Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30-05-2024 07:07
Static task
static1
Behavioral task
behavioral1
Sample
836111206a5b947f9add9b78f382db3a_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
836111206a5b947f9add9b78f382db3a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
836111206a5b947f9add9b78f382db3a_JaffaCakes118.html
-
Size
91KB
-
MD5
836111206a5b947f9add9b78f382db3a
-
SHA1
d5b7945ad4f695980225fbea440595da6d9c3888
-
SHA256
c343ea18342dfcd2c7017f8e22a1b15f2d0ff2b5f5e7621aea697d630ca311c8
-
SHA512
2e44d573dc5a2c8af6a5e98eacd30a871ba20737515f931683402a74d1e0310a242fbbef8d1407190a1038be123cf0107abff855e8500012659adcb99edc3c6b
-
SSDEEP
1536:yMZUbMW54o5cHASENzT8rdak4cllrlwDWn17yGkFVL:AbMW8H3ENT8rdak4St+DWnTkFVL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4848 msedge.exe 4848 msedge.exe 3388 msedge.exe 3388 msedge.exe 5076 identity_helper.exe 5076 identity_helper.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3388 wrote to memory of 600 3388 msedge.exe 82 PID 3388 wrote to memory of 600 3388 msedge.exe 82 PID 3388 wrote to memory of 3496 3388 msedge.exe 83 PID 3388 wrote to memory of 3496 3388 msedge.exe 83 PID 3388 wrote to memory of 3496 3388 msedge.exe 83 PID 3388 wrote to memory of 3496 3388 msedge.exe 83 PID 3388 wrote to memory of 3496 3388 msedge.exe 83 PID 3388 wrote to memory of 3496 3388 msedge.exe 83 PID 3388 wrote to memory of 3496 3388 msedge.exe 83 PID 3388 wrote to memory of 3496 3388 msedge.exe 83 PID 3388 wrote to memory of 3496 3388 msedge.exe 83 PID 3388 wrote to memory of 3496 3388 msedge.exe 83 PID 3388 wrote to memory of 3496 3388 msedge.exe 83 PID 3388 wrote to memory of 3496 3388 msedge.exe 83 PID 3388 wrote to memory of 3496 3388 msedge.exe 83 PID 3388 wrote to memory of 3496 3388 msedge.exe 83 PID 3388 wrote to memory of 3496 3388 msedge.exe 83 PID 3388 wrote to memory of 3496 3388 msedge.exe 83 PID 3388 wrote to memory of 3496 3388 msedge.exe 83 PID 3388 wrote to memory of 3496 3388 msedge.exe 83 PID 3388 wrote to memory of 3496 3388 msedge.exe 83 PID 3388 wrote to memory of 3496 3388 msedge.exe 83 PID 3388 wrote to memory of 3496 3388 msedge.exe 83 PID 3388 wrote to memory of 3496 3388 msedge.exe 83 PID 3388 wrote to memory of 3496 3388 msedge.exe 83 PID 3388 wrote to memory of 3496 3388 msedge.exe 83 PID 3388 wrote to memory of 3496 3388 msedge.exe 83 PID 3388 wrote to memory of 3496 3388 msedge.exe 83 PID 3388 wrote to memory of 3496 3388 msedge.exe 83 PID 3388 wrote to memory of 3496 3388 msedge.exe 83 PID 3388 wrote to memory of 3496 3388 msedge.exe 83 PID 3388 wrote to memory of 3496 3388 msedge.exe 83 PID 3388 wrote to memory of 3496 3388 msedge.exe 83 PID 3388 wrote to memory of 3496 3388 msedge.exe 83 PID 3388 wrote to memory of 3496 3388 msedge.exe 83 PID 3388 wrote to memory of 3496 3388 msedge.exe 83 PID 3388 wrote to memory of 3496 3388 msedge.exe 83 PID 3388 wrote to memory of 3496 3388 msedge.exe 83 PID 3388 wrote to memory of 3496 3388 msedge.exe 83 PID 3388 wrote to memory of 3496 3388 msedge.exe 83 PID 3388 wrote to memory of 3496 3388 msedge.exe 83 PID 3388 wrote to memory of 3496 3388 msedge.exe 83 PID 3388 wrote to memory of 4848 3388 msedge.exe 84 PID 3388 wrote to memory of 4848 3388 msedge.exe 84 PID 3388 wrote to memory of 2288 3388 msedge.exe 85 PID 3388 wrote to memory of 2288 3388 msedge.exe 85 PID 3388 wrote to memory of 2288 3388 msedge.exe 85 PID 3388 wrote to memory of 2288 3388 msedge.exe 85 PID 3388 wrote to memory of 2288 3388 msedge.exe 85 PID 3388 wrote to memory of 2288 3388 msedge.exe 85 PID 3388 wrote to memory of 2288 3388 msedge.exe 85 PID 3388 wrote to memory of 2288 3388 msedge.exe 85 PID 3388 wrote to memory of 2288 3388 msedge.exe 85 PID 3388 wrote to memory of 2288 3388 msedge.exe 85 PID 3388 wrote to memory of 2288 3388 msedge.exe 85 PID 3388 wrote to memory of 2288 3388 msedge.exe 85 PID 3388 wrote to memory of 2288 3388 msedge.exe 85 PID 3388 wrote to memory of 2288 3388 msedge.exe 85 PID 3388 wrote to memory of 2288 3388 msedge.exe 85 PID 3388 wrote to memory of 2288 3388 msedge.exe 85 PID 3388 