSDEEP
192:uW/syb5nFinQjxn5Q/wnQiebNnXnQOkEnt0SnQTbnFnQ+YqCfA+pdEi4cwqHXMBA:1Q/TDbbOA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1416 msedge.exe 1416 msedge.exe 3160 msedge.exe 3160 msedge.exe 3760 identity_helper.exe 3760 identity_helper.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3160 wrote to memory of 3840 3160 msedge.exe 83 PID 3160 wrote to memory of 3840 3160 msedge.exe 83 PID 3160 wrote to memory of 4048 3160 msedge.exe 84 PID 3160 wrote to memory of 4048 3160 msedge.exe 84 PID 3160 wrote to memory of 4048 3160 msedge.exe 84 PID 3160 wrote to memory of 4048 3160 msedge.exe 84 PID 3160 wrote to memory of 4048 3160 msedge.exe 84 PID 3160 wrote to memory of 4048 3160 msedge.exe 84 PID 3160 wrote to memory of 4048 3160 msedge.exe 84 PID 3160 wrote to memory of 4048 3160 msedge.exe 84 PID 3160 wrote to memory of 4048 3160 msedge.exe 84 PID 3160 wrote to memory of 4048 3160 msedge.exe 84 PID 3160 wrote to memory of 4048 3160 msedge.exe 84 PID 3160 wrote to memory of 4048 3160 msedge.exe 84 PID 3160 wrote to memory of 4048 3160 msedge.exe 84 PID 3160 wrote to memory of 4048 3160 msedge.exe 84 PID 3160 wrote to memory of 4048 3160 msedge.exe 84 PID 3160 wrote to memory of 4048 3160 msedge.exe 84 PID 3160 wrote to memory of 4048 3160 msedge.exe 84 PID 3160 wrote to memory of 4048 3160 msedge.exe 84 PID 3160 wrote to memory of 4048 3160 msedge.exe 84 PID 3160 wrote to memory of 4048 3160 msedge.exe 84 PID 3160 wrote to memory of 4048 3160 msedge.exe 84 PID 3160 wrote to memory of 4048 3160 msedge.exe 84 PID 3160 wrote to memory of 4048 3160 msedge.exe 84 PID 3160 wrote to memory of 4048 3160 msedge.exe 84 PID 3160 wrote to memory of 4048 3160 msedge.exe 84 PID 3160 wrote to memory of 4048 3160 msedge.exe 84 PID 3160 wrote to memory of 4048 3160 msedge.exe 84 PID 3160 wrote to memory of 4048 3160 msedge.exe 84 PID 3160 wrote to memory of 4048 3160 msedge.exe 84 PID 3160 wrote to memory of 4048 3160 msedge.exe 84 PID 3160 wrote to memory of 4048 3160 msedge.exe 84 PID 3160 wrote to memory of 4048 3160 msedge.exe 84 PID 3160 wrote to memory of 4048 3160 msedge.exe 84 PID 3160 wrote to memory of 4048 3160 msedge.exe 84 PID 3160 wrote to memory of 4048 3160 msedge.exe 84 PID 3160 wrote to memory of 4048 3160 msedge.exe 84 PID 3160 wrote to memory of 4048 3160 msedge.exe 84 PID 3160 wrote to memory of 4048 3160 msedge.exe 84 PID 3160 wrote to memory of 4048 3160 msedge.exe 84 PID 3160 wrote to memory of 4048 3160 msedge.exe 84 PID 3160 wrote to memory of 1416 3160 msedge.exe 85 PID 3160 wrote to memory of 1416 3160 msedge.exe 85 PID 3160 wrote to memory of 4592 3160 msedge.exe 86 PID 3160 wrote to memory of 4592 3160 msedge.exe 86 PID 3160 wrote to memory of 4592 3160 msedge.exe 86 PID 3160 wrote to memory of 4592 3160 msedge.exe 86 PID 3160 wrote to memory of 4592 3160 msedge.exe 86 PID 3160 wrote to memory of 4592 3160 msedge.exe 86 PID 3160 wrote to memory of 4592 3160 msedge.exe 86 PID 3160 wrote to memory of 4592 3160 msedge.exe 86 PID 3160 wrote to memory of 4592 3160 msedge.exe 86 PID 3160 wrote to memory of 4592 3160 msedge.exe 86 PID 3160 wrote to memory of 4592 3160 msedge.exe 86 PID 3160 wrote to memory of 4592 3160 msedge.exe 86 PID 3160 wrote to memory of 4592 3160 msedge.exe 86 PID 3160 wrote to memory of 4592 3160 msedge.exe 86 PID 3160 wrote