Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 21:44
Static task
static1
Behavioral task
behavioral1
Sample
92b2735ffedf119c02680020e7e64909_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
92b2735ffedf119c02680020e7e64909_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
92b2735ffedf119c02680020e7e64909_JaffaCakes118.html
-
Size
19KB
-
MD5
92b2735ffedf119c02680020e7e64909
-
SHA1
c529261a96739dd57506cbaf8d47bb1a980de3fa
-
SHA256
1a7fd25ee07d4e6355ce67914cc8631bea5b2bfdcc8c4e06af3b0e8669fa355f
-
SHA512
280b65b8eb6d0bfc1ba5e33b666e62071ad5a9d3a6247198ba819d869d00db26ef3ef28b44134e1bee3ad83cffc52156c504a243dd61e6b0dd0ed99a21676739
-
SSDEEP
192:9K/y7UhruiqEWx0LTgE9d39F5MpbjQpiIh3pMlUx9V6cxjb79DXSgiFLiC:4/yWrui5LXftUQpJZp55igiViC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4804 msedge.exe 4804 msedge.exe 2696 msedge.exe 2696 msedge.exe 4452 identity_helper.exe 4452 identity_helper.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2696 wrote to memory of 4240 2696 msedge.exe 82 PID 2696 wrote to memory of 4240 2696 msedge.exe 82 PID 2696 wrote to memory of 4384 2696 msedge.exe 85 PID 2696 wrote to memory of 4384 2696 msedge.exe 85 PID 2696 wrote to memory of 4384 2696 msedge.exe 85 PID 2696 wrote to memory of 4384 2696 msedge.exe 85 PID 2696 wrote to memory of 4384 2696 msedge.exe 85 PID 2696 wrote to memory of 4384 2696 msedge.exe 85 PID 2696 wrote to memory of 4384 2696 msedge.exe 85 PID 2696 wrote to memory of 4384 2696 msedge.exe 85 PID 2696 wrote to memory of 4384 2696 msedge.exe 85 PID 2696 wrote to memory of 4384 2696 msedge.exe 85 PID 2696 wrote to memory of 4384 2696 msedge.exe 85 PID 2696 wrote to memory of 4384 2696 msedge.exe 85 PID 2696 wrote to memory of 4384 2696 msedge.exe 85 PID 2696 wrote to memory of 4384 2696 msedge.exe 85 PID 2696 wrote to memory of 4384 2696 msedge.exe 85 PID 2696 wrote to memory of 4384 2696 msedge.exe 85 PID 2696 wrote to memory of 4384 2696 msedge.exe 85 PID 2696 wrote to memory of 4384 2696 msedge.exe 85 PID 2696 wrote to memory of 4384 2696 msedge.exe 85 PID 2696 wrote to memory of 4384 2696 msedge.exe 85 PID 2696 wrote to memory of 4384 2696 msedge.exe 85 PID 2696 wrote to memory of 4384 2696 msedge.exe 85 PID 2696 wrote to memory of 4384 2696 msedge.exe 85 PID 2696 wrote to memory of 4384 2696 msedge.exe 85 PID 2696 wrote to memory of 4384 2696 msedge.exe 85 PID 2696 wrote to memory of 4384 2696 msedge.exe 85 PID 2696 wrote to memory of 4384 2696 msedge.exe 85 PID 2696 wrote to memory of 4384 2696 msedge.exe 85 PID 2696 wrote to memory of 4384 2696 msedge.exe 85 PID 2696 wrote to memory of 4384 2696 msedge.exe 85 PID 2696 wrote to memory of 4384 2696 msedge.exe 85 PID 2696 wrote to memory of 4384 2696 msedge.exe 85 PID 2696 wrote to memory of 4384 2696 msedge.exe 85 PID 2696 wrote to memory of 4384 2696 msedge.exe 85 PID 2696 wrote to memory of 4384 2696 msedge.exe 85 PID 2696 wrote to memory of 4384 2696 msedge.exe 85 PID 2696 wrote to memory of 4384 2696 msedge.exe 85 PID 2696 wrote to memory of 4384 2696 msedge.exe 85 PID 2696 wrote to memory of 4384 2696 msedge.exe 85 PID 2696 wrote to memory of 4384 2696 msedge.exe 85 PID 2696 wrote to memory of 4804 2696 msedge.exe 86 PID 2696 wrote to memory of 4804 2696 msedge.exe 86 PID 2696 wrote to memory of 1300 2696 msedge.exe 87 PID 2696 wrote to memory of 1300 2696 msedge.exe 87 PID 2696 wrote to memory of 1300 2696 msedge.exe 87 PID 2696 wrote to memory of 1300 2696 msedge.exe 87 PID 2696 wrote to memory of 1300 2696 msedge.exe 87 PID 2696 wrote to memory of 1300 2696 msedge.exe 87 PID 2696 wrote to memory of 1300 2696 msedge.exe 87 PID 2696 wrote to memory of 1300 2696 msedge.exe 87 PID 2696 wrote to memory of 1300 2696 msedge.exe 87 PID 2696 wrote to memory of 1300 2696 msedge.exe 87 PID 2696 wrote to memory of 1300 2696 msedge.exe 87 PID 2696 wrote to memory of 1300 2696 msedge.exe 87 PID 2696 wrote to memory of 1300 2696 msedge.exe 87 PID 2696 