Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
31-05-2024 09:10
Static task
static1
Behavioral task
behavioral1
Sample
867b3cebec1a2745055f9e8fd063b8c2_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
867b3cebec1a2745055f9e8fd063b8c2_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
867b3cebec1a2745055f9e8fd063b8c2_JaffaCakes118.html
-
Size
26KB
-
MD5
867b3cebec1a2745055f9e8fd063b8c2
-
SHA1
4f1a99f39afdcbed37343d2b50ae008e7faac395
-
SHA256
c3325f579eaea82f198a08fe3a5a67cf7cc5ce0171dbdb8a9ad90fa02e363365
-
SHA512
d1c89b2698313e8a4bafaaec0268bc3c7117d0af2bd7548ef25392e74c4ec8d03e6e7fa01534bdc4415614aa7b1ab2187abd4601104635e4657c9759a781a569
-
SSDEEP
384:ZWOAuwNUz8ujMBT43WVaZ58jUdx8XFxP9gGBRXgh67z1BgUFqzo2iuAcpH8Y8ex:cO+WjGJVq58jUmF9g/h67hR6H1Vx
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1652 msedge.exe 1652 msedge.exe 1412 msedge.exe 1412 msedge.exe 5020 identity_helper.exe 5020 identity_helper.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1412 wrote to memory of 4260 1412 msedge.exe 82 PID 1412 wrote to memory of 4260 1412 msedge.exe 82 PID 1412 wrote to memory of 1344 1412 msedge.exe 84 PID 1412 wrote to memory of 1344 1412 msedge.exe 84 PID 1412 wrote to memory of 1344 1412 msedge.exe 84 PID 1412 wrote to memory of 1344 1412 msedge.exe 84 PID 1412 wrote to memory of 1344 1412 msedge.exe 84 PID 1412 wrote to memory of 1344 1412 msedge.exe 84 PID 1412 wrote to memory of 1344 1412 msedge.exe 84 PID 1412 wrote to memory of 1344 1412 msedge.exe 84 PID 1412 wrote to memory of 1344 1412 msedge.exe 84 PID 1412 wrote to memory of 1344 1412 msedge.exe 84 PID 1412 wrote to memory of 1344 1412 msedge.exe 84 PID 1412 wrote to memory of 1344 1412 msedge.exe 84 PID 1412 wrote to memory of 1344 1412 msedge.exe 84 PID 1412 wrote to memory of 1344 1412 msedge.exe 84 PID 1412 wrote to memory of 1344 1412 msedge.exe 84 PID 1412 wrote to memory of 1344 1412 msedge.exe 84 PID 1412 wrote to memory of 1344 1412 msedge.exe 84 PID 1412 wrote to memory of 1344 1412 msedge.exe 84 PID 1412 wrote to memory of 1344 1412 msedge.exe 84 PID 1412 wrote to memory of 1344 1412 msedge.exe 84 PID 1412 wrote to memory of 1344 1412 msedge.exe 84 PID 1412 wrote to memory of 1344 1412 msedge.exe 84 PID 1412 wrote to memory of 1344 1412 msedge.exe 84 PID 1412 wrote to memory of 1344 1412 msedge.exe 84 PID 1412 wrote to memory of 1344 1412 msedge.exe 84 PID 1412 wrote to memory of 1344 1412 msedge.exe 84 PID 1412 wrote to memory of 1344 1412 msedge.exe 84 PID 1412 wrote to memory of 1344 1412 msedge.exe 84 PID 1412 wrote to memory of 1344 1412 msedge.exe 84 PID 1412 wrote to memory of 1344 1412 msedge.exe 84 PID 1412 wrote to memory of 1344 1412 msedge.exe 84 PID 1412 wrote to memory of 1344 1412 msedge.exe 84 PID 1412 wrote to memory of 1344 1412 msedge.exe 84 PID 1412 wrote to memory of 1344 1412 msedge.exe 84 PID 1412 wrote to memory of 1344 1412 msedge.exe 84 PID 1412 wrote to memory of 1344 1412 msedge.exe 84 PID 1412 wrote to memory of 1344 1412 msedge.exe 84 PID 1412 wrote to memory of 1344 1412 msedge.exe 84 PID 1412 wrote to memory of 1344 1412 msedge.exe 84 PID 1412 wrote to memory of 1344 1412 msedge.exe 84 PID 1412 wrote to memory of 1652 1412 msedge.exe 85 PID 1412 wrote to memory of 1652 1412 msedge.exe 85 PID 1412 wrote to memory of 1160 1412 msedge.exe 86 PID 1412 wrote to memory of 1160 1412 msedge.exe 86 PID 1412 wrote to memory of 1160 1412 msedge.exe 86 PID 1412 wrote to memory of 1160 1412 msedge.exe 86 PID 1412 wrote to memory of 1160 1412 msedge.exe 86 PID 1412 wrote to memory of 1160 1412 msedge.exe 86 PID 1412 wrote to memory of 1160 1412 msedge.exe 86 PID 1412 wrote to memory of 1160 1412 msedge.exe 86 PID 1412 wrote to memory of 1160 