Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
31/05/2024, 17:31
Static task
static1
Behavioral task
behavioral1
Sample
87c42e8f8fc50d8139a80fdf6abdc92a_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
87c42e8f8fc50d8139a80fdf6abdc92a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
87c42e8f8fc50d8139a80fdf6abdc92a_JaffaCakes118.html
-
Size
24KB
-
MD5
87c42e8f8fc50d8139a80fdf6abdc92a
-
SHA1
bd173af15f4b68a9150390c04fc51fd21df72637
-
SHA256
a9096ae8551c6017623688c5f6eafa5ef86272b288f6465b2500c3d3050cd387
-
SHA512
3635236d4c3efadc8164d5a4097bd50b49a2b73a5561d3eb1a226782a0666c6063dff8401f39ecee591b9ad6a31553c370322a4640266eda90842168874bca67
-
SSDEEP
384:N4MM8ujOQOp2kc2NGPK2ugH/rZvfHgrVFLF0FY2rThpepJOUKg5z:SMM8oOQOp1uHHgrVFLF0FY2rThcDOUb1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4824 msedge.exe 4824 msedge.exe 1372 msedge.exe 1372 msedge.exe 4496 identity_helper.exe 4496 identity_helper.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1372 wrote to memory of 1240 1372 msedge.exe 81 PID 1372 wrote to memory of 1240 1372 msedge.exe 81 PID 1372 wrote to memory of 3452 1372 msedge.exe 82 PID 1372 wrote to memory of 3452 1372 msedge.exe 82 PID 1372 wrote to memory of 3452 1372 msedge.exe 82 PID 1372 wrote to memory of 3452 1372 msedge.exe 82 PID 1372 wrote to memory of 3452 1372 msedge.exe 82 PID 1372 wrote to memory of 3452 1372 msedge.exe 82 PID 1372 wrote to memory of 3452 1372 msedge.exe 82 PID 1372 wrote to memory of 3452 1372 msedge.exe 82 PID 1372 wrote to memory of 3452 1372 msedge.exe 82 PID 1372 wrote to memory of 3452 1372 msedge.exe 82 PID 1372 wrote to memory of 3452 1372 msedge.exe 82 PID 1372 wrote to memory of 3452 1372 msedge.exe 82 PID 1372 wrote to memory of 3452 1372 msedge.exe 82 PID 1372 wrote to memory of 3452 1372 msedge.exe 82 PID 1372 wrote to memory of 3452 1372 msedge.exe 82 PID 1372 wrote to memory of 3452 1372 msedge.exe 82 PID 1372 wrote to memory of 3452 1372 msedge.exe 82 PID 1372 wrote to memory of 3452 1372 msedge.exe 82 PID 1372 wrote to memory of 3452 1372 msedge.exe 82 PID 1372 wrote to memory of 3452 1372 msedge.exe 82 PID 1372 wrote to memory of 3452 1372 msedge.exe 82 PID 1372 wrote to memory of 3452 1372 msedge.exe 82 PID 1372 wrote to memory of 3452 1372 msedge.exe 82 PID 1372 wrote to memory of 3452 1372 msedge.exe 82 PID 1372 wrote to memory of 3452 1372 msedge.exe 82 PID 1372 wrote to memory of 3452 1372 msedge.exe 82 PID 1372 wrote to memory of 3452 1372 msedge.exe 82 PID 1372 wrote to memory of 3452 1372 msedge.exe 82 PID 1372 wrote to memory of 3452 1372 msedge.exe 82 PID 1372 wrote to memory of 3452 1372 msedge.exe 82 PID 1372 wrote to memory of 3452 1372 msedge.exe 82 PID 1372 wrote to memory of 3452 1372 msedge.exe 82 PID 1372 wrote to memory of 3452 1372 msedge.exe 82 PID 1372 wrote to memory of 3452 1372 msedge.exe 82 PID 1372 wrote to memory of 3452 1372 msedge.exe 82 PID 1372 wrote to memory of 3452 1372 msedge.exe 82 PID 1372 wrote to memory of 3452 1372 msedge.exe 82 PID 1372 wrote to memory of 3452 1372 msedge.exe 82 PID 1372 wrote to memory of 3452 1372 msedge.exe 82 PID 1372 wrote to memory of 3452 1372 msedge.exe 82 PID 1372 wrote to memory of 4824 1372 msedge.exe 83 PID 1372 wrote to memory of 4824 1372 msedge.exe 83 PID 1372 wrote to memory of 4784 1372 msedge.exe 84 PID 1372 wrote to memory of 4784 1372 msedge.exe 84 PID 1372 wrote to memory of 4784 1372 msedge.exe 84 PID 1372 wrote to memory of 4784 1372 msedge.exe 84 PID 1372 wrote to memory of 4784 1372 msedge.exe 84 PID 1372 wrote to memory of 4784 1372 msedge.exe 84 PID 1372 wrote to memory of 4784 1372 msedge.exe 84 PID 1372 wrote to memory of 4784 1372 msedge.exe 84 PID 1372 wrote to memory of 4784 1372 msedge.exe 84 PID 1372 wrote to memory of 4784 1372 msedge.exe 84 PID 1372 wrote to memory of 4784 1372 msedge.exe 84 PID 1372 wrote to memory of 4784 1372 msedge.exe 84 PID 1372 wrote to memory of 4784 1372 msedge.exe 84 PID 1372 wrote to memory of 4784 1372 msedge.exe 84 PID 1372 wrote to memory of 4784 1372 msedge.exe 84 PID 1372 wrote to memory of 4784 1372 msedge.exe 84 PID 1372 wrote to memory of 4784 1372 msedge.exe 84 PID 1372 wrote to memory of 4784 1372 msedge.exe 84 PID 1372 wrote to memory of 4784 1372 msedge.exe 84 PID 1372 wrote to memory of 4784 1372 