Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
31/05/2024, 22:29
Static task
static1
Behavioral task
behavioral1
Sample
88937bc2ee5cfa27fde292ffdb801607_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
88937bc2ee5cfa27fde292ffdb801607_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
88937bc2ee5cfa27fde292ffdb801607_JaffaCakes118.html
-
Size
26KB
-
MD5
88937bc2ee5cfa27fde292ffdb801607
-
SHA1
e819cdf415c435ccfd2258ebbc2ce7e451683599
-
SHA256
c7faafc5f0181e8541ffc24ab5ecac509da9ea3b504ea4174078b684eab388f6
-
SHA512
cb0e388ecc28e1c797eb590867c951263e90550d186030f43a664a769a21ecc46b2fabe064eaba775294fb88e8107714bcf02d0c258fce0ae109da3cb13597f5
-
SSDEEP
192:uqDvvTb5npunQjxn5Q/YnQiezNn5nQOkEntQ2nQTbn5nQPCJVevo7NtiFo+NzQ4U:n3Q//ygc9FNZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1148 msedge.exe 1148 msedge.exe 1876 msedge.exe 1876 msedge.exe 4280 identity_helper.exe 4280 identity_helper.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1876 wrote to memory of 3300 1876 msedge.exe 82 PID 1876 wrote to memory of 3300 1876 msedge.exe 82 PID 1876 wrote to memory of 2524 1876 msedge.exe 83 PID 1876 wrote to memory of 2524 1876 msedge.exe 83 PID 1876 wrote to memory of 2524 1876 msedge.exe 83 PID 1876 wrote to memory of 2524 1876 msedge.exe 83 PID 1876 wrote to memory of 2524 1876 msedge.exe 83 PID 1876 wrote to memory of 2524 1876 msedge.exe 83 PID 1876 wrote to memory of 2524 1876 msedge.exe 83 PID 1876 wrote to memory of 2524 1876 msedge.exe 83 PID 1876 wrote to memory of 2524 1876 msedge.exe 83 PID 1876 wrote to memory of 2524 1876 msedge.exe 83 PID 1876 wrote to memory of 2524 1876 msedge.exe 83 PID 1876 wrote to memory of 2524 1876 msedge.exe 83 PID 1876 wrote to memory of 2524 1876 msedge.exe 83 PID 1876 wrote to memory of 2524 1876 msedge.exe 83 PID 1876 wrote to memory of 2524 1876 msedge.exe 83 PID 1876 wrote to memory of 2524 1876 msedge.exe 83 PID 1876 wrote to memory of 2524 1876 msedge.exe 83 PID 1876 wrote to memory of 2524 1876 msedge.exe 83 PID 1876 wrote to memory of 2524 1876 msedge.exe 83 PID 1876 wrote to memory of 2524 1876 msedge.exe 83 PID 1876 wrote to memory of 2524 1876 msedge.exe 83 PID 1876 wrote to memory of 2524 1876 msedge.exe 83 PID 1876 wrote to memory of 2524 1876 msedge.exe 83 PID 1876 wrote to memory of 2524 1876 msedge.exe 83 PID 1876 wrote to memory of 2524 1876 msedge.exe 83 PID 1876 wrote to memory of 2524 1876 msedge.exe 83 PID 1876 wrote to memory of 2524 1876 msedge.exe 83 PID 1876 wrote to memory of 2524 1876 msedge.exe 83 PID 1876 wrote to memory of 2524 1876 msedge.exe 83 PID 1876 wrote to memory of 2524 1876 msedge.exe 83 PID 1876 wrote to memory of 2524 1876 msedge.exe 83 PID 1876 wrote to memory of 2524 1876 msedge.exe 83 PID 1876 wrote to memory of 2524 1876 msedge.exe 83 PID 1876 wrote to memory of 2524 1876 msedge.exe 83 PID 1876 wrote to memory of 2524 1876 msedge.exe 83 PID 1876 wrote to memory of 2524 1876 msedge.exe 83 PID 1876 wrote to memory of 2524 1876 msedge.exe 83 PID 1876 wrote to memory of 2524 1876 msedge.exe 83 PID 1876 wrote to memory of 2524 1876 msedge.exe 83 PID 1876 wrote to memory of 2524 1876 msedge.exe 83 PID 1876 wrote to memory of 1148 1876 msedge.exe 84 PID 1876 wrote to memory of 1148 1876 msedge.exe 84 PID 1876 wrote to memory of 2784 1876 msedge.exe 85 PID 1876 wrote to memory of 2784 1876 msedge.exe 85 PID 1876 wrote to memory of 2784 1876 msedge.exe 85 PID 1876 wrote to memory of 2784 1876 msedge.exe 85 PID 1876 wrote to memory of 2784 1876 msedge.exe 85 PID 1876 wrote to memory of 2784 1876 msedge.exe 85 PID 1876 wrote to memory of 2784 1876 msedge.exe 85 PID 1876 wrote to memory