Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 23:42
Static task
static1
Behavioral task
behavioral1
Sample
93021c01af389e85c465fd9131202245_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
93021c01af389e85c465fd9131202245_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
93021c01af389e85c465fd9131202245_JaffaCakes118.html
-
Size
4KB
-
MD5
93021c01af389e85c465fd9131202245
-
SHA1
9792726dcb09220f2758d378b571b7b33c040789
-
SHA256
ab71a211115cab341ce21fce556dbc2d9587a3af231007ae31a34f5f6b6508db
-
SHA512
8ba4e20e50ae65e6d86f9e046cfde2f7ef7d40a335c8510ba0b93fec1c7b9cd353a689a7228a18d406589039b41b94b7831f6ac1e744dba310d010d9fe0cf874
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8ouUKCd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pD6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1032 msedge.exe 1032 msedge.exe 1788 msedge.exe 1788 msedge.exe 5460 msedge.exe 5460 msedge.exe 5460 msedge.exe 5460 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1788 wrote to memory of 2804 1788 msedge.exe 82 PID 1788 wrote to memory of 2804 1788 msedge.exe 82 PID 1788 wrote to memory of 1560 1788 msedge.exe 83 PID 1788 wrote to memory of 1560 1788 msedge.exe 83 PID 1788 wrote to memory of 1560 1788 msedge.exe 83 PID 1788 wrote to memory of 1560 1788 msedge.exe 83 PID 1788 wrote to memory of 1560 1788 msedge.exe 83 PID 1788 wrote to memory of 1560 1788 msedge.exe 83 PID 1788 wrote to memory of 1560 1788 msedge.exe 83 PID 1788 wrote to memory of 1560 1788 msedge.exe 83 PID 1788 wrote to memory of 1560 1788 msedge.exe 83 PID 1788 wrote to memory of 1560 1788 msedge.exe 83 PID 1788 wrote to memory of 1560 1788 msedge.exe 83 PID 1788 wrote to memory of 1560 1788 msedge.exe 83 PID 1788 wrote to memory of 1560 1788 msedge.exe 83 PID 1788 wrote to memory of 1560 1788 msedge.exe 83 PID 1788 wrote to memory of 1560 1788 msedge.exe 83 PID 1788 wrote to memory of 1560 1788 msedge.exe 83 PID 1788 wrote to memory of 1560 1788 msedge.exe 83 PID 1788 wrote to memory of 1560 1788 msedge.exe 83 PID 1788 wrote to memory of 1560 1788 msedge.exe 83 PID 1788 wrote to memory of 1560 1788 msedge.exe 83 PID 1788 wrote to memory of 1560 1788 msedge.exe 83 PID 1788 wrote to memory of 1560 1788 msedge.exe 83 PID 1788 wrote to memory of 1560 1788 msedge.exe 83 PID 1788 wrote to memory of 1560 1788 msedge.exe 83 PID 1788 wrote to memory of 1560 1788 msedge.exe 83 PID 1788 wrote to memory of 1560 1788 msedge.exe 83 PID 1788 wrote to memory of 1560 1788 msedge.exe 83 PID 1788 wrote to memory of 1560 1788 msedge.exe 83 PID 1788 wrote to memory of 1560 1788 msedge.exe 83 PID 1788 wrote to memory of 1560 1788 msedge.exe 83 PID 1788 wrote to memory of 1560 1788 msedge.exe 83 PID 1788 wrote to memory of 1560 1788 msedge.exe 83 PID 1788 wrote to memory of 1560 1788 msedge.exe 83 PID 1788 wrote to memory of 1560 1788 msedge.exe 83 PID 1788 wrote to memory of 1560 1788 msedge.exe 83 PID 1788 wrote to memory of 1560 1788 msedge.exe 83 PID 1788 wrote to memory of 1560 1788 msedge.exe 83 PID 1788 wrote to memory of 1560 1788 msedge.exe 83 PID 1788 wrote to memory of 1560 1788 msedge.exe 83 PID 1788 wrote to memory of 1560 1788 msedge.exe 83 PID 1788 wrote to memory of 1032 1788 msedge.exe 84 PID 1788 wrote to memory of 1032 1788 msedge.exe 84 PID 1788 wrote to memory of 2996 1788 msedge.exe 85 PID 1788 wrote to memory of 2996 1788 msedge.exe 85 PID 1788 wrote to memory of 2996 1788 msedge.exe 85 PID 1788 wrote to memory of 2996 1788 msedge.exe 85 PID 1788 wrote to memory of 2996 1788 msedge.exe 85 PID 1788 wrote to memory of 2996 1788 msedge.exe 85 PID 1788 wrote to memory of 2996 1788 msedge.exe 85 PID 1788 wrote to memory of 2996 1788 msedge.exe 85 PID 1788 wrote