Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
01-06-2024 04:36
Static task
static1
Behavioral task
behavioral1
Sample
8961663449784af41e531e209e4cd936_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8961663449784af41e531e209e4cd936_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8961663449784af41e531e209e4cd936_JaffaCakes118.html
-
Size
99KB
-
MD5
8961663449784af41e531e209e4cd936
-
SHA1
1da57d305ac90693543e3f828115b7721e8dc824
-
SHA256
f81fd0dd4648f4baec844acc10b5881788fcd05003e864349fc8b4b188e15191
-
SHA512
6fd2c133e20d352312da883292e37f2d627b791024d8a89f122bf453691cc673a20597c684cf0a44f238fe70f8959bcd6cca59a08bcebc7e93fe1a00360b10ec
-
SSDEEP
768:SNcvxbb9hO4N1CtQydGXE1QqlzcHH23YgQpdKEMdDTC9OIe8ALaV0kyUlKT7iGWl:SNeBb9h71EGtMsI6vX
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3940 msedge.exe 3940 msedge.exe 5092 msedge.exe 5092 msedge.exe 1692 identity_helper.exe 1692 identity_helper.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5092 wrote to memory of 3608 5092 msedge.exe 81 PID 5092 wrote to memory of 3608 5092 msedge.exe 81 PID 5092 wrote to memory of 2124 5092 msedge.exe 82 PID 5092 wrote to memory of 2124 5092 msedge.exe 82 PID 5092 wrote to memory of 2124 5092 msedge.exe 82 PID 5092 wrote to memory of 2124 5092 msedge.exe 82 PID 5092 wrote to memory of 2124 5092 msedge.exe 82 PID 5092 wrote to memory of 2124 5092 msedge.exe 82 PID 5092 wrote to memory of 2124 5092 msedge.exe 82 PID 5092 wrote to memory of 2124 5092 msedge.exe 82 PID 5092 wrote to memory of 2124 5092 msedge.exe 82 PID 5092 wrote to memory of 2124 5092 msedge.exe 82 PID 5092 wrote to memory of 2124 5092 msedge.exe 82 PID 5092 wrote to memory of 2124 5092 msedge.exe 82 PID 5092 wrote to memory of 2124 5092 msedge.exe 82 PID 5092 wrote to memory of 2124 5092 msedge.exe 82 PID 5092 wrote to memory of 2124 5092 msedge.exe 82 PID 5092 wrote to memory of 2124 5092 msedge.exe 82 PID 5092 wrote to memory of 2124 5092 msedge.exe 82 PID 5092 wrote to memory of 2124 5092 msedge.exe 82 PID 5092 wrote to memory of 2124 5092 msedge.exe 82 PID 5092 wrote to memory of 2124 5092 msedge.exe 82 PID 5092 wrote to memory of 2124 5092 msedge.exe 82 PID 5092 wrote to memory of 2124 5092 msedge.exe 82 PID 5092 wrote to memory of 2124 5092 msedge.exe 82 PID 5092 wrote to memory of 2124 5092 msedge.exe 82 PID 5092 wrote to memory of 2124 5092 msedge.exe 82 PID 5092 wrote to memory of 2124 5092 msedge.exe 82 PID 5092 wrote to memory of 2124 5092 msedge.exe 82 PID 5092 wrote to memory of 2124 5092 msedge.exe 82 PID 5092 wrote to memory of 2124 5092 msedge.exe 82 PID 5092 wrote to memory of 2124 5092 msedge.exe 82 PID 5092 wrote to memory of 2124 5092 msedge.exe 82 PID 5092 wrote to memory of 2124 5092 msedge.exe 82 PID 5092 wrote to memory of 2124 5092 msedge.exe 82 PID 5092 wrote to memory of 2124 5092 msedge.exe 82 PID 5092 wrote to memory of 2124 5092 msedge.exe 82 PID 5092 wrote to memory of 2124 5092 msedge.exe 82 PID 5092 wrote to memory of 2124 5092 msedge.exe 82 PID 5092 wrote to memory of 2124 5092 msedge.exe 82 PID 5092 wrote to memory of 2124 5092 msedge.exe 82 PID 5092 wrote to memory of 2124 5092 msedge.exe 82 PID 5092 wrote to memory of 3940 5092 msedge.exe 83 PID 5092 wrote to memory of 3940 5092 msedge.exe 83 PID 5092 wrote to memory of 4880 5092 msedge.exe 84 PID 5092 wrote to memory of 4880 5092 msedge.exe 84 PID 5092 wrote to memory of 4880 5092 msedge.exe 84 PID 5092 wrote to memory of 4880 5092 msedge.exe 84 PID 5092 wrote to memory of 4880 5092 msedge.exe 84 PID 5092 wrote to memory of 4880 5092 msedge.exe 84 PID 5092 wrote to memory of 4880 5092 msedge.exe 84 PID 5092 wrote to memory of 4880 5092 msedge.exe 84 PID 5092 wrote to memory of 4880 5092 msedge.exe 84 PID 5092 wrote to