Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
31-05-2024 02:19
Static task
static1
Behavioral task
behavioral1
Sample
85b88e954d72c3ce381b5eebb27a1a68_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
85b88e954d72c3ce381b5eebb27a1a68_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
85b88e954d72c3ce381b5eebb27a1a68_JaffaCakes118.html
-
Size
65KB
-
MD5
85b88e954d72c3ce381b5eebb27a1a68
-
SHA1
4d07140cf3619c8fc492bcd2515d632cc4d4c20d
-
SHA256
379bde0da619dd70f796331716db4c63d46378c2c8e001b8bd7757905604a13a
-
SHA512
b67d906d7347ac430340aa31707ac27853c0c5bbc65d336361e6a33d847de33db84d55ec6b5e83d0ea9d917b8f4649a33e49657920453a6bce4789e2a9878ce2
-
SSDEEP
1536:uwtdrmP++3pMzsomkAwchHxns/TrGyiaCuRt:Fyl3p6sohAtArGyiaCuRt
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4144 msedge.exe 4144 msedge.exe 312 msedge.exe 312 msedge.exe 2984 identity_helper.exe 2984 identity_helper.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 312 wrote to memory of 3172 312 msedge.exe 83 PID 312 wrote to memory of 3172 312 msedge.exe 83 PID 312 wrote to memory of 4256 312 msedge.exe 84 PID 312 wrote to memory of 4256 312 msedge.exe 84 PID 312 wrote to memory of 4256 312 msedge.exe 84 PID 312 wrote to memory of 4256 312 msedge.exe 84 PID 312 wrote to memory of 4256 312 msedge.exe 84 PID 312 wrote to memory of 4256 312 msedge.exe 84 PID 312 wrote to memory of 4256 312 msedge.exe 84 PID 312 wrote to memory of 4256 312 msedge.exe 84 PID 312 wrote to memory of 4256 312 msedge.exe 84 PID 312 wrote to memory of 4256 312 msedge.exe 84 PID 312 wrote to memory of 4256 312 msedge.exe 84 PID 312 wrote to memory of 4256 312 msedge.exe 84 PID 312 wrote to memory of 4256 312 msedge.exe 84 PID 312 wrote to memory of 4256 312 msedge.exe 84 PID 312 wrote to memory of 4256 312 msedge.exe 84 PID 312 wrote to memory of 4256 312 msedge.exe 84 PID 312 wrote to memory of 4256 312 msedge.exe 84 PID 312 wrote to memory of 4256 312 msedge.exe 84 PID 312 wrote to memory of 4256 312 msedge.exe 84 PID 312 wrote to memory of 4256 312 msedge.exe 84 PID 312 wrote to memory of 4256 312 msedge.exe 84 PID 312 wrote to memory of 4256 312 msedge.exe 84 PID 312 wrote to memory of 4256 312 msedge.exe 84 PID 312 wrote to memory of 4256 312 msedge.exe 84 PID 312 wrote to memory of 4256 312 msedge.exe 84 PID 312 wrote to memory of 4256 312 msedge.exe 84 PID 312 wrote to memory of 4256 312 msedge.exe 84 PID 312 wrote to memory of 4256 312 msedge.exe 84 PID 312 wrote to memory of 4256 312 msedge.exe 84 PID 312 wrote to memory of 4256 312 msedge.exe 84 PID 312 wrote to memory of 4256 312 msedge.exe 84 PID 312 wrote to memory of 4256 312 msedge.exe 84 PID 312 wrote to memory of 4256 312 msedge.exe 84 PID 312 wrote to memory of 4256 312 msedge.exe 84 PID 312 wrote to memory of 4256 312 msedge.exe 84 PID 312 wrote to memory of 4256 312 msedge.exe 84 PID 312 wrote to memory of 4256 312 msedge.exe 84 PID 312 wrote to memory of 4256 312 msedge.exe 84 PID 312 wrote to memory of 4256 312 msedge.exe 84 PID 312 wrote to memory of 4256 312 msedge.exe 84 PID 312 wrote to memory of 4144 312 msedge.exe 85 PID 312 wrote to memory of 4144 312 msedge.exe 85 PID 312 wrote to memory of 1304 312 msedge.exe 86 PID 312 wrote to memory of 1304 312 msedge.exe 86 PID 312 wrote to memory of 1304 312 msedge.exe 86 PID 312 wrote to memory of 1304 312 msedge.exe 86 PID 312 wrote to memory of 1304 312 msedge.exe 86 PID 312 wrote to memory of 1304 312 msedge.exe 86 PID 312 wrote to memory of 1304 312 msedge.exe 86 PID 312 wrote to memory of 1304 312 msedge.exe 86 PID 312 wrote to memory of 1304 312 msedge.exe 86 PID 312 wrote to memory of 1304 312 msedge.exe 86 PID 312 wrote to memory of 1304 312 msedge.exe 86 PID 312 wrote to memory of 1304 312 msedge.exe 86 PID 312 wrote to memory of 1304 312 msedge.exe 86 PID 312 wrote to memory of 1304 312 