Analysis
-
max time kernel
145s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
31/05/2024, 14:01
Static task
static1
Behavioral task
behavioral1
Sample
873fc87433f580967c18a3aa8fba7b5f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
873fc87433f580967c18a3aa8fba7b5f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
873fc87433f580967c18a3aa8fba7b5f_JaffaCakes118.html
-
Size
97KB
-
MD5
873fc87433f580967c18a3aa8fba7b5f
-
SHA1
5353168410a84daa497c2193371205a1479d01b1
-
SHA256
95bc63616d1a13c7bd9dec2383d5247f651eab5598258a69f0f1ded8f5d4106e
-
SHA512
a15cfa08a4df16a7f681524068fe1e6dd5f34f7669d4fdc9ca8843c9376ec6cabf877b4f589143d85087c616a4a9e733458963557a1b6e003abf5406b484d055
-
SSDEEP
1536:/ggaqpp0jBVdUVVVVVVzzSSOOyyy66IIKKGG8B8BxxxxxxxGGddttGaa22hhjjZa:/ggXpD6Vx1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4860 msedge.exe 4860 msedge.exe 1416 msedge.exe 1416 msedge.exe 3604 identity_helper.exe 3604 identity_helper.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1416 wrote to memory of 2068 1416 msedge.exe 83 PID 1416 wrote to memory of 2068 1416 msedge.exe 83 PID 1416 wrote to memory of 3468 1416 msedge.exe 84 PID 1416 wrote to memory of 3468 1416 msedge.exe 84 PID 1416 wrote to memory of 3468 1416 msedge.exe 84 PID 1416 wrote to memory of 3468 1416 msedge.exe 84 PID 1416 wrote to memory of 3468 1416 msedge.exe 84 PID 1416 wrote to memory of 3468 1416 msedge.exe 84 PID 1416 wrote to memory of 3468 1416 msedge.exe 84 PID 1416 wrote to memory of 3468 1416 msedge.exe 84 PID 1416 wrote to memory of 3468 1416 msedge.exe 84 PID 1416 wrote to memory of 3468 1416 msedge.exe 84 PID 1416 wrote to memory of 3468 1416 msedge.exe 84 PID 1416 wrote to memory of 3468 1416 msedge.exe 84 PID 1416 wrote to memory of 3468 1416 msedge.exe 84 PID 1416 wrote to memory of 3468 1416 msedge.exe 84 PID 1416 wrote to memory of 3468 1416 msedge.exe 84 PID 1416 wrote to memory of 3468 1416 msedge.exe 84 PID 1416 wrote to memory of 3468 1416 msedge.exe 84 PID 1416 wrote to memory of 3468 1416 msedge.exe 84 PID 1416 wrote to memory of 3468 1416 msedge.exe 84 PID 1416 wrote to memory of 3468 1416 msedge.exe 84 PID 1416 wrote to memory of 3468 1416 msedge.exe 84 PID 1416 wrote to memory of 3468 1416 msedge.exe 84 PID 1416 wrote to memory of 3468 1416 msedge.exe 84 PID 1416 wrote to memory of 3468 1416 msedge.exe 84 PID 1416 wrote to memory of 3468 1416 msedge.exe 84 PID 1416 wrote to memory of 3468 1416 msedge.exe 84 PID 1416 wrote to memory of 3468 1416 msedge.exe 84 PID 1416 wrote to memory of 3468 1416 msedge.exe 84 PID 1416 wrote to memory of 3468 1416 msedge.exe 84 PID 1416 wrote to memory of 3468 1416 msedge.exe 84 PID 1416 wrote to memory of 3468 1416 msedge.exe 84 PID 1416 wrote to memory of 3468 1416 msedge.exe 84 PID 1416 wrote to memory of 3468 1416 msedge.exe 84 PID 1416 wrote to memory of 3468 1416 msedge.exe 84 PID 1416 wrote to memory of 3468 1416 msedge.exe 84 PID 1416 wrote to memory of 3468 1416 msedge.exe 84 PID 1416 wrote to memory of 3468 1416 msedge.exe 84 PID 1416 wrote to memory of 3468 1416 msedge.exe 84 PID 1416 wrote to memory of 3468 1416 msedge.exe 84 PID 1416 wrote to memory of 3468 1416 msedge.exe 84 PID 1416 wrote to memory of 4860 1416 msedge.exe 85 PID 1416 wrote to memory of 4860 1416 msedge.exe 85 PID 1416 wrote to memory of 5008 1416 msedge.exe 86 PID 1416 wrote to memory of 5008 1416 msedge.exe 86 PID 1416 wrote to memory of 5008 1416 msedge.exe 86 PID 1416 wrote to memory of 5008 1416 msedge.exe 86 PID 1416 wrote to memory of 5008 1416 msedge.exe 86 PID 1416 wrote to memory of 5008 1416 msedge.exe 86 PID 1416 wrote to memory of 5008 1416 msedge.exe 86 PID 1416 wrote to