1412 msedge.exe 86 PID 1412 wrote to memory of 1160 1412 msedge.exe 86 PID 1412 wrote to memory of 1160 1412 msedge.exe 86 PID 1412 wrote to memory of 1160 1412 msedge.exe 86 PID 1412 wrote to memory of 1160 1412 msedge.exe 86 PID 1412 wrote to memory of 1160 1412 msedge.exe 86 PID 1412 wrote to memory of 1160 1412 msedge.exe 86 PID 1412 wrote to memory of 1160 1412 msedge.exe 86 PID 1412 wrote to memory of 1160 1412 msedge.exe 86 PID 1412 wrote to memory of 1160 1412 msedge.exe 86 PID 1412 wrote to memory of 1160 1412 msedge.exe 86 PID 1412 wrote to memory of 1160 1412 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\867b3cebec1a2745055f9e8fd063b8c2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffee95e46f8,0x7ffee95e4708,0x7ffee95e47182⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,3375129402406735075,8019723066367090681,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:1344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,3375129402406735075,8019723066367090681,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,3375129402406735075,8019723066367090681,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2952 /prefetch:82⤵PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3375129402406735075,8019723066367090681,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3375129402406735075,8019723066367090681,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,3375129402406735075,8019723066367090681,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5464 /prefetch:82⤵PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,3375129402406735075,8019723066367090681,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5464 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3375129402406735075,8019723066367090681,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3375129402406735075,8019723066367090681,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3375129402406735075,8019723066367090681,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3375129402406735075,8019723066367090681,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:12⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,3375129402406735075,8019723066367090681,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1412 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4292
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2640
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4496
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
181B
MD530f245817a32398e1aa30c422a6b1664
SHA1db76f596c151a775be1a93ad3e761f6c8a5354a2
SHA2560e291c3e167a87963bf5d68923cd46f89948773958da17a1060defd4855d1e3a
SHA512d895008655081733ee5af40844164bb70863d34c4a38cafedc8d6a5f68b4a16c6968c13e088675c6e857d6600b38025b32d86686064e51b0c31ce6aec60f096f
-
Filesize
5KB
MD548d292360495bbcfd1718caba32c523f
SHA1060bda3c63b3ce9a28c4b84fb51c5e7d4a3c4278
SHA256983a7a6373078ce10a3e7671ddb2943fa7b5564dd3b338788f378528fa899802
SHA51210da5ef2453e1fc8e92c4dc223898e1f678e72f923f5a4d65c6794398742ce3c6a309df9af03568dd6a99335f38372a6738932ee94dfe8f261d2a9df71da8a4d
-
Filesize
6KB
MD5acd00625a5acfd942f1bcedb4b333a1c
SHA1d5cf3f2f81f06edac6355f9712bdb41c2153178a
SHA2567cc8c641e56f567f55689a6f1cecf4b05ea02db7bb3ba464c29821c048fa5038
SHA512d941b89f2596e0e1d3104104aa7eb643d6668374a9dd7b751d8c13b27c61ff6f31df8c85116620434e79191b4289683a67237b739b621019f3373335a0d860d3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD52c1e8a084cd65e72a174b56fc52b82ca
SHA1d766c5d7fc26b4fa64156c208781208998257587
SHA2561abaa1fcd74c71292ecc67693b67f78c948e48714d35ba115c065287b7f86fb4
SHA51237363e0a26d22aae269948d27362896f92aaacb67d7ed5b3d42b7ed1a54db7d05f4d858ebc4912f372f9ba35b19249018a34c9a5a65169d9d73af8f4012fb34f