Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30/05/2024, 10:00
Static task
static1
Behavioral task
behavioral1
Sample
83d3f01be158cc9193db82458c177f90_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
83d3f01be158cc9193db82458c177f90_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
83d3f01be158cc9193db82458c177f90_JaffaCakes118.html
-
Size
114KB
-
MD5
83d3f01be158cc9193db82458c177f90
-
SHA1
e37b717eb70fd48c414962e92920fc80f176a999
-
SHA256
ff191131e93196916feb8d8e73ae07376cf941763f4db638d7f566ef9a74b57a
-
SHA512
4c753e66e7b7596d3b3b9e1f262c6202c75a20a0a13b1ae3cafffd0a929030d1708e332d4b01e65cb12ea9eb9c041b6dba2984920c7fe4447c5cb481350d11f0
-
SSDEEP
1536:yyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCsQSz:yyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1236 msedge.exe 1236 msedge.exe 3008 msedge.exe 3008 msedge.exe 2104 identity_helper.exe 2104 identity_helper.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3008 wrote to memory of 1512 3008 msedge.exe 81 PID 3008 wrote to memory of 1512 3008 msedge.exe 81 PID 3008 wrote to memory of 1044 3008 msedge.exe 82 PID 3008 wrote to memory of 1044 3008 msedge.exe 82 PID 3008 wrote to memory of 1044 3008 msedge.exe 82 PID 3008 wrote to memory of 1044 3008 msedge.exe 82 PID 3008 wrote to memory of 1044 3008 msedge.exe 82 PID 3008 wrote to memory of 1044 3008 msedge.exe 82 PID 3008 wrote to memory of 1044 3008 msedge.exe 82 PID 3008 wrote to memory of 1044 3008 msedge.exe 82 PID 3008 wrote to memory of 1044 3008 msedge.exe 82 PID 3008 wrote to memory of 1044 3008 msedge.exe 82 PID 3008 wrote to memory of 1044 3008 msedge.exe 82 PID 3008 wrote to memory of 1044 3008 msedge.exe 82 PID 3008 wrote to memory of 1044 3008 msedge.exe 82 PID 3008 wrote to memory of 1044 3008 msedge.exe 82 PID 3008 wrote to memory of 1044 3008 msedge.exe 82 PID 3008 wrote to memory of 1044 3008 msedge.exe 82 PID 3008 wrote to memory of 1044 3008 msedge.exe 82 PID 3008 wrote to memory of 1044 3008 msedge.exe 82 PID 3008 wrote to memory of 1044 3008 msedge.exe 82 PID 3008 wrote to memory of 1044 3008 msedge.exe 82 PID 3008 wrote to memory of 1044 3008 msedge.exe 82 PID 3008 wrote to memory of 1044 3008 msedge.exe 82 PID 3008 wrote to memory of 1044 3008 msedge.exe 82 PID 3008 wrote to memory of 1044 3008 msedge.exe 82 PID 3008 wrote to memory of 1044 3008 msedge.exe 82 PID 3008 wrote to memory of 1044 3008 msedge.exe 82 PID 3008 wrote to memory of 1044 3008 msedge.exe 82 PID 3008 wrote to memory of 1044 3008 msedge.exe 82 PID 3008 wrote to memory of 1044 3008 msedge.exe 82 PID 3008 wrote to memory of 1044 3008 msedge.exe 82 PID 3008 wrote to memory of 1044 3008 msedge.exe 82 PID 3008 wrote to memory of 1044 3008 msedge.exe 82 PID 3008 wrote to memory of 1044 3008 msedge.exe 82 PID 3008 wrote to memory of 1044 3008 msedge.exe 82 PID 3008 wrote to memory of 1044 3008 msedge.exe 82 PID 3008 wrote to memory of 1044 3008 msedge.exe 82 PID 3008 wrote to memory of 1044 3008 msedge.exe 82 PID 3008 wrote to memory of 1044 3008 msedge.exe 82 PID 3008 wrote to memory of 1044 3008 msedge.exe 82 PID 3008 wrote to memory of 1044 3008 msedge.exe 82 PID 3008 wrote to memory of 1236 3008 msedge.exe 83 PID 3008 wrote to memory of 1236 3008 msedge.exe 83 PID 3008 wrote to memory of 224 3008 msedge.exe 84 PID 3008 wrote to memory of 224 3008 msedge.exe 84 PID 3008 wrote to memory of 224 3008 msedge.exe 84 PID 3008 wrote to memory of 224 3008 msedge.exe 84 PID 3008 wrote to memory of 224 3008 msedge.exe 