memory of 5008 1416 msedge.exe 86 PID 1416 wrote to memory of 5008 1416 msedge.exe 86 PID 1416 wrote to memory of 5008 1416 msedge.exe 86 PID 1416 wrote to memory of 5008 1416 msedge.exe 86 PID 1416 wrote to memory of 5008 1416 msedge.exe 86 PID 1416 wrote to memory of 5008 1416 msedge.exe 86 PID 1416 wrote to memory of 5008 1416 msedge.exe 86 PID 1416 wrote to memory of 5008 1416 msedge.exe 86 PID 1416 wrote to memory of 5008 1416 msedge.exe 86 PID 1416 wrote to memory of 5008 1416 msedge.exe 86 PID 1416 wrote to memory of 5008 1416 msedge.exe 86 PID 1416 wrote to memory of 5008 1416 msedge.exe 86 PID 1416 wrote to memory of 5008 1416 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\873fc87433f580967c18a3aa8fba7b5f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8a47946f8,0x7ff8a4794708,0x7ff8a47947182⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,12393191541118459927,5713364164888496095,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,12393191541118459927,5713364164888496095,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,12393191541118459927,5713364164888496095,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:82⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,12393191541118459927,5713364164888496095,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,12393191541118459927,5713364164888496095,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,12393191541118459927,5713364164888496095,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 /prefetch:82⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,12393191541118459927,5713364164888496095,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,12393191541118459927,5713364164888496095,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,12393191541118459927,5713364164888496095,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,12393191541118459927,5713364164888496095,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:12⤵PID:2992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,12393191541118459927,5713364164888496095,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,12393191541118459927,5713364164888496095,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4804 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3824
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1808
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4940
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD51929fbf927a467897e72aa2954b17c4c
SHA1276e523828d88da9f31efdc6212e281c3df6de8d
SHA25647022154b6606fae5e7a7992875d7d1e72fbbc8f4b73960432112bd1498fdce5
SHA51246d1c0bd32746406504c2297e4f18d2fd71edf1e193fa147ccd8b1afcb0901bdb6802d1d50f94eb3bb37f5d59c14fc55b597827cb2a26b485ff3873cab935e04
-
Filesize
6KB
MD5f7168e006803ffe4fa6cf9655ab442eb
SHA15caf7abb28999f6e72c44ab735a20cd42e1d3071
SHA256f91792b67ab588efbd2baa2a81fa28de405896c8ae782eec8d35cdf1afd8c9e3
SHA51247fc14d7185f6859f94741c2b8136dd8868b7ed0507016924c35c1686acfb5ad084facf46f01b85d13fb4ee6d0b78761c737d057abc316b65db7d3014d7c259a
-
Filesize
6KB
MD566c8e2797f1ee13fd7d52a54fce92cea
SHA10092d0fe3aaacfa071405e0abbfbd3ee85a94143
SHA2567100263c46a81b0b9bd2cd8b7f10538aaa5f5f5b72e7f4be81b6da3ef9a706ca
SHA5121cde3da54f402f5c64989abc77b6890c8218ca26330d1cbb88bed27001e1de2224ebe54e725fb30445cac21c69107771a199f6b225a36dc5a3587577641bc0e0
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD569c79807f366da0d7e911013bdbfaaad
SHA1a1491310af181cc9bcf9cdcdbfe661c359d425a4
SHA25615121d166dd26d8981ab1e58f87db3082745e2702b3c1d586925e1495079fbcf
SHA512ec72df229341e7b2fd405b94b9d9f9f59b1929780a17e5f5cab46abfa0a01c609f9665a80d7e041417275a0b10d58bc99eb5a029c27aa263b2e3923b74ef23fe