to memory of 2996 1788 msedge.exe 85 PID 1788 wrote to memory of 2996 1788 msedge.exe 85 PID 1788 wrote to memory of 2996 1788 msedge.exe 85 PID 1788 wrote to memory of 2996 1788 msedge.exe 85 PID 1788 wrote to memory of 2996 1788 msedge.exe 85 PID 1788 wrote to memory of 2996 1788 msedge.exe 85 PID 1788 wrote to memory of 2996 1788 msedge.exe 85 PID 1788 wrote to memory of 2996 1788 msedge.exe 85 PID 1788 wrote to memory of 2996 1788 msedge.exe 85 PID 1788 wrote to memory of 2996 1788 msedge.exe 85 PID 1788 wrote to memory of 2996 1788 msedge.exe 85 PID 1788 wrote to memory of 2996 1788 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\93021c01af389e85c465fd9131202245_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff9cb046f8,0x7fff9cb04708,0x7fff9cb047182⤵PID:2804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,13338515104474339674,5705418016635210529,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,13338515104474339674,5705418016635210529,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,13338515104474339674,5705418016635210529,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,13338515104474339674,5705418016635210529,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,13338515104474339674,5705418016635210529,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,13338515104474339674,5705418016635210529,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 /prefetch:82⤵PID:2736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,13338515104474339674,5705418016635210529,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 /prefetch:82⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,13338515104474339674,5705418016635210529,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,13338515104474339674,5705418016635210529,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,13338515104474339674,5705418016635210529,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4080 /prefetch:12⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,13338515104474339674,5705418016635210529,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,13338515104474339674,5705418016635210529,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1256 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5460
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2364
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1972
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\01a3803f-5df1-4b4f-947a-aa0e39714278.tmp
Filesize6KB
MD594f09c9ffaca46ce9cf1a68255122f19
SHA1a7ce6330abb85311accc226667007eb824c625cd
SHA2560dbfaf83684c5d3ee77a03bc69d5f3584530ece3e7e6570c17addad9db8272e7
SHA512c6385048a0b8e00e261efe036faff5e97c013b5514edaa3f248b6b89179771d9a8af90ad3be2c6edcefaea7ef743de50c90a38d5d85dcff67aa03af05ff377b6
-
Filesize
292B
MD54f4d84c875708013f6790811fb6a09f5
SHA130760825ad7775303f68b00061d0593080a74996
SHA256579bc262415abb2f2e359a9bb6453c582867d3ae1c14fdd7079c134a7ea902fc
SHA512f5847562935931c42f04087532c38c008898926941808f6fca43137e4295de5db9351bd5495611f95cf7a84545d9d4f81d424b44ea0d110751e466322c865215
-
Filesize
5KB
MD5c250391e78397528345c26a55fab7cc5
SHA10c9766a38e5b8882f42c135625aae2a44e08f1b3
SHA2565da4de96baa25b58f0972f836ef59bc02a9b12ff8796454da1c2885ca3d855b9
SHA5120d62ef123135dbe73ff9b4de0ce777f202102e49dd7b789cbf99de140aa5aa035c968de902d435d46104af6cd637bb1fe0cafa6a3d8bdb43c6713f3905e729d8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD55b122d9318cadec3caee4abe543cfa92
SHA11413a0ecdb2513f129c141a962b93df9164dcdf4
SHA2567ce66727b74dd870be2bea451ebe88bf9944b794299533b6296b769ed4531fac
SHA512a9a9e1b9625d847d367b20f862b66ee48f48ce68b93e669c332f28a93182d388e82dc254605e78ea397e3aab58a1564fba5584b306f6f055a1135700c259c246