Analysis
-
max time kernel
100s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
31-05-2024 19:06
Static task
static1
Behavioral task
behavioral1
Sample
880654ed771b67392df3ead00a5c0cea_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
880654ed771b67392df3ead00a5c0cea_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
880654ed771b67392df3ead00a5c0cea_JaffaCakes118.html
-
Size
50KB
-
MD5
880654ed771b67392df3ead00a5c0cea
-
SHA1
3f9e9170c1f29278120e2e0e3b10034f1d8efa68
-
SHA256
1ef193f45435a2f45d1a70db58958ca65288017f33e62c72c2df019f247fe00a
-
SHA512
050898aa2ce9ef9e68b885844049ce213abc83719124aa203b9319b341adcc870ee416b90b07096b52263a83b77dc4b32a88c72ff14ad551bf3aa54d85897004
-
SSDEEP
1536:yzezcOBXKY0ghNxgefN3MU39DMgeNJf+wJ0:2oBXK9geefR9DqPJ0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1000 msedge.exe 1000 msedge.exe 896 msedge.exe 896 msedge.exe 4052 identity_helper.exe 4052 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 896 msedge.exe 896 msedge.exe 896 msedge.exe 896 msedge.exe 896 msedge.exe 896 msedge.exe 896 msedge.exe 896 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 896 msedge.exe 896 msedge.exe 896 msedge.exe 896 msedge.exe 896 msedge.exe 896 msedge.exe 896 msedge.exe 896 msedge.exe 896 msedge.exe 896 msedge.exe 896 msedge.exe 896 msedge.exe 896 msedge.exe 896 msedge.exe 896 msedge.exe 896 msedge.exe 896 msedge.exe 896 msedge.exe 896 msedge.exe 896 msedge.exe 896 msedge.exe 896 msedge.exe 896 msedge.exe 896 msedge.exe 896 msedge.exe 896 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 896 msedge.exe 896 msedge.exe 896 msedge.exe 896 msedge.exe 896 msedge.exe 896 msedge.exe 896 msedge.exe 896 msedge.exe 896 msedge.exe 896 msedge.exe 896 msedge.exe 896 msedge.exe 896 msedge.exe 896 msedge.exe 896 msedge.exe 896 msedge.exe 896 msedge.exe 896 msedge.exe 896 msedge.exe 896 msedge.exe 896 msedge.exe 896 msedge.exe 896 msedge.exe 896 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 896 wrote to memory of 1644 896 msedge.exe 80 PID 896 wrote to memory of 1644 896 msedge.exe 80 PID 896 wrote to memory of 4320 896 msedge.exe 81 PID 896 wrote to memory of 4320 896 msedge.exe 81 PID 896 wrote to memory of 4320 896 msedge.exe 81 PID 896 wrote to memory of 4320 896 msedge.exe 81 PID 896 wrote to memory of 4320 896 msedge.exe 81 PID 896 wrote to memory of 4320 896 msedge.exe 81 PID 896 wrote to memory of 4320 896 msedge.exe 81 PID 896 wrote to memory of 4320 896 msedge.exe 81 PID 896 wrote to memory of 4320 896 msedge.exe 81 PID 896 wrote to memory of 4320 896 msedge.exe 81 PID 896 wrote to memory of 4320 896 msedge.exe 81 PID 896 wrote to memory of 4320 896 msedge.exe 81 PID 896 wrote to memory of 4320 896 msedge.exe 81 PID 896 wrote to memory of 4320 896 msedge.exe 81 PID 896 wrote to memory of 4320 896 msedge.exe 81 PID 896 wrote to memory of 4320 896 msedge.exe 81 PID 896 wrote to memory of 4320 896 msedge.exe 81 PID 896 wrote to memory of 4320 896 msedge.exe 81 PID 896 wrote to memory of 4320 896 msedge.exe 81 PID 896 wrote to memory of 4320 896 msedge.exe 81 PID 896 wrote to memory of 4320 896 msedge.exe 81 PID 896 wrote to memory of 4320 896 msedge.exe 81 PID 896 wrote to memory of 4320 896 msedge.exe 81 PID 896 wrote to memory of 4320 896 msedge.exe 81 PID 896 wrote to memory of 4320 896 msedge.exe 81 PID 896 wrote to memory of 4320 896 msedge.exe 81 PID 896 wrote to memory of 4320 896 msedge.exe 81 PID 896 wrote to memory of 4320 896 msedge.exe 81 PID 896 wrote to memory of 4320 896 msedge.exe 81 PID 896 wrote to memory of 4320 896 msedge.exe 81 PID 896 wrote to memory of 4320 896 msedge.exe 81 PID 896 wrote to memory of 4320 896 msedge.exe 81 PID 896 wrote to memory of 4320 896 msedge.exe 81 PID 896 wrote to memory of 4320 896 msedge.exe 81 PID 896 wrote to memory of 4320 896 msedge.exe 81 PID 896 wrote to memory of 4320 896 msedge.exe 81 PID 896 wrote to memory of 4320 896 msedge.exe 81 PID 896 wrote to memory of 4320 896 msedge.exe 81 PID 896 wrote to memory of 4320 896 msedge.exe 81 PID 896 wrote to memory of 4320 896 msedge.exe 81 PID 896 wrote to memory of 1000 896 msedge.exe 82 PID 896 wrote to memory of 1000 896 msedge.exe 82 PID 896 wrote to memory of 3448 896 msedge.exe 83 PID 896 wrote to memory of 3448 896 msedge.exe 83 PID 896 wrote to memory of 3448 896 msedge.exe 83 PID 896 wrote to memory of 3448 896 msedge.exe 83 PID 896 wrote to memory of 3448 896 msedge.exe 83 PID 896 wrote to memory of 3448 896 