msedge.exe 86 PID 312 wrote to memory of 1304 312 msedge.exe 86 PID 312 wrote to memory of 1304 312 msedge.exe 86 PID 312 wrote to memory of 1304 312 msedge.exe 86 PID 312 wrote to memory of 1304 312 msedge.exe 86 PID 312 wrote to memory of 1304 312 msedge.exe 86 PID 312 wrote to memory of 1304 312 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\85b88e954d72c3ce381b5eebb27a1a68_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:312 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc284846f8,0x7ffc28484708,0x7ffc284847182⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,12387571608417357688,588434543232643314,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,12387571608417357688,588434543232643314,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,12387571608417357688,588434543232643314,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:1304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,12387571608417357688,588434543232643314,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,12387571608417357688,588434543232643314,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,12387571608417357688,588434543232643314,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,12387571608417357688,588434543232643314,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3812 /prefetch:12⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,12387571608417357688,588434543232643314,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6064 /prefetch:82⤵PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,12387571608417357688,588434543232643314,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6064 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,12387571608417357688,588434543232643314,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6056 /prefetch:12⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,12387571608417357688,588434543232643314,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:12⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,12387571608417357688,588434543232643314,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4228 /prefetch:12⤵PID:916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,12387571608417357688,588434543232643314,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,12387571608417357688,588434543232643314,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4900 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1572
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3672
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4700
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
694B
MD52b906349290423714705853af7d68289
SHA1b4825649c099d868b5d4815ae5d7e6ef10552b31
SHA256e3dfff98c0ca88011681bbf488e5e806135493941ad74aca476f1a6bf7a2d675
SHA5123c1f116a04538c8171a64e08e623e7e54f400741e38351600c5d035872fc9b05724a06f57e312a848ee0c0da5339c0363cf3ad87eb73001bbc013c4d576c7c05
-
Filesize
6KB
MD56502d2ce728ef4aec0ce28a32433c758
SHA1e97753cf2c75d625e12fae9823bafb63cde54ba8
SHA256dad2e5c1d523c63d2e6914c51460d47ab94bd1ff2607cd2f502774670c65683e
SHA5129495db9e18080b8af54aac59ed1d18052964d3e396b9533e7d06ee5ea869b8139ee8281bb17e7683d8759454c902ac23af05d56a0415814a39f452166a3acc61
-
Filesize
5KB
MD533203595ea967a0dc75574c763820e7b
SHA12271bf34b13e6ca9eaa440c406feac38601d0265
SHA25609659659f14d4c666e7a72fc278c09def358cdf67797ee932390542d1c78aa55
SHA5123bd02a84e37f42beb1df2a50d6b1ccef6a8e53da88bd663b211951d4c3bd326cb427ca8eff70dc630c9bab374fa718039f118213cce53ccd03fa0ac2f6944698
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a5041ae8c5153192f8cf23bdecbf02e5
SHA179447d76914a16eb0fa98fe0cd32333c0f36a28a
SHA256ed97fb3ca83cf07d782f581e0ce19168331522812dd9c579f24275a6dc7e4b7d
SHA512742ba1a37da6b04f5f3b1c7a0cbabbd7a54794bd4fc4f4cf3b050410c095b1458475665b5922839ed180a381500ca68c576e6730afb90d523424f1b3ecbc2548