Analysis
-
max time kernel
139s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
31-05-2024 02:56
Static task
static1
Behavioral task
behavioral1
Sample
85c97c733f5671d1095fa5601b5e8930_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
85c97c733f5671d1095fa5601b5e8930_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
85c97c733f5671d1095fa5601b5e8930_JaffaCakes118.html
-
Size
158KB
-
MD5
85c97c733f5671d1095fa5601b5e8930
-
SHA1
c3ebf0e76e9f53068e05c7bf3fabb80d872ae8ae
-
SHA256
3b260ff96bc7998bc3d0864863e139e525b390fe7fe9a72c8f936d32a071ed81
-
SHA512
ca5e68206ebeff270c75c3415f2d09fa2d3e1114796d62b3ebcc2d5e2a672a6b8a52c44539d16680262cb79f5196363e31def9bff68a837cd7fbdd250b0be5f2
-
SSDEEP
1536:iURT0st19VbBAEoyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJA:iGvZoyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exemsedge.exeidentity_helper.exepid process 4784 msedge.exe 4784 msedge.exe 184 msedge.exe 184 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 4248 identity_helper.exe 4248 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 184 wrote to memory of 4180 184 msedge.exe msedge.exe PID 184 wrote to memory of 4180 184 msedge.exe msedge.exe PID 184 wrote to memory of 1532 184 msedge.exe msedge.exe PID 184 wrote to memory of 1532 184 msedge.exe msedge.exe PID 184 wrote to memory of 1532 184 msedge.exe msedge.exe PID 184 wrote to memory of 1532 184 msedge.exe msedge.exe PID 184 wrote to memory of 1532 184 msedge.exe msedge.exe PID 184 wrote to memory of 1532 184 msedge.exe msedge.exe PID 184 wrote to memory of 1532 184 msedge.exe msedge.exe PID 184 wrote to memory of 1532 184 msedge.exe msedge.exe PID 184 wrote to memory of 1532 184 msedge.exe msedge.exe PID 184 wrote to memory of 1532 184 msedge.exe msedge.exe PID 184 wrote to memory of 1532 184 msedge.exe msedge.exe PID 184 wrote to memory of 1532 184 msedge.exe msedge.exe PID 184 wrote to memory of 1532 184 msedge.exe msedge.exe PID 184 wrote to memory of 1532 184 msedge.exe msedge.exe PID 184 wrote to memory of 1532 184 msedge.exe msedge.exe PID 184 wrote to memory of 1532 184 msedge.exe msedge.exe PID 184 wrote to memory of 1532 184 msedge.exe msedge.exe PID 184 wrote to memory of 1532 184 msedge.exe msedge.exe PID 184 wrote to memory of 1532 184 msedge.exe msedge.exe PID 184 wrote to memory of 1532 184 msedge.exe msedge.exe PID 184 wrote to memory of 1532 184 msedge.exe msedge.exe PID 184 wrote to memory of 1532 184 msedge.exe msedge.exe PID 184 wrote to memory of 1532 184 msedge.exe msedge.exe PID 184 wrote to memory of 1532 184 msedge.exe msedge.exe PID 184 wrote to memory of 1532 184 msedge.exe msedge.exe PID 184 wrote to memory of 1532 184 msedge.exe msedge.exe PID 184 wrote to memory of 1532 184 msedge.exe msedge.exe PID 184 wrote to memory of 1532 184 msedge.exe msedge.exe PID 184 wrote to memory of 1532 184 msedge.exe msedge.exe PID 184 wrote to memory of 1532 184 msedge.exe msedge.exe PID 184 wrote to memory of 1532 184 msedge.exe msedge.exe PID 184 wrote to memory of 1532 184 msedge.exe msedge.exe PID 184 wrote to memory of 1532 184 msedge.exe msedge.exe PID 184 wrote to memory of 1532 184 msedge.exe msedge.exe PID 184 wrote to memory of 1532 184 msedge.exe msedge.exe PID 184 wrote to memory of 1532 184 msedge.exe msedge.exe PID 184 wrote to memory of 1532 184 msedge.exe msedge.exe PID 184 wrote to memory of 1532 184 msedge.exe msedge.exe PID 184 wrote to memory of 1532 184 msedge.exe msedge.exe PID 184 wrote to memory of 1532 184 msedge.exe msedge.exe PID 184 wrote to memory of 4784 184 msedge.exe msedge.exe PID 184 wrote to memory of 4784 184 msedge.exe msedge.exe PID 184 wrote to memory of 2944 184 msedge.exe msedge.exe PID 184 wrote to memory of 2944 184 msedge.exe msedge.exe PID 184 wrote to memory of 2944 184 msedge.exe msedge.exe PID 184 wrote to memory of 2944 184 msedge.exe