msedge.exe 83 PID 896 wrote to memory of 3448 896 msedge.exe 83 PID 896 wrote to memory of 3448 896 msedge.exe 83 PID 896 wrote to memory of 3448 896 msedge.exe 83 PID 896 wrote to memory of 3448 896 msedge.exe 83 PID 896 wrote to memory of 3448 896 msedge.exe 83 PID 896 wrote to memory of 3448 896 msedge.exe 83 PID 896 wrote to memory of 3448 896 msedge.exe 83 PID 896 wrote to memory of 3448 896 msedge.exe 83 PID 896 wrote to memory of 3448 896 msedge.exe 83 PID 896 wrote to memory of 3448 896 msedge.exe 83 PID 896 wrote to memory of 3448 896 msedge.exe 83 PID 896 wrote to memory of 3448 896 msedge.exe 83 PID 896 wrote to memory of 3448 896 msedge.exe 83 PID 896 wrote to memory of 3448 896 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\880654ed771b67392df3ead00a5c0cea_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff936df46f8,0x7ff936df4708,0x7ff936df47182⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,11290058625360779195,8016521503722445285,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,11290058625360779195,8016521503722445285,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2476 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,11290058625360779195,8016521503722445285,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11290058625360779195,8016521503722445285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11290058625360779195,8016521503722445285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,11290058625360779195,8016521503722445285,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,11290058625360779195,8016521503722445285,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11290058625360779195,8016521503722445285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:12⤵PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11290058625360779195,8016521503722445285,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:3880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11290058625360779195,8016521503722445285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:12⤵PID:528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11290058625360779195,8016521503722445285,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11290058625360779195,8016521503722445285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3676 /prefetch:12⤵PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11290058625360779195,8016521503722445285,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2712 /prefetch:12⤵PID:1728
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1248
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
309B
MD52565e2d5f47f586e1c79e4c02d6844fa
SHA1b79af3c0a7e2d275782761e797b714e297b2d705
SHA25605b3fc6ec79ccf9e6c9225883676d36dce5588700c0c0914eba1d177c1349fdd
SHA512631bb7cdb957b24b0b92ca8fe92aff7c3680f7300e799d760f8bc08be2584ac5baea62a686a8fcbd3b013c049a78c9b2c0d5e978b3290cc30ef63af28e6fb787
-
Filesize
6KB
MD59b9d3d135707e0f7292cf4ada2fdc70a
SHA16858469ea19fbbd6cec6959c1f2644a28695db56
SHA256e6f48c83a26490de8e8428ffbd318bf32279a09e05a73e36202d7c8ab8452336
SHA5122ccdb81adc9787151e95b58e8c485fb5eb8bfbc3f39a3dbbe3ac8d48809ecbc5d420c6bf5a943381c506b2ad9d446b5faaacc2288e4aa8e403fa1f445dc2247a
-
Filesize
5KB
MD56186bcdae8cb1a099033329d8d888c78
SHA18e052eb25e94fdc1c6e8465dcf2c3ca5988744c7
SHA2565778c43057891107772623c36fd5b44904cda96b83d87735f2c614f0c1247463
SHA512c400f1665c319c4c1f24c2459cb8e35535f977a09d5eb0a1306a9f3e7cf6ee997daf8a131ea4a09b99ca53b62904fd1e4c1a1faf190a02cfec54e679e7987864
-
Filesize
6KB
MD5ab1b60781f1e19dce10e77fbb640c243
SHA1fe7be6702bc5d18e98763f2c40cc38339f1dd45c
SHA2563db19780bd8db4b5b514da7c137b50b4805a504acfd88199c78b40ca2fff003d
SHA512121b4699ad9eb9225f51c44beb539f55286ab2b648b34a1d685787ddd78b1d7b8b9cab3026eab0da8a3bf0bbd85c8490e715cdf2a0e8b0ee40c222dc70926eeb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5112f88ac8c63ec453d749d819ce80517
SHA13f2a00fe7c51c380d39246bf65be7018967d81e1
SHA2562f230358a4d4b59b57855c286c56122b16151a751da9a12f6e50f4db0f6d5ef7
SHA512cb6facd0791dd9ee6e6704b2de23a944a0184ec57375f31ec195e8de68b615ec8069b7da9ffdffaaf0d540b9646333e02a705c7f00ed959af0b11065c1346a4e
-
Filesize
10KB
MD5b97bf463b28ecf8427ee122d2aaceb44
SHA19a6cdf5eaadc5ee185c6f1f1501f0d60ac7405af
SHA256ba7bed4a27bfa81fa22660bd2d3418bc91f1660b14b54bc183b57bd22662eaaa
SHA512ca13190c304e9eb79943c7f6773472e418b430e9fa96248b60f352e1fd8d1f43a024fb9b4936db49b8074ca946ffad2685f9fdbb2647bf536213312084653611