memory of 4880 5092 msedge.exe 84 PID 5092 wrote to memory of 4880 5092 msedge.exe 84 PID 5092 wrote to memory of 4880 5092 msedge.exe 84 PID 5092 wrote to memory of 4880 5092 msedge.exe 84 PID 5092 wrote to memory of 4880 5092 msedge.exe 84 PID 5092 wrote to memory of 4880 5092 msedge.exe 84 PID 5092 wrote to memory of 4880 5092 msedge.exe 84 PID 5092 wrote to memory of 4880 5092 msedge.exe 84 PID 5092 wrote to memory of 4880 5092 msedge.exe 84 PID 5092 wrote to memory of 4880 5092 msedge.exe 84 PID 5092 wrote to memory of 4880 5092 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8961663449784af41e531e209e4cd936_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa63f046f8,0x7ffa63f04708,0x7ffa63f047182⤵PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,4650755415271079254,17065244410523010939,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:22⤵PID:2124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2036,4650755415271079254,17065244410523010939,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2036,4650755415271079254,17065244410523010939,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2944 /prefetch:82⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,4650755415271079254,17065244410523010939,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,4650755415271079254,17065244410523010939,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,4650755415271079254,17065244410523010939,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5872 /prefetch:82⤵PID:3304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,4650755415271079254,17065244410523010939,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5872 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,4650755415271079254,17065244410523010939,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5876 /prefetch:12⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,4650755415271079254,17065244410523010939,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,4650755415271079254,17065244410523010939,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4100 /prefetch:12⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,4650755415271079254,17065244410523010939,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,4650755415271079254,17065244410523010939,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2064
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2980
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4280
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
406B
MD5837f39858d3187eb124d5140b7735bf8
SHA13704d8354b0c83d9295032a7e76557f19da45345
SHA2568e6da31e9d0d122d221a6ff623786a2fce23135218ba84c166003e08e7c96a76
SHA5128f433f4f44d4f137c6d193b8977cb7e3460a1abc6ecbbd9947882e42af0834e84843be18fb8445d21694807d08c3bf0347a21d80e36ca83825719cb81e9f455a
-
Filesize
5KB
MD58fe86e486390ce80e118ade1624f83cf
SHA18a847805d130832ca3e4e9973de53d8173ed2fb1
SHA256cbab5a10f0b5a2cf4029936e087a09b63ad018092dd738d31e7d3ee2e2a988ce
SHA512d4f3bd5ac6974d10cf0c81848129ef22bdda55819a52d9601135e418c17bbffbefeea3c40770ba7442c635ad966f9346b52f666b8d3e917bd97e987ddd5ee61f
-
Filesize
6KB
MD55c8b298c0aad1d1465480cb7a9a5cd82
SHA1d2fdfc528624c3fa3e2620679f92a18b8fc47517
SHA256597f7ba31f9ac08f87a9c512a5a2d1459801f8c8781f065f0f268d28b4ccd08c
SHA5124d6cea6954588c29d8a796e017540b82f624038d53e8dfe4b7bd4ec0e89240d624509c7b250bb89e942f28e31a3001ff0409dc0e900e0708fe01b1712ab3fa8a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD53a915e853316adc4da99f53abf64209c
SHA17dacb134f0e5954ed694f475fed0a71e5a9fab71
SHA2566130dfb246f4db3b39c46d9b77d31da0a33ca32fa3f9c624ccdab6692c0bcf4e
SHA512da6edaf22084f3c5e1586100635e6099a4fe4f3e8233d742a9c4ae2c3c316f76ab39eb44944da06847408c4531f8a989371d8c30f076e3d512404bec5ca22dbe