Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
31-05-2024 18:52
Static task
static1
Behavioral task
behavioral1
Sample
87fcb48efeaed127bf10524b74282fab_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
87fcb48efeaed127bf10524b74282fab_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
87fcb48efeaed127bf10524b74282fab_JaffaCakes118.html
-
Size
68KB
-
MD5
87fcb48efeaed127bf10524b74282fab
-
SHA1
cee4afff87a6c1068058971b5376acaeb1292c19
-
SHA256
bdc69b50f07c526d762735b3710d4d2b29809d792f52d988931c70474fa3091b
-
SHA512
c776d453f95031549975087f26261c73ecaf47d9162ce7d714e5580f8461ec64e64ca7621fcf081f089a035f6274cc5486d2f0ecef3dca5a4b6af3bad5dcf56e
-
SSDEEP
1536:W9sXSQnRfatgStKBdguxWDzlT+ABOGdbbw3GXxBHpFHPSMl68tofsEXcR37aX:pSkf7OK+woBHpR4vfl+37aX
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4388 msedge.exe 4388 msedge.exe 2676 msedge.exe 2676 msedge.exe 3068 identity_helper.exe 3068 identity_helper.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2676 wrote to memory of 4320 2676 msedge.exe 82 PID 2676 wrote to memory of 4320 2676 msedge.exe 82 PID 2676 wrote to memory of 1204 2676 msedge.exe 83 PID 2676 wrote to memory of 1204 2676 msedge.exe 83 PID 2676 wrote to memory of 1204 2676 msedge.exe 83 PID 2676 wrote to memory of 1204 2676 msedge.exe 83 PID 2676 wrote to memory of 1204 2676 msedge.exe 83 PID 2676 wrote to memory of 1204 2676 msedge.exe 83 PID 2676 wrote to memory of 1204 2676 msedge.exe 83 PID 2676 wrote to memory of 1204 2676 msedge.exe 83 PID 2676 wrote to memory of 1204 2676 msedge.exe 83 PID 2676 wrote to memory of 1204 2676 msedge.exe 83 PID 2676 wrote to memory of 1204 2676 msedge.exe 83 PID 2676 wrote to memory of 1204 2676 msedge.exe 83 PID 2676 wrote to memory of 1204 2676 msedge.exe 83 PID 2676 wrote to memory of 1204 2676 msedge.exe 83 PID 2676 wrote to memory of 1204 2676 msedge.exe 83 PID 2676 wrote to memory of 1204 2676 msedge.exe 83 PID 2676 wrote to memory of 1204 2676 msedge.exe 83 PID 2676 wrote to memory of 1204 2676 msedge.exe 83 PID 2676 wrote to memory of 1204 2676 msedge.exe 83 PID 2676 wrote to memory of 1204 2676 msedge.exe 83 PID 2676 wrote to memory of 1204 2676 msedge.exe 83 PID 2676 wrote to memory of 1204 2676 msedge.exe 83 PID 2676 wrote to memory of 1204 2676 msedge.exe 83 PID 2676 wrote to memory of 1204 2676 msedge.exe 83 PID 2676 wrote to memory of 1204 2676 msedge.exe 83 PID 2676 wrote to memory of 1204 2676 msedge.exe 83 PID 2676 wrote to memory of 1204 2676 msedge.exe 83 PID 2676 wrote to memory of 1204 2676 msedge.exe 83 PID 2676 wrote to memory of 1204 2676 msedge.exe 83 PID 2676 wrote to memory of 1204 2676 msedge.exe 83 PID 2676 wrote to memory of 1204 2676 msedge.exe 83 PID 2676 wrote to memory of 1204 2676 msedge.exe 83 PID 2676 wrote to memory of 1204 2676 msedge.exe 83 PID 2676 wrote to memory of 1204 2676 msedge.exe 83 PID 2676 wrote to memory of 1204 2676 msedge.exe 83 PID 2676 wrote to memory of 1204 2676 msedge.exe 83 PID 2676 wrote to memory of 1204 2676 msedge.exe 83 PID 2676 wrote to memory of 1204 2676 msedge.exe 83 PID 2676 wrote to memory of 1204 2676 msedge.exe 83 PID 2676 wrote to memory of 1204 2676 msedge.exe 83 PID 2676 wrote to memory of 4388 2676 msedge.exe 84 PID 2676 wrote to memory of 4388 2676 msedge.exe 84 PID 2676 wrote to memory of 2588 2676 msedge.exe 85 PID 2676 wrote to memory of 2588 2676 msedge.exe 85 PID 2676 wrote to memory of 2588 2676 msedge.exe 85 PID 2676 wrote to memory of 2588 2676 msedge.exe 85 PID 2676 wrote to memory of 2588 2676 msedge.exe 85 PID 2676 wrote to memory of 2588 2676 msedge.exe 85 PID 2676 wrote to memory of 2588 2676 msedge.exe 85 PID 2676 wrote to memory of 2588 2676 msedge.exe 85 PID 2676 wrote to memory of 2588 2676 msedge.exe 85 PID 2676 wrote to memory of 2588 2676 msedge.exe 85 PID 2676 wrote to memory of 2588 2676 msedge.exe 85 PID 2676 wrote to memory of 2588 2676 msedge.exe 85 PID 2676 wrote to memory