Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 05:25
Static task
static1
Behavioral task
behavioral1
Sample
897a7ba567636fc460e73ee33a2859ac_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
897a7ba567636fc460e73ee33a2859ac_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
897a7ba567636fc460e73ee33a2859ac_JaffaCakes118.html
-
Size
120KB
-
MD5
897a7ba567636fc460e73ee33a2859ac
-
SHA1
940744fd21d1e23689322d1615bc5e1355d79f58
-
SHA256
a5d0a3443f9fedf78e06e11b0724f05c1cbbe208ad16fd95d16170b8e83b1fc4
-
SHA512
31404ff946a27a6982d6cf34cf45af40b896b93955176e9a2f20e7f827dde772212e768937628826abd500e503b0b059543b76aa1b0f296408ff47bc81e8cb26
-
SSDEEP
1536:SO3LyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCY:S4LyfkMY+BES09JXAnyrZalI+Yu
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1484 msedge.exe 1484 msedge.exe 3196 msedge.exe 3196 msedge.exe 3504 identity_helper.exe 3504 identity_helper.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3196 wrote to memory of 3436 3196 msedge.exe 83 PID 3196 wrote to memory of 3436 3196 msedge.exe 83 PID 3196 wrote to memory of 3284 3196 msedge.exe 84 PID 3196 wrote to memory of 3284 3196 msedge.exe 84 PID 3196 wrote to memory of 3284 3196 msedge.exe 84 PID 3196 wrote to memory of 3284 3196 msedge.exe 84 PID 3196 wrote to memory of 3284 3196 msedge.exe 84 PID 3196 wrote to memory of 3284 3196 msedge.exe 84 PID 3196 wrote to memory of 3284 3196 msedge.exe 84 PID 3196 wrote to memory of 3284 3196 msedge.exe 84 PID 3196 wrote to memory of 3284 3196 msedge.exe 84 PID 3196 wrote to memory of 3284 3196 msedge.exe 84 PID 3196 wrote to memory of 3284 3196 msedge.exe 84 PID 3196 wrote to memory of 3284 3196 msedge.exe 84 PID 3196 wrote to memory of 3284 3196 msedge.exe 84 PID 3196 wrote to memory of 3284 3196 msedge.exe 84 PID 3196 wrote to memory of 3284 3196 msedge.exe 84 PID 3196 wrote to memory of 3284 3196 msedge.exe 84 PID 3196 wrote to memory of 3284 3196 msedge.exe 84 PID 3196 wrote to memory of 3284 3196 msedge.exe 84 PID 3196 wrote to memory of 3284 3196 msedge.exe 84 PID 3196 wrote to memory of 3284 3196 msedge.exe 84 PID 3196 wrote to memory of 3284 3196 msedge.exe 84 PID 3196 wrote to memory of 3284 3196 msedge.exe 84 PID 3196 wrote to memory of 3284 3196 msedge.exe 84 PID 3196 wrote to memory of 3284 3196 msedge.exe 84 PID 3196 wrote to memory of 3284 3196 msedge.exe 84 PID 3196 wrote to memory of 3284 3196 msedge.exe 84 PID 3196 wrote to memory of 3284 3196 msedge.exe 84 PID 3196 wrote to memory of 3284 3196 msedge.exe 84 PID 3196 wrote to memory of 3284 3196 msedge.exe 84 PID 3196 wrote to memory of 3284 3196 msedge.exe 84 PID 3196 wrote to memory of 3284 3196 msedge.exe 84 PID 3196 wrote to memory of 3284 3196 msedge.exe 84 PID 3196 wrote to memory of 3284 3196 msedge.exe 84 PID 3196 wrote to memory of 3284 3196 msedge.exe 84 PID 3196 wrote to memory of 3284 3196 msedge.exe 84 PID 3196 wrote to memory of 3284 3196 msedge.exe 84 PID 3196 wrote to memory of 3284 3196 msedge.exe 84 PID 3196 wrote to memory of 3284 3196 msedge.exe 84 PID 3196 wrote to memory of 3284 3196 msedge.exe 84 PID 3196 wrote to memory of 3284 3196 msedge.exe 84 PID 3196 wrote to memory of 1484 3196 msedge.exe 85 PID 3196 wrote to memory of 1484 3196 msedge.exe 85 PID 3196 wrote to memory of 1908 3196 msedge.exe 86 PID 3196 wrote to memory of 1908 3196 msedge.exe 86 PID 3196 wrote to memory of 1908 3196 msedge.exe 86 PID 3196 wrote to memory of 1908 3196 msedge.exe 86 PID 3196 wrote to memory of 1908 3196 msedge.exe 86 PID 3196 wrote to memory of 1908 3196 msedge.exe 86 PID 3196 wrote to memory of 1908 3196 msedge.exe 86 