to memory of 4592 3160 msedge.exe 86 PID 3160 wrote to memory of 4592 3160 msedge.exe 86 PID 3160 wrote to memory of 4592 3160 msedge.exe 86 PID 3160 wrote to memory of 4592 3160 msedge.exe 86 PID 3160 wrote to memory of 4592 3160 msedge.exe 86 PID 3160 wrote to memory of 4592 3160 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\831705560c4cfde8a22cb961465484ae_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8c0ef46f8,0x7ff8c0ef4708,0x7ff8c0ef47182⤵PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,1587919571829122720,6623587264511326949,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2040 /prefetch:22⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2012,1587919571829122720,6623587264511326949,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2012,1587919571829122720,6623587264511326949,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:82⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,1587919571829122720,6623587264511326949,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,1587919571829122720,6623587264511326949,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,1587919571829122720,6623587264511326949,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:82⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,1587919571829122720,6623587264511326949,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,1587919571829122720,6623587264511326949,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3964 /prefetch:12⤵PID:1808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,1587919571829122720,6623587264511326949,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,1587919571829122720,6623587264511326949,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,1587919571829122720,6623587264511326949,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,1587919571829122720,6623587264511326949,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1984 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4220
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1676
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
5KB
MD5f18331dbe302c0cc911c92c4f66ef8ec
SHA1b5efec771e6e00daadaa18ece486e1a73e8db1e5
SHA25685ce1fc99aa3b1fd089585555d2127a992d157d8d7ce4d3e24041e8f18bc500d
SHA5123492731bef6254ba493057275d89efe1afc78247ba683b7b92baaa37d065348960d865b9bdd6be2dd5d68cc2ed99fc91f9b0c0bbd32b5c0322be50bde4361c3f
-
Filesize
6KB
MD57194806934c10d360432630d77a6b325
SHA19147b7b49acd39ba7ef9e38374b78b5e1cee1cf8
SHA2566966ce02338910053e7e12a73f4e470306f5e85fc83a16be71a1061051152c0d
SHA51297ba98cb5a274fe768b3701f3f5cb8a314967439544cfdc4139b30264ad7f0dfc81b62c42c19e38f9efdfeedd07b03c0c83532625dc6eb02f258b02e59a1817e
-
Filesize
6KB
MD529c08c13d47fdf2da600e08fa443593e
SHA1c8c727a5eeae5cb210e988dd284cf4ddb58f3dea
SHA256ef76e03d0daebf5de25346e1904472f08ed4a6bf2cb9c3b98a9db2c6365856b6
SHA512a32b97ae4147b60eeae629d50c90707d4be3d8683167dc31571c022b8daa2364817d6993b1e20a00b5da1e61336070826ceb02f41fadd6004223205e79442773
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD518adff2cdd3be69f982c544e1f3b3c75
SHA11bd8553c455ddfff6a5e805e6a4de50747cd085e
SHA25607b8b1c76adfd8484c0ac5040f6f43ad805188652d94f6765c437014c40c2b6b
SHA512136d2b7fff9944a2ba487f3173a9d8c6fb9bbba5d06f58c4acdd58bd786dffc8fb9a0be7d243b8f790a0da31df0a312ca91d7a816fe37b42789620f1e2774372