wrote to memory of 2288 3388 msedge.exe 85 PID 3388 wrote to memory of 2288 3388 msedge.exe 85 PID 3388 wrote to memory of 2288 3388 msedge.exe 85 PID 3388 wrote to memory of 2288 3388 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\836111206a5b947f9add9b78f382db3a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xdc,0xe0,0xe4,0xd8,0x108,0x7ffffdc046f8,0x7ffffdc04708,0x7ffffdc047182⤵PID:600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,8870585401308330839,16856234195625612156,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:22⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2016,8870585401308330839,16856234195625612156,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1868 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2016,8870585401308330839,16856234195625612156,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2620 /prefetch:82⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,8870585401308330839,16856234195625612156,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,8870585401308330839,16856234195625612156,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,8870585401308330839,16856234195625612156,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1772 /prefetch:12⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,8870585401308330839,16856234195625612156,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3872 /prefetch:12⤵PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,8870585401308330839,16856234195625612156,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5784 /prefetch:82⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,8870585401308330839,16856234195625612156,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5784 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,8870585401308330839,16856234195625612156,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,8870585401308330839,16856234195625612156,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4884 /prefetch:12⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,8870585401308330839,16856234195625612156,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,8870585401308330839,16856234195625612156,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,8870585401308330839,16856234195625612156,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1388 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2636
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:924
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3556
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
648B
MD5950414b284a5611f66dc6cda6ccd8b28
SHA13f28c73773ca07d4644a60845442f65c6e8250b9
SHA256323cc74b850cff19c501c77a4d06fc547dbec6bde9f45fc5ea638eab51d2da36
SHA51271c3a07246cd04932fa01429a1d84de984fad4d8e87bfc8f11bbd0a10c040ae30c1d052d753e0d918c32293d3c03f90e06096357d5c795aada8d87e714356273
-
Filesize
5KB
MD5af3cc3036b1a895db172569915f5ee96
SHA139cc7a463fcc903d53ad2f7274694150b92b3419
SHA2568e208b66ac411b16718beaa895c72c7483b63528e4ab25ba3df7a79557907485
SHA512db58d2b7dfb9543f6a6a914d9d2b125337fd49706c863e056e71f10bae2dba6b509d765d5f3aa232b85d1aaafdded78de60fe26db8592976738c470244b37b7a
-
Filesize
6KB
MD5c5f8deef867f5eac3721954522aed13c
SHA14d14b238702b3e37d670f0e370c52d02282223ee
SHA256191c4a1ede2cd06540126bb6db40355cc7a91fba57266ccd3fd2b362cac8b942
SHA51244f29239db8cbac88396a00c098031619fffde152c5b0897cb82f2c0e62ebca1ae88a07085c654bb1be721a9de346a0b895bb751f4f2ec5941f82f6af6bf7098
-
Filesize
6KB
MD58a867f8429eeeeae1643fd8d2ea7754a
SHA1b738cb2991b0cb487a1fb1941853fda1aa442c2b
SHA2567863d7bd42671d88c31b73e8cfab7cc62aa7b244a52e12ab10078fbc4bc8985d
SHA51221e89a48db76f97fc3309b57736d697d7214a5888651a4fc9b0e9804ebfc459016913ff1d06095d4fe3225970394f20f48f3ac233bfaf6f27c72986e43bac35b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD56960446187116504cb5c7a27a5be4e14
SHA1bda8a01a0fadeff3908087d27a0edcc075bc06e5
SHA25695bed9ec781a9f27cdddcf4bbe7d07bbdf0b8dc38eaf679b858cc74c2f470198
SHA512b342e20ff77473542d4a76c2585e67d3af7c6ae0a1de2e100f872cae325eb5315c502041dc7302a48f19dd0aa885c0fec92e02a978153b96ac39d661fc30cc9a