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\87c42e8f8fc50d8139a80fdf6abdc92a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa63f046f8,0x7ffa63f04708,0x7ffa63f047182⤵PID:1240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,13337756225866245286,2086384447540332462,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,13337756225866245286,2086384447540332462,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,13337756225866245286,2086384447540332462,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,13337756225866245286,2086384447540332462,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,13337756225866245286,2086384447540332462,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,13337756225866245286,2086384447540332462,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,13337756225866245286,2086384447540332462,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5488 /prefetch:82⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,13337756225866245286,2086384447540332462,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5488 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,13337756225866245286,2086384447540332462,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,13337756225866245286,2086384447540332462,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4628 /prefetch:12⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,13337756225866245286,2086384447540332462,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:12⤵PID:1772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,13337756225866245286,2086384447540332462,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,13337756225866245286,2086384447540332462,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3032 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4460
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4924
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4496
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
1KB
MD53c423eb7c67faa31f9789d435957c7db
SHA166754bdc045ffba6309d3691b4ccbf8c4abdbeef
SHA2565daf3ba6d9d9cddface4ceefb8d115203ec92ba39b95c3e2f23b823cc8b6530c
SHA5122db65e0616c38e0264349b8e1a5d179c1c72a7d9119d4c2d234c678c53f659fac9c420972f6bdecdb41539882ac63ab45edc1f22650262b4c5238b46b0f9133b
-
Filesize
1KB
MD58f1f26aa252e735a73cba5a4fb799292
SHA1472fc62e81de164dd54c1009c8aeb716eb38f000
SHA2568ed575cf8113229eafc54d4f737d9e479110b7863cd10638ab3fad1265ba18f9
SHA512e674b90492ff48f95855df4ce11ed037e8113fdaa64c1aefa476c816cc9863a4d373f320131fde0983abcb8466b95ba313be869113ac70f3a2e67ae53ab4feeb
-
Filesize
5KB
MD5c50db0414175ba37ab5d3e9d9087954f
SHA1643a1e7f9140c52bd058622a26d1648811b8d729
SHA256fa3cda29b2200441a933454341463fcc29745c2d95832f35dec9360bf4228894
SHA51278ad49983c9f3686143dba09f9ceaafbd07489b27d0bbd035e02ef7e431687c3a1d10f659ae1f47d45b610997b2cd52305cdddfeccf3975446f443d4999ce8b6
-
Filesize
6KB
MD5b795061171867141629dac3bacd0f112
SHA145a3965105153ae7a37377b7f9cec96e2991da98
SHA256d8c0043b52bda9f186deb2a395cefb6215c560ff146da70fd755b8965ab3e8eb
SHA51211c0d32d9b7999f2b10bb2cf81aff276fd6f1d4eb143cc808e464e26f1f2e77b1b7b5504589f5f698de90775240d4bfb1119fa9cdeecc607cff1c6298b08969a
-
Filesize
6KB
MD5798991b2558d9cf4912a280b4673ad61
SHA17f794d00fd1696bfbab888c4aa540827a30b1ecd
SHA25658a8e0c2b381fbdb1800f3020a52ea7ad9c442a0e0c216aebc0a95470081445c
SHA512fcdbd1260a5759a78bbe1b7441fb969f7089d3106957f6c681c5acf7899073330c15fab88827781ae9788bc747eedfda92f6592b8c75c6c8430e7754e7a7a5fb
-
Filesize
536B
MD533dc0b9cafbc11a5e1e21b55670076d2
SHA15c5cdb84aee5743bf02c16f82bc8675b333c6a28
SHA256f52127729012fae64ba2c632c794fb9bde3be74353e5948f456b9d6598ebbd28
SHA512a5419eb92a22f9514ba8c59d36e507152d33ec55b640222857f86c4f1b36212dc8d6bedb565c908edb16db1b46575e79df758a1faae90661ee201f84b9aab41f
-
Filesize
368B
MD5cc508128ee39a94642057a037b461f5d
SHA106a59c8e839acb881bc291058dcd6bfddad4a1d5
SHA2563c2fb9601c3d681cfaf090578f2af59b12c37befa54daba5b42daaf3aa05194b
SHA512f554c935609c9879e2f3fd44a6ae727fa9b3ba14a821fe8d52cf42727bf9d6fd8ead45bf339c336d68d6b3ed32823de6c2114cd57846149eaa6f452bacc937f2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5a7735eb45436c2d834d49885e673eac8
SHA1ccd4cac1f682e08745de0b9674eecbfe9bd2b6d8
SHA25667f3c19ce5fe05eb65e2b724c5fa3efe8056f5e625238ccd2cd8cce75a7653cc
SHA5120c1d22193f43689c9a43c68082c7d2d6386fee0396bd9ca63fa82853804bedd9d82bf86992bb65d039e1de607b87e646ff8cf1d19fc45c494c5a14b7eff70a0c