Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
31/05/2024, 19:28
Static task
static1
Behavioral task
behavioral1
Sample
881931d4459a376d8613c2f185a7bfcd_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
881931d4459a376d8613c2f185a7bfcd_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
881931d4459a376d8613c2f185a7bfcd_JaffaCakes118.html
-
Size
91KB
-
MD5
881931d4459a376d8613c2f185a7bfcd
-
SHA1
ae42921ad2d5976b2615e8dd10052600d32596f3
-
SHA256
b00dbd8ac85342547ece7f49212162d4cf06a2073626cbff7ab231620f190da6
-
SHA512
d406fd809a60aab0c528b2e2420ac2c914b21168755a15ccee69c18d08066cb0ed619c2e962f83a7006911f7e01e260713d956129b6a43acc925b546b6a8ee6a
-
SSDEEP
1536:eFhaACZcAbqsZun5MrOOLfnzHSvyM7kfT17tB61srsrDMLE7TnMG6ePICcwczbe/:4aNWmqsZ7id7kfT17tB61srsrDMLE7Tb
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4564 msedge.exe 4564 msedge.exe 3652 msedge.exe 3652 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4700 identity_helper.exe 4700 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3652 wrote to memory of 1128 3652 msedge.exe 81 PID 3652 wrote to memory of 1128 3652 msedge.exe 81 PID 3652 wrote to memory of 5036 3652 msedge.exe 83 PID 3652 wrote to memory of 5036 3652 msedge.exe 83 PID 3652 wrote to memory of 5036 3652 msedge.exe 83 PID 3652 wrote to memory of 5036 3652 msedge.exe 83 PID 3652 wrote to memory of 5036 3652 msedge.exe 83 PID 3652 wrote to memory of 5036 3652 msedge.exe 83 PID 3652 wrote to memory of 5036 3652 msedge.exe 83 PID 3652 wrote to memory of 5036 3652 msedge.exe 83 PID 3652 wrote to memory of 5036 3652 msedge.exe 83 PID 3652 wrote to memory of 5036 3652 msedge.exe 83 PID 3652 wrote to memory of 5036 3652 msedge.exe 83 PID 3652 wrote to memory of 5036 3652 msedge.exe 83 PID 3652 wrote to memory of 5036 3652 msedge.exe 83 PID 3652 wrote to memory of 5036 3652 msedge.exe 83 PID 3652 wrote to memory of 5036 3652 msedge.exe 83 PID 3652 wrote to memory of 5036 3652 msedge.exe 83 PID 3652 wrote to memory of 5036 3652 msedge.exe 83 PID 3652 wrote to memory of 5036 3652 msedge.exe 83 PID 3652 wrote to memory of 5036 3652 msedge.exe 83 PID 3652 wrote to memory of 5036 3652 msedge.exe 83 PID 3652 wrote to memory of 5036 3652 msedge.exe 83 PID 3652 wrote to memory of 5036 3652 msedge.exe 83 PID 3652 wrote to memory of 5036 3652 msedge.exe 83 PID 3652 wrote to memory of 5036 3652 msedge.exe 83 PID 3652 wrote to memory of 5036 3652 msedge.exe 83 PID 3652 wrote to memory of 5036 3652 msedge.exe 83 PID 3652 wrote to memory of 5036 3652 msedge.exe 83 PID 3652 wrote to memory of 5036 3652 msedge.exe 83 PID 3652 wrote to memory of 5036 3652 msedge.exe 83 PID 3652 wrote to memory of 5036 3652 msedge.exe 83 PID 3652 wrote to memory of 5036 3652 msedge.exe 83 PID 3652 wrote to memory of 5036 3652 msedge.exe 83 PID 3652 wrote to memory of 5036 3652 msedge.exe 83 PID 3652 wrote to memory of 5036 3652 msedge.exe 83 PID 3652 wrote to memory of 5036 3652 msedge.exe 83 PID 3652 wrote to memory of 5036 3652 msedge.exe 83 PID 3652 wrote to memory of 5036 3652 msedge.exe 83 PID 3652 wrote to memory of 5036 3652 msedge.exe 83 PID 3652 wrote to memory of 5036 3652 msedge.exe 83 PID 3652 wrote to memory of 5036 3652 msedge.exe 83 PID 3652 wrote to memory of 4564 3652 msedge.exe 84 PID 3652 wrote to memory of 4564 3652 msedge.exe 84 PID 3652 wrote to memory of 4620 3652 msedge.exe 85 PID 3652 wrote to memory of 4620 3652 msedge.exe 85 PID 3652 wrote to memory of 4620 3652 msedge.exe 85 PID 3652 wrote to memory of 4620 3652 msedge.exe 85 PID 3652 wrote to memory of 4620 3652 msedge.exe 85 PID 3652 wrote to memory of 4620 3652 msedge.exe 85 PID 3652 wrote to memory of 4620 3652 msedge.exe 85 PID 3652 wrote to memory of 4620 3652 msedge.exe 85 PID 3652 wrote to memory of 4620 3652 msedge.exe 85 PID 3652 wrote to memory of 4620 3652 msedge.exe 85 PID 3652 wrote to memory of 4620 3652 msedge.exe 85 PID 3652 wrote to memory of 4620 3652 msedge.exe 85 PID 3652 wrote to memory of 4620 3652 msedge.exe 85 PID 3652 wrote