84 PID 3008 wrote to memory of 224 3008 msedge.exe 84 PID 3008 wrote to memory of 224 3008 msedge.exe 84 PID 3008 wrote to memory of 224 3008 msedge.exe 84 PID 3008 wrote to memory of 224 3008 msedge.exe 84 PID 3008 wrote to memory of 224 3008 msedge.exe 84 PID 3008 wrote to memory of 224 3008 msedge.exe 84 PID 3008 wrote to memory of 224 3008 msedge.exe 84 PID 3008 wrote to memory of 224 3008 msedge.exe 84 PID 3008 wrote to memory of 224 3008 msedge.exe 84 PID 3008 wrote to memory of 224 3008 msedge.exe 84 PID 3008 wrote to memory of 224 3008 msedge.exe 84 PID 3008 wrote to memory of 224 3008 msedge.exe 84 PID 3008 wrote to memory of 224 3008 msedge.exe 84 PID 3008 wrote to memory of 224 3008 msedge.exe 84 PID 3008 wrote to memory of 224 3008 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\83d3f01be158cc9193db82458c177f90_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe875746f8,0x7ffe87574708,0x7ffe875747182⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,3698184698248291814,17077602747461243927,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,3698184698248291814,17077602747461243927,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,3698184698248291814,17077602747461243927,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,3698184698248291814,17077602747461243927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,3698184698248291814,17077602747461243927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,3698184698248291814,17077602747461243927,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5272 /prefetch:82⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,3698184698248291814,17077602747461243927,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5272 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,3698184698248291814,17077602747461243927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,3698184698248291814,17077602747461243927,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,3698184698248291814,17077602747461243927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4116 /prefetch:12⤵PID:428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,3698184698248291814,17077602747461243927,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,3698184698248291814,17077602747461243927,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3188 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4376
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3968
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2424
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
5KB
MD52b5dde5b4591b61f2eca05612a3e12c1
SHA124a83d04a31c48ce829d04aaae474e8ebdf533e5
SHA256b44687d659a5b764f66dc04f900bac40d16fab1c8495c48a6412ac0a1b2286b0
SHA512627217f3b61ef47c5317a3ddfa7e0000bce02e050e43239d53f59a14f7ecdae8eb947cb1969045779f8bd84db4daf85e803f8d6c9707287885e6b5519441d18d
-
Filesize
6KB
MD58ac4659be8a7752c273a5ac135a60d13
SHA115394dbae2160564a193267dc8ed446820c780ef
SHA256866b00e90043c9d75c08c2f11da0dbe384dafff0d3f452c4c7f06c709409b547
SHA512b429dc7f4d7d91e53229256731e427b4ac27f9d939a0b61c148bd92f77ff0664bb4f6d53bbe91ece93f54095bb32e489aceff91117371812de858e54fc91d673
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD53c864f5977a35a3d4247069cf22a5731
SHA11cb481a255fa5437f526f1c9f215f4ddccda6f8f
SHA25649849e76c3a0de9891cb49f8d0c02edfd80aecb7298b77cec4286395222f16e0
SHA512ee62b79b70fa5b292d1fa297bb30d90151d433f19b28406adfab6c5a00b797e83c505f06601d2251dec51c4168bde6500edd4bd9f28c4d4d1db6a1ecb1a4eb9f