Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30-05-2024 11:44
Static task
static1
Behavioral task
behavioral1
Sample
841d60f773876f3e9d8a01a9341c548e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
841d60f773876f3e9d8a01a9341c548e_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
841d60f773876f3e9d8a01a9341c548e_JaffaCakes118.html
-
Size
134KB
-
MD5
841d60f773876f3e9d8a01a9341c548e
-
SHA1
fa6dff7cc81f837819bac2dca6f6dfcb651c1547
-
SHA256
7290b36ae207801c9f3f2e00e49ded8607c9c349c8170901f824bbc7d91e6964
-
SHA512
30e3fdc2048dfef2e8e11e5a39474d707e61e9f9224c02339f8711f49b9905284a550869d9f953e2c63629030aed9feea20d4c619850caf8996f3fbb320756bd
-
SSDEEP
1536:SF0FGFuOtuyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTs:S+W8yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 5352 msedge.exe 5352 msedge.exe 1412 msedge.exe 1412 msedge.exe 1900 identity_helper.exe 1900 identity_helper.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1412 wrote to memory of 4356 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 4356 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5184 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5184 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5184 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5184 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5184 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5184 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5184 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5184 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5184 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5184 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5184 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5184 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5184 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5184 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5184 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5184 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5184 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5184 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5184 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5184 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5184 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5184 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5184 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5184 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5184 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5184 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5184 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5184 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5184 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5184 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5184 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5184 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5184 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5184 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5184 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5184 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5184 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5184 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5184 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5184 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5352 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5352 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5836 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5836 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5836 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5836 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5836 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5836 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5836 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5836 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5836 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5836 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5836 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5836 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5836 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5836 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5836 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5836 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5836 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5836 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5836 1412 msedge.exe msedge.exe PID 1412 wrote to memory of 5836 1412 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\841d60f773876f3e9d8a01a9341c548e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9a4f946f8,0x7ff9a4f94708,0x7ff9a4f947182⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,16005273546847722531,11231491642459754793,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:5184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,16005273546847722531,11231491642459754793,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2084 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,16005273546847722531,11231491642459754793,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:5836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16005273546847722531,11231491642459754793,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16005273546847722531,11231491642459754793,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:5316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,16005273546847722531,11231491642459754793,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 /prefetch:82⤵PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,16005273546847722531,11231491642459754793,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16005273546847722531,11231491642459754793,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16005273546847722531,11231491642459754793,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16005273546847722531,11231491642459754793,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:5808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16005273546847722531,11231491642459754793,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:5812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,16005273546847722531,11231491642459754793,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2728 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6028
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3152
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
5KB
MD5d2a462c151f994ef02c5f5ded15160d2
SHA1fafc376c08dfa74c76d82a2f59d09cb66f4d3272
SHA2560d1db1088d082f6510d295ddb0a301e033f39edc1b51e1a66f80fe9432bdaef7
SHA512b1872f5d822730b55ecb1d7ba46d002f75a7064e51b37731370de5cd9703550075a013ae8dc6b0d3f35ef07334b116adb8e6372a2cd0cec41ddc42d29ce9ffa1
-
Filesize
6KB
MD555edcdcef539349f4f8845e0c19911be
SHA11a2aa015aff3a03840b99d6d5b249dd8dea98a40
SHA25698e1a52281156140ff6f3ba84d5d46b6fd51b931b484dc4af33939a8eda1e8d3
SHA5120e27bf3da118725369e5d2c75bfda9bb111405ed36b00fb843a89c2b9c2834424670a16fa2c8f20287486782752d8a8a7adbcba6c6d10809600d5fa0e5ee66c9
-
Filesize
6KB
MD5e8fbac68386e5a2f03ff642b8a6e7609
SHA1d90cdb6873baaceafce5501ed680cf8e469e917b
SHA25644cb7be2068fa3a3e7054d1a5da19129edb004fd4c54b2d71f6d0746de42b608
SHA512234bc8c8906f4c2e0072037b8181d0ef6f12cbde925aefa877baed2057995cbf3f917a2a1d4d7549b67dae37ec6a725807d093944560456e18090507455c54ee
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d8e3cc03bc3edf4701e19ebc62145a1b
SHA123145bd70035ee2ad97628599bda77ecdf0eb3d0
SHA25625482f036ec08db5972b23caae8552be68e327e7a63451afb1a706fa403b89e0
SHA5128ac3909896d1ad3d046dce7359b4ed4579610275f8d326d00924331258f1171ea2e7982021a48cc959d9d641440853eb12fb36e4b84dda9ccc11cd5f49272f26
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e