to memory of 4620 3652 msedge.exe 85 PID 3652 wrote to memory of 4620 3652 msedge.exe 85 PID 3652 wrote to memory of 4620 3652 msedge.exe 85 PID 3652 wrote to memory of 4620 3652 msedge.exe 85 PID 3652 wrote to memory of 4620 3652 msedge.exe 85 PID 3652 wrote to memory of 4620 3652 msedge.exe 85 PID 3652 wrote to memory of 4620 3652 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\881931d4459a376d8613c2f185a7bfcd_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8451f46f8,0x7ff8451f4708,0x7ff8451f47182⤵PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,7283301506101541144,2627768761385026456,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,7283301506101541144,2627768761385026456,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,7283301506101541144,2627768761385026456,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:82⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,7283301506101541144,2627768761385026456,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,7283301506101541144,2627768761385026456,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,7283301506101541144,2627768761385026456,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1700 /prefetch:12⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,7283301506101541144,2627768761385026456,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3804 /prefetch:12⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,7283301506101541144,2627768761385026456,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4948 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,7283301506101541144,2627768761385026456,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5700 /prefetch:82⤵PID:1324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,7283301506101541144,2627768761385026456,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5700 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,7283301506101541144,2627768761385026456,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,7283301506101541144,2627768761385026456,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,7283301506101541144,2627768761385026456,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,7283301506101541144,2627768761385026456,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:5016
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4888
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3136
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
625B
MD5625d4e812f335407e355d24662168680
SHA112080b60977c8b15a13f548e2b49ad19c1696b73
SHA2562333f5a4115585b3d9fe97ab62062c64bdd220e7f5f63a5337205f1aeb4e37bb
SHA5128a6e923dc6d4e72f23aae5767f13a05a403c0a6608eba8aaf7c9bc3fc44c4aa13840fcedf5ea89fd6d0bbf2e45166dc3d8736b9b1646d09a759410fca128eb80
-
Filesize
5KB
MD540cf7614f4bd634c4e3cf6dac342f7fd
SHA10ec8337e38720fa615ff8139738b5969f564b4bd
SHA2564e6b0eb328c0f1240d668ff2f34249f61f7652c1a5ebd88b26dd0a4c74c146f7
SHA5124dbac8245e8829c7aa7ef8736a043d95eb275244656042e97c9af2d8a51ad1b79fd85f66b5c119496c8e585d074f41f5a58594fe1b55ea3c8d2de636bf7198a4
-
Filesize
7KB
MD56ece5f9390eae69ca0619ae9bff562ea
SHA1f4ede43da7a51025c751bbe7c11e5755575f0700
SHA2565eb27e81f28930130d1d76953f6eee7cfe6b821b2deb0043e5ac0f7e4fb67703
SHA51226be91165f6d4d9bc19489840c98a1fcd4b428f270034700fd072f34376bd961e047da117254d9d4621e45c3a9d40bbe4cac496378ffd6f5b277f8720966a9ad
-
Filesize
6KB
MD57c205b992f210d82816136cac050fadf
SHA155c99f084aed10717e98c1cf946e4d902521a97b
SHA256f1355d0da74b1b83277cbab84fad725f066e11086e0a4f7751dea8b0347314ff
SHA5122225cf3f0b816a7e8e447b9e611791a2a2efdaeec876f46696fdbf6669849864c0882f071f9e5554918d02de01675586557ee993c09d95b29bfdaa461ee089df
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5fd76dcdc7d7643023324e77b10b88d6d
SHA13cc5982e40fea885e73ba37e049319978dc4e889
SHA2567bbf01d645fe4094ff6cf2cc6229a0de35e87ed074dd2e9f981afaf53dca32cb
SHA512da564a02c723f866f9d777d8b26992e355a875adfa8a3ad99b1488dcd458652713b136f97205ddd75005cb5ab69b0cfbce75e8e863350b2b7448eefdccc31bfd