PID 3196 wrote to memory of 1908 3196 msedge.exe 86 PID 3196 wrote to memory of 1908 3196 msedge.exe 86 PID 3196 wrote to memory of 1908 3196 msedge.exe 86 PID 3196 wrote to memory of 1908 3196 msedge.exe 86 PID 3196 wrote to memory of 1908 3196 msedge.exe 86 PID 3196 wrote to memory of 1908 3196 msedge.exe 86 PID 3196 wrote to memory of 1908 3196 msedge.exe 86 PID 3196 wrote to memory of 1908 3196 msedge.exe 86 PID 3196 wrote to memory of 1908 3196 msedge.exe 86 PID 3196 wrote to memory of 1908 3196 msedge.exe 86 PID 3196 wrote to memory of 1908 3196 msedge.exe 86 PID 3196 wrote to memory of 1908 3196 msedge.exe 86 PID 3196 wrote to memory of 1908 3196 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\897a7ba567636fc460e73ee33a2859ac_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffffab46f8,0x7fffffab4708,0x7fffffab47182⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,11331054176987180666,6215362959746935592,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:3284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,11331054176987180666,6215362959746935592,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,11331054176987180666,6215362959746935592,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11331054176987180666,6215362959746935592,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11331054176987180666,6215362959746935592,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,11331054176987180666,6215362959746935592,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 /prefetch:82⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,11331054176987180666,6215362959746935592,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11331054176987180666,6215362959746935592,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11331054176987180666,6215362959746935592,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11331054176987180666,6215362959746935592,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:1348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11331054176987180666,6215362959746935592,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,11331054176987180666,6215362959746935592,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5732 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3060
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4040
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
6KB
MD5e239df8b7a0ed7ccaca88f33cfbb14ac
SHA16ad6ab3781e2e544b5365514f6bbfe81911b3bc7
SHA256e0f7eaba2369ffabf00363106ee9e3dff3a9ad8e7996c6c03a4f0ef76194ee12
SHA512027e60a0476b68d0209cfe6bd97cb008c5723709797d68258fd831f240ce9a0bdf6d84c91c2901a3b0aa46473fc3d4ba738906cc80b0aba74479be729fb6dc07
-
Filesize
5KB
MD53ed9c556ce0b34ec428b368baa60a88f
SHA145e49e5be85b0efba74a8271860eedaa890ee899
SHA256325c1e9558cc1af74739343b725a55a0fb12db813c70e9ae7ad387444472ed4a
SHA512f6be149f163ac9ef7ab3a926e93bcd5a8ef9be25060eafa68d2e79de3bc56954c09d024d857811e380efde893c4753aaa54a5d095401f2bf3f0779bf7277f544
-
Filesize
6KB
MD5f2d954f48978cde3e0a001b13a4db480
SHA134731d06859b288de7269f9124af32e232c7f5b1
SHA256be05c601fbb2285f96afd8f080c0e5c2ad2c1c0fc468a3025ebb5d4da499302a
SHA51227d9cefa68ff38b127ecd9fcb5d6f64342ae4d097f9993341ec43cd204f3a32ca461da0d6e2c15350d0bb94ac56b6f2f1aa5342c53c4a4f334e18055eb06cc13
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5f49791783bd8cb6c209692441bbe0438
SHA127703d312d1c65ae113f83633f4ca8529c7086a3
SHA256a2a2ac77c0d0db518488599cac7412da20042886769f48bb0b839a79dda57777
SHA512a2855b8fdc9dee4faf84a086f0f7445b5ecffa17f6749c0c2534ae106110910f04f8980f4be4ba218c249837404ed5b7f9facb68ef456c1c2656357347438a3c