Analysis
-
max time kernel
149s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
31/05/2024, 06:05
Static task
static1
Behavioral task
behavioral1
Sample
862baf0bef42fef21045f0ab50379509_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
862baf0bef42fef21045f0ab50379509_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
862baf0bef42fef21045f0ab50379509_JaffaCakes118.html
-
Size
25KB
-
MD5
862baf0bef42fef21045f0ab50379509
-
SHA1
a0b3d0d5e96052ad6990e024b45faa7796dc5bb6
-
SHA256
34eb4a2276cc71829e3ea7967f22cd8a53199fd389f5a907c67c5c2488766095
-
SHA512
39cd0e6d9a29e0995c2ee26666d28ea586ef9050a97798541654181f2a44315f4c480974597d117d4ea86c130320bd28996a1ce4b79e73a431346c57c2e4f96b
-
SSDEEP
768:SJD9JdctvD9bdcB0brAVnpTZx9SUXVIRBEY0Cxb:SJD9JdctvD9bdcOryrNXVIRBEY0Cxb
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3656 msedge.exe 3656 msedge.exe 1684 msedge.exe 1684 msedge.exe 1340 identity_helper.exe 1340 identity_helper.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1684 wrote to memory of 632 1684 msedge.exe 81 PID 1684 wrote to memory of 632 1684 msedge.exe 81 PID 1684 wrote to memory of 368 1684 msedge.exe 82 PID 1684 wrote to memory of 368 1684 msedge.exe 82 PID 1684 wrote to memory of 368 1684 msedge.exe 82 PID 1684 wrote to memory of 368 1684 msedge.exe 82 PID 1684 wrote to memory of 368 1684 msedge.exe 82 PID 1684 wrote to memory of 368 1684 msedge.exe 82 PID 1684 wrote to memory of 368 1684 msedge.exe 82 PID 1684 wrote to memory of 368 1684 msedge.exe 82 PID 1684 wrote to memory of 368 1684 msedge.exe 82 PID 1684 wrote to memory of 368 1684 msedge.exe 82 PID 1684 wrote to memory of 368 1684 msedge.exe 82 PID 1684 wrote to memory of 368 1684 msedge.exe 82 PID 1684 wrote to memory of 368 1684 msedge.exe 82 PID 1684 wrote to memory of 368 1684 msedge.exe 82 PID 1684 wrote to memory of 368 1684 msedge.exe 82 PID 1684 wrote to memory of 368 1684 msedge.exe 82 PID 1684 wrote to memory of 368 1684 msedge.exe 82 PID 1684 wrote to memory of 368 1684 msedge.exe 82 PID 1684 wrote to memory of 368 1684 msedge.exe 82 PID 1684 wrote to memory of 368 1684 msedge.exe 82 PID 1684 wrote to memory of 368 1684 msedge.exe 82 PID 1684 wrote to memory of 368 1684 msedge.exe 82 PID 1684 wrote to memory of 368 1684 msedge.exe 82 PID 1684 wrote to memory of 368 1684 msedge.exe 82 PID 1684 wrote to memory of 368 1684 msedge.exe 82 PID 1684 wrote to memory of 368 1684 msedge.exe 82 PID 1684 wrote to memory of 368 1684 msedge.exe 82 PID 1684 wrote to memory of 368 1684 msedge.exe 82 PID 1684 wrote to memory of 368 1684 msedge.exe 82 PID 1684 wrote to memory of 368 1684 msedge.exe 82 PID 1684 wrote to memory of 368 1684 msedge.exe 82 PID 1684 wrote to memory of 368 1684 msedge.exe 82 PID 1684 wrote to memory of 368 1684 msedge.exe 82 PID 1684 wrote to memory of 368 1684 msedge.exe 82 PID 1684 wrote to memory of 368 1684 msedge.exe 82 PID 1684 wrote to memory of 368 1684 msedge.exe 82 PID 1684 wrote to memory of 368 1684 msedge.exe 82 PID 1684 wrote to memory of 368 1684 msedge.exe 82 PID 1684 wrote to memory of 368 1684 msedge.exe 82 PID 1684 wrote to memory of 368 1684 msedge.exe 82 PID 1684 wrote to memory of 3656 1684 msedge.exe 83 PID 1684 wrote to memory of 3656 1684 msedge.exe 83 PID 1684 wrote to memory of 1748 1684 msedge.exe 84 PID 1684 wrote to memory of 1748 1684 msedge.exe 84 PID 1684 wrote to memory of 1748 1684 msedge.exe 84 PID 1684 wrote to memory of 1748 1684 msedge.exe 84 PID 1684 wrote to memory of 1748 1684 msedge.exe 84 PID 1684 wrote to memory of 1748 1684 msedge.exe 84 PID 1684 wrote to memory of 1748 1684 msedge.exe 84 PID 1684 wrote to memory of 1748 1684 msedge.exe 84 PID 1684 wrote to memory of 1748 1684 msedge.exe 84 PID 1684 wrote to memory of 1748 1684 msedge.exe 84 PID 1684 wrote to memory of 1748 1684 msedge.exe 84 PID 1684 wrote