of 2784 1876 msedge.exe 85 PID 1876 wrote to memory of 2784 1876 msedge.exe 85 PID 1876 wrote to memory of 2784 1876 msedge.exe 85 PID 1876 wrote to memory of 2784 1876 msedge.exe 85 PID 1876 wrote to memory of 2784 1876 msedge.exe 85 PID 1876 wrote to memory of 2784 1876 msedge.exe 85 PID 1876 wrote to memory of 2784 1876 msedge.exe 85 PID 1876 wrote to memory of 2784 1876 msedge.exe 85 PID 1876 wrote to memory of 2784 1876 msedge.exe 85 PID 1876 wrote to memory of 2784 1876 msedge.exe 85 PID 1876 wrote to memory of 2784 1876 msedge.exe 85 PID 1876 wrote to memory of 2784 1876 msedge.exe 85 PID 1876 wrote to memory of 2784 1876 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\88937bc2ee5cfa27fde292ffdb801607_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa37e46f8,0x7ffaa37e4708,0x7ffaa37e47182⤵PID:3300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,878418223289123715,2590941179677544313,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:22⤵PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,878418223289123715,2590941179677544313,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,878418223289123715,2590941179677544313,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:2784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,878418223289123715,2590941179677544313,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,878418223289123715,2590941179677544313,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,878418223289123715,2590941179677544313,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4792 /prefetch:82⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,878418223289123715,2590941179677544313,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4792 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,878418223289123715,2590941179677544313,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,878418223289123715,2590941179677544313,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,878418223289123715,2590941179677544313,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,878418223289123715,2590941179677544313,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,878418223289123715,2590941179677544313,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1272 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5100
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2584
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD5ef88331ad89758df905ca20705cb3b71
SHA1fb4be962daad8f5d66c41c9ba78c053a9168c30a
SHA25678aefa78e74724a60fe081ce90bca7724e837f19a8e3c8da41e7dc2e9a5aaa25
SHA512af029ae9be3b8a7c0749d0e07d76bf97b24853119ef2bb4365036fc1d8e776b542e93e53819b210b392670c24687a21d20ff85d189bab8b9f90341fed3ac0ddf
-
Filesize
6KB
MD51af946e251608da241af6960d8f02c06
SHA1ffc1d7456e5dd9c7983d3e392c8786aeff29faed
SHA2567f0bac35c05dcd8e5514bedebba8b921e63440c2e8614224668089f260d2d639
SHA5129c54172ce92a0127aaa94c41c2b2ef5545be923ed83acb5b3f2c704305220ec8f7066989a12ad3262c47a598cd47eaed85f53f06a1aae7dafba4d0d29c8d0321
-
Filesize
6KB
MD57e95ef6bbfd59b5e9df082b9a003e73a
SHA15615c863fa8514e435a4f037fa2219543385a796
SHA2566b67c1f1e77fe67cfe33221b3d0720604f1738294559ed0d71646203f84c8fd0
SHA5128a57105c1127fa4badbf890dc8497b01ffbdb64cd29bfe3fa49aa0377cd6c68e87cde7d21ea41217c73f87d515689c4206efaaa8bd64f36a5d3e091d919ad581
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c7995cdaff28e2e4737c88eed25646fb
SHA13a33712a1abe7d44d9268cbf7906603516fa420a
SHA256fd54a5168e43fb1d85020af7c8d3501f03642bc29444a7d322a96e511fb01621
SHA51207aa99ddcdd55f7fbff786968b26dce56308a8a09f25fe763f1a9ea4469970b2660a226aaed6a154462b268f018dd83ba4b9bcd77fabbed827277a34a9ae4107