wrote to memory of 1300 2696 msedge.exe 87 PID 2696 wrote to memory of 1300 2696 msedge.exe 87 PID 2696 wrote to memory of 1300 2696 msedge.exe 87 PID 2696 wrote to memory of 1300 2696 msedge.exe 87 PID 2696 wrote to memory of 1300 2696 msedge.exe 87 PID 2696 wrote to memory of 1300 2696 msedge.exe 87 PID 2696 wrote to memory of 1300 2696 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\92b2735ffedf119c02680020e7e64909_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff371246f8,0x7fff37124708,0x7fff371247182⤵PID:4240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,929920054185790977,12345676586763553005,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,929920054185790977,12345676586763553005,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,929920054185790977,12345676586763553005,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:1300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,929920054185790977,12345676586763553005,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,929920054185790977,12345676586763553005,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,929920054185790977,12345676586763553005,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6104 /prefetch:12⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,929920054185790977,12345676586763553005,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5564 /prefetch:82⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,929920054185790977,12345676586763553005,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5564 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,929920054185790977,12345676586763553005,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5972 /prefetch:12⤵PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,929920054185790977,12345676586763553005,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5964 /prefetch:12⤵PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,929920054185790977,12345676586763553005,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,929920054185790977,12345676586763553005,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6060 /prefetch:12⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,929920054185790977,12345676586763553005,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3468
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2872
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
1KB
MD567250782f28cf86b8cf6dce72115d905
SHA18b8f84196c575aa57d8414c41fe763aa859a9b4a
SHA256bfe941b0786fdf4cc43a9629b33e29e38b99823a26f98e3e6790c086b9bc2c52
SHA512b2a76ac98985b94396b7b09e6fa5f7a5646a92041fcdb13f4bb7bf3081a3db101b9e9e03629d84389005518ab830eadaff7d184be4d413faaee6a88312aa96b8
-
Filesize
5KB
MD5d3f62b429504e5700f30f2a222272874
SHA1288a4fede761231c8dbd126e67675510263dd8c0
SHA25612c4e5d8104c7659f8a6daf2521835a5103685d6af7970f417b840d7b480fba6
SHA512c70c499ec38e03675dd18463839e5bfb13b4bdb73362b962617377a656ba8426ed427e63b5306c0f29445dffdf9a2f293bd77e936cca74d892dbf836431b642c
-
Filesize
6KB
MD57848a6bc916d2da5e1c9a55ff3071ab5
SHA16dfaa7aca19c0a5300e130cbaf121dc4d6fa1842
SHA256f1d4f18c67a9fd1baa85af00356402062c09f2c4a955b0d49afe5d8240023651
SHA512e1a7245ddbf7df73e880e3a3337c4fbc31170caa5c657d820537f6d85a7259d69e5f9f99a03c7ead9aa24ca461ec61042bc2afe5a6bff027bd6be43068117eae
-
Filesize
6KB
MD5bab3cd7eda200ea6d63fbbb701969041
SHA185033f5d978256f1fdee379235be6e4043b47693
SHA256c67866a08ee491e483f47d36b3cfd309ccb4d8765a47f5f1a9078e99e0261ae3
SHA512c83df8eb225b9fd17edcf73fb979f027ff2d3e2df2037b62f21b85b666fee5a970f57de674055ee05abf7703bddb496f02b16e62166e1ce0eabcd3e4dd5706b0
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD533611dce80633c96ca905db76687b654
SHA1f35c8e007c2094a51f925495a48388b1743ee9a8
SHA256d7485e8ea9190f507cccd39433af018dc19fed2ad0d487639a7cf064c82be8c4
SHA51289581831915f0cdb7d7dc88dff5173ef7cdd0ed778c5c44f33b10b193c2e9181dbef1c0cf6bd36a2753c0217eba872956f09d52eb320b255b994db03baca88e7