Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
31/05/2024, 09:59
Static task
static1
Behavioral task
behavioral1
Sample
869b7badbd25c44ad38e404866af63b1_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
869b7badbd25c44ad38e404866af63b1_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
869b7badbd25c44ad38e404866af63b1_JaffaCakes118.html
-
Size
23KB
-
MD5
869b7badbd25c44ad38e404866af63b1
-
SHA1
1bf83b10a4c6ecbe0ca7e3592ca0764ea666bbf5
-
SHA256
f949f8d31d28e3faf067cbb06485564f8066b1a804f9ec01e15a7aabe00a6eb9
-
SHA512
2f4a4df04d953c04240bd727f234b249a572bb166f11a4e519b9e8141aa612e0347d7e1106a39ce0439839e76eb632ab03ec44ed9967dc6d3d0d965fe6ee2c18
-
SSDEEP
192:uWvYb5nx2nQjxn5Q/YnQieDNnSnQOkEnt4unQTbnRnQTlCnQtDwMBjqnYnQ7tnEZ:EQ/0PF7d
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4936 msedge.exe 4936 msedge.exe 1644 msedge.exe 1644 msedge.exe 3624 identity_helper.exe 3624 identity_helper.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1644 wrote to memory of 4544 1644 msedge.exe 84 PID 1644 wrote to memory of 4544 1644 msedge.exe 84 PID 1644 wrote to memory of 4472 1644 msedge.exe 85 PID 1644 wrote to memory of 4472 1644 msedge.exe 85 PID 1644 wrote to memory of 4472 1644 msedge.exe 85 PID 1644 wrote to memory of 4472 1644 msedge.exe 85 PID 1644 wrote to memory of 4472 1644 msedge.exe 85 PID 1644 wrote to memory of 4472 1644 msedge.exe 85 PID 1644 wrote to memory of 4472 1644 msedge.exe 85 PID 1644 wrote to memory of 4472 1644 msedge.exe 85 PID 1644 wrote to memory of 4472 1644 msedge.exe 85 PID 1644 wrote to memory of 4472 1644 msedge.exe 85 PID 1644 wrote to memory of 4472 1644 msedge.exe 85 PID 1644 wrote to memory of 4472 1644 msedge.exe 85 PID 1644 wrote to memory of 4472 1644 msedge.exe 85 PID 1644 wrote to memory of 4472 1644 msedge.exe 85 PID 1644 wrote to memory of 4472 1644 msedge.exe 85 PID 1644 wrote to memory of 4472 1644 msedge.exe 85 PID 1644 wrote to memory of 4472 1644 msedge.exe 85 PID 1644 wrote to memory of 4472 1644 msedge.exe 85 PID 1644 wrote to memory of 4472 1644 msedge.exe 85 PID 1644 wrote to memory of 4472 1644 msedge.exe 85 PID 1644 wrote to memory of 4472 1644 msedge.exe 85 PID 1644 wrote to memory of 4472 1644 msedge.exe 85 PID 1644 wrote to memory of 4472 1644 msedge.exe 85 PID 1644 wrote to memory of 4472 1644 msedge.exe 85 PID 1644 wrote to memory of 4472 1644 msedge.exe 85 PID 1644 wrote to memory of 4472 1644 msedge.exe 85 PID 1644 wrote to memory of 4472 1644 msedge.exe 85 PID 1644 wrote to memory of 4472 1644 msedge.exe 85 PID 1644 wrote to memory of 4472 1644 msedge.exe 85 PID 1644 wrote to memory of 4472 1644 msedge.exe 85 PID 1644 wrote to memory of 4472 1644 msedge.exe 85 PID 1644 wrote to memory of 4472 1644 msedge.exe 85 PID 1644 wrote to memory of 4472 1644 msedge.exe 85 PID 1644 wrote to memory of 4472 1644 msedge.exe 85 PID 1644 wrote to memory of 4472 1644 msedge.exe 85 PID 1644 wrote to memory of 4472 1644 msedge.exe 85 PID 1644 wrote to memory of 4472 1644 msedge.exe 85 PID 1644 wrote to memory of 4472 1644 msedge.exe 85 PID 1644 wrote to memory of 4472 1644 msedge.exe 85 PID 1644 wrote to memory of 4472 1644 msedge.exe 85 PID 1644 wrote to memory of 4936 1644 msedge.exe 86 PID 1644 wrote to memory of 4936 1644 msedge.exe 86 PID 1644 wrote to memory of 2996 1644 msedge.exe 87 PID 1644 wrote to memory of 2996 1644 msedge.exe 87 PID 1644 wrote to memory of 2996 1644 msedge.exe 87 PID 1644 wrote to memory of 2996 1644 msedge.exe 87 PID 1644 wrote to memory of 2996 1644 msedge.exe 87 PID 1644 wrote to memory of 2996 1644 msedge.exe 87 PID 1644 wrote to memory of 2996 1644 msedge.exe 87 PID 1644 wrote to memory of 2996 1644 msedge.exe 87 PID 1644 wrote to memory