of 2588 2676 msedge.exe 85 PID 2676 wrote to memory of 2588 2676 msedge.exe 85 PID 2676 wrote to memory of 2588 2676 msedge.exe 85 PID 2676 wrote to memory of 2588 2676 msedge.exe 85 PID 2676 wrote to memory of 2588 2676 msedge.exe 85 PID 2676 wrote to memory of 2588 2676 msedge.exe 85 PID 2676 wrote to memory of 2588 2676 msedge.exe 85 PID 2676 wrote to memory of 2588 2676 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\87fcb48efeaed127bf10524b74282fab_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff8c3c46f8,0x7fff8c3c4708,0x7fff8c3c47182⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,10890987467071791583,5272480429814167189,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:22⤵PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2180,10890987467071791583,5272480429814167189,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2180,10890987467071791583,5272480429814167189,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:2588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,10890987467071791583,5272480429814167189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,10890987467071791583,5272480429814167189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,10890987467071791583,5272480429814167189,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5972 /prefetch:82⤵PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,10890987467071791583,5272480429814167189,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5972 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,10890987467071791583,5272480429814167189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,10890987467071791583,5272480429814167189,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:12⤵PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,10890987467071791583,5272480429814167189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5824 /prefetch:12⤵PID:2628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,10890987467071791583,5272480429814167189,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,10890987467071791583,5272480429814167189,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4012 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4528
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2408
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3268
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
182B
MD5136a8627c9f4b9e2c7d3a90d2556f6d1
SHA1a0950a4a78f7bf1a4d08fe5dc8040d25e5e7094b
SHA25606d0224a7ed0c632fe0d506783ac4be33fdfa3c3b3b4a46dcfd4bbf0a1a08ea5
SHA5122399bbaeaf845478196f713f1e78c222568650d1cddaac47ffd82d93ef2a60d1cc7e40bed100afff0101713e70373793d2608f90e75e471f849888c19c88af1d
-
Filesize
5KB
MD57f708a2458cfdc0ab1017d997f21b892
SHA16546617564b2e433e4b94964d66ad99b9fcd5f66
SHA25604487749712caf50b34ca4cdfccd89370c23a15f2f7de2a9cff41ac16bf4c841
SHA512586d78c7dbec531a4440b64e06759498e89a3fa6e0170387acbed380e0095e6537d948a4c7c8b02b0dfe4f43da2dd88357fd8390ad258b7daba4b0d0bc22f2e6
-
Filesize
6KB
MD5c220d2d29a369e7310e87529be5b0049
SHA1c6763c0889d3f1999dd72615ac5c345b74ff8e35
SHA2563b96c53fc8cbb7a344807ecf6c4c3f5c399e2d47d5d9bbc5d0ce10c887b0b5e8
SHA512de660682326c7001964301ad1b089f6e0d799dd2d212a5ac06773d3858742eafea63fa12a3c55973560ea4a3201f91d9b82d9e1bbab9b6f33f6af4420c7f3e89
-
Filesize
6KB
MD5e5ca1667c6f88c954206c940cfcf9c9c
SHA114b7eadff47b519e00ef07dbe6d99e1db361725f
SHA256bb6b8abcbaf988faf26079645a464b55f231b2742a46fafc89889c70c9388570
SHA5125642adb9add1944711636ca60e9be1a6cf459a112f8740dfb11df0c704300974272299c033c26045c5fa44a7ca7db9259c03f8df35ad2c3e0568928a9aad517a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD518f56c47fa3f05973a30c26a8f980bd8
SHA19512c48f2b084d24ddf4b9e738b0eb9589ba7479
SHA256702057d99d8d0f94e94abc82a040976c68acca7a588749ba178129dd5964667d
SHA5120acc9364a2963534d57640f33149e14e247123cea6cd9fecb05191b37d0b21b1bc0582aafdc4d1e7675a64f7a3c8c7089e842b856e80c3732d73343a2d1908f2