msedge.exe PID 184 wrote to memory of 2944 184 msedge.exe msedge.exe PID 184 wrote to memory of 2944 184 msedge.exe msedge.exe PID 184 wrote to memory of 2944 184 msedge.exe msedge.exe PID 184 wrote to memory of 2944 184 msedge.exe msedge.exe PID 184 wrote to memory of 2944 184 msedge.exe msedge.exe PID 184 wrote to memory of 2944 184 msedge.exe msedge.exe PID 184 wrote to memory of 2944 184 msedge.exe msedge.exe PID 184 wrote to memory of 2944 184 msedge.exe msedge.exe PID 184 wrote to memory of 2944 184 msedge.exe msedge.exe PID 184 wrote to memory of 2944 184 msedge.exe msedge.exe PID 184 wrote to memory of 2944 184 msedge.exe msedge.exe PID 184 wrote to memory of 2944 184 msedge.exe msedge.exe PID 184 wrote to memory of 2944 184 msedge.exe msedge.exe PID 184 wrote to memory of 2944 184 msedge.exe msedge.exe PID 184 wrote to memory of 2944 184 msedge.exe msedge.exe PID 184 wrote to memory of 2944 184 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\85c97c733f5671d1095fa5601b5e8930_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:184 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ff8c04046f8,0x7ff8c0404708,0x7ff8c04047182⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,12066006126525929021,5617347435909286850,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2292 /prefetch:22⤵PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,12066006126525929021,5617347435909286850,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2344 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,12066006126525929021,5617347435909286850,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12066006126525929021,5617347435909286850,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12066006126525929021,5617347435909286850,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,12066006126525929021,5617347435909286850,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2476 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,12066006126525929021,5617347435909286850,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 /prefetch:82⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,12066006126525929021,5617347435909286850,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12066006126525929021,5617347435909286850,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12066006126525929021,5617347435909286850,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4216 /prefetch:12⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12066006126525929021,5617347435909286850,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4180 /prefetch:12⤵PID:2828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12066006126525929021,5617347435909286850,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:4716
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4400
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD5cdc7212e569796243cbf0dfb9ce6d8c4
SHA17fad2231eff9f3e4f749e2566c8c0c2761ba340f
SHA256a4e7f497f4765f38d38128c16161269ba6a860f49cf17e0e8e2dba4a687c443d
SHA512d9bfbf08e189ae90193b1d0cc318868bf43247d9545edff350c034a44455d5b89bcea0e53bb1225bab882274b30b9cd2834552051cd0783471c900c3a8904a4f
-
Filesize
6KB
MD511e2395a2af6a696aff5230db9582319
SHA173ead7469e8a0842d95be5edadd0e1f1e766f74d
SHA256b89b1e0cd48c7aa6386a342dec6368a15d992fd49d719b1a9b22024da3dff835
SHA5121926eb0f175774a6c1364396adb418422c8428ebcabc9d064281ac5ff7ec4f4b72b7b7b7105d3a06aabb0bf31caffe824936bbbab71a95c27c7c1d0206926875
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD538aa8907edf3f84bffa379a516b96e78
SHA11f142bfebc8e215d4f7309a3f639b8a35c0955e3
SHA256d00cd42d0838060c40953dc782416423d8c707d945c480f0ed3d3c2a4db2ccfe
SHA5125b5275673f5b7c4333740e52a427d3b96120f8bc99e8f2ced978bd6f9fdfbd421f60845c49c7cb11a7e864afb60e9ef1b371fcb80ed92885c2ccd8de33b92041
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e