to memory of 1748 1684 msedge.exe 84 PID 1684 wrote to memory of 1748 1684 msedge.exe 84 PID 1684 wrote to memory of 1748 1684 msedge.exe 84 PID 1684 wrote to memory of 1748 1684 msedge.exe 84 PID 1684 wrote to memory of 1748 1684 msedge.exe 84 PID 1684 wrote to memory of 1748 1684 msedge.exe 84 PID 1684 wrote to memory of 1748 1684 msedge.exe 84 PID 1684 wrote to memory of 1748 1684 msedge.exe 84 PID 1684 wrote to memory of 1748 1684 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\862baf0bef42fef21045f0ab50379509_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe6ed746f8,0x7ffe6ed74708,0x7ffe6ed747182⤵PID:632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1944,9582371619787323124,2220196104100998655,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2004 /prefetch:22⤵PID:368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1944,9582371619787323124,2220196104100998655,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2092 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1944,9582371619787323124,2220196104100998655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:1748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,9582371619787323124,2220196104100998655,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1948 /prefetch:12⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,9582371619787323124,2220196104100998655,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1944,9582371619787323124,2220196104100998655,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5836 /prefetch:82⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1944,9582371619787323124,2220196104100998655,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5836 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,9582371619787323124,2220196104100998655,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,9582371619787323124,2220196104100998655,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:12⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,9582371619787323124,2220196104100998655,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4108 /prefetch:12⤵PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,9582371619787323124,2220196104100998655,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:12⤵PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1944,9582371619787323124,2220196104100998655,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3968 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2084
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1324
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
6KB
MD5c9c3c95203838d31e20178461e29faeb
SHA1948e5839180e2aa19d3e8ad59ad0db4e2098757a
SHA25610445ce2f9cf2e27df0f34264628f5fba36b4ae89a495043f194dda4f4abf9c8
SHA512866b08abe4601bac18967ece0fe497f569df45da6bc3f8bffd2de791c7a1854d7817ef43569a1aa665a15a2f1661bba0927336739bd6fb0ea196477f78ee85a3
-
Filesize
5KB
MD5e9090a102155a8af4fb161d136e20a4d
SHA160278efdf23be32b6c18f55470a8b30998d6977c
SHA256fc69418a890918c44e5ac0a5010f5459d1b7bb1eaccf3bf0b3237b26305ecc51
SHA512438d03f54997c79cce0c39491d104f7b052036561ebfb1683e412ee690a68012e2a2bb84e5b03c4f9657ee5a7776ba4edf25b3d7ded81ab7d90b9e99b488abac
-
Filesize
6KB
MD5764a41b7dfdf0b17da3abfd171493f02
SHA155908c95eb8c08a732b0469e595c388592748c62
SHA256dde500276dea08b5a8546ab197dcc9e1e7dc1a7c8174ba22924cf3a8d6d9a20f
SHA512921bd81ccda75512b73e984c46d13a1d350bcfba2228c0bf06535b05d764c19a19057f4b1bc997575a2985b97f4ecab09eabc1835789a8803a377a0c400e49aa
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5419ca64475e27cd2adaec22a8b21267c
SHA197a3054d1c3d4e581566954514a7e1998cb543c9
SHA256d8e0c76008e0d77a924dfd8f56f48f751a9ec9dd42e9fec5f4f41a2db6b30a71
SHA51212bc631d8d2789fab6fa16f373996dc7a382b346abb6b2104e42128c3685286f11851d1a6bc8176dda8a95a553e292829295565600b66fdd3f8d1d5bb6f18064