of 2996 1644 msedge.exe 87 PID 1644 wrote to memory of 2996 1644 msedge.exe 87 PID 1644 wrote to memory of 2996 1644 msedge.exe 87 PID 1644 wrote to memory of 2996 1644 msedge.exe 87 PID 1644 wrote to memory of 2996 1644 msedge.exe 87 PID 1644 wrote to memory of 2996 1644 msedge.exe 87 PID 1644 wrote to memory of 2996 1644 msedge.exe 87 PID 1644 wrote to memory of 2996 1644 msedge.exe 87 PID 1644 wrote to memory of 2996 1644 msedge.exe 87 PID 1644 wrote to memory of 2996 1644 msedge.exe 87 PID 1644 wrote to memory of 2996 1644 msedge.exe 87 PID 1644 wrote to memory of 2996 1644 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\869b7badbd25c44ad38e404866af63b1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa292946f8,0x7ffa29294708,0x7ffa292947182⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,12489868418186058899,11830606830696608432,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,12489868418186058899,11830606830696608432,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,12489868418186058899,11830606830696608432,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12489868418186058899,11830606830696608432,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12489868418186058899,11830606830696608432,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,12489868418186058899,11830606830696608432,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4616 /prefetch:82⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,12489868418186058899,11830606830696608432,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4616 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12489868418186058899,11830606830696608432,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3088 /prefetch:12⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12489868418186058899,11830606830696608432,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12489868418186058899,11830606830696608432,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4680 /prefetch:12⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12489868418186058899,11830606830696608432,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,12489868418186058899,11830606830696608432,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5596 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1436
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3824
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\06af5a0e-19a5-438b-bd76-87003687868a.tmp
Filesize6KB
MD56c7a866dcf10b9263e4dcd394ada5151
SHA1bd6a1d89bd050b4c18eec1715e4c0264a981b92c
SHA256b69fd09aa40ab87118542c58eb6984f717f43a5caf248843f7ce7b25ba4dc006
SHA5122a686b257c3ef124fa6d59934ccad01aa9921213abd392f6865f4e6c56c13153a749c26142bbc14995060dad6026eb31abe99e4cc1cb34ddaeb56da1bacf2285
-
Filesize
5KB
MD575cd376e9a6237aed27e443591842f19
SHA1d3d4c65d96e7f4f23b71257b2e581deeb094b066
SHA256bc91562b1f3250def437adcbb631f6bfe1a3ba9fa63c3abd4ed7ba4909f2aec6
SHA512acd4a126b1fdf086a16f02f1e34ded8b09b9f1f60081b91d20053f6f2af8ed7f2acd42b41ae86450bd5f7745fe101148acbadf2b2617328e91cc916c55339727
-
Filesize
6KB
MD5080ccaeaec7af52809fc92fb50c0734d
SHA1058d6cb7040f8f61b59cc4911862e381734bb85d
SHA256abb114557eefadd04ecb4cd3971bf4aed3dc4da8e1c78d334f5c7a3c89969355
SHA5120e9633e603285e2f7f88e84347736cdbba63f6afcef8b45559e64e85b6cfe9267720e7092ada454cfcee3458a441244a2c98ab2d7b13ee35df54b24ce97ec104
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD55e8af47d4b4b8041cd6b70d58a2883a4
SHA1020979db97f53f87e80c02e55b4f1fd7b760401a
SHA25638fb971f7504b5fe54b9fc83d676a6198c68f76d289ba7bc1f46e380fa347484
SHA5126546a82e0ecf8fbd6106bc56139fecc25d5435be40e9de13eb4538fde01db2cbef96b485dba63d154e06da2e5d47bd06a873ec6b35932a9fab875daafd251254