Analysis
-
max time kernel
145s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 05:16
Static task
static1
Behavioral task
behavioral1
Sample
90a74cd63e274039f3f010153061d9ff_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
90a74cd63e274039f3f010153061d9ff_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
90a74cd63e274039f3f010153061d9ff_JaffaCakes118.html
-
Size
23KB
-
MD5
90a74cd63e274039f3f010153061d9ff
-
SHA1
37d41b253cfc3164c4aa2c32376f793a8b454a9b
-
SHA256
c5d38292e7679a0481bf42f97847a6c81f718ec1ac8a798404bca818a80856cc
-
SHA512
b427ecd9cbff86b7c709492c88ac77235bbaf41529c72acae0ed0d9e81e297fcc99e954b5ce173e15b7996d8b1687f586b668c1906c266bcbb07b06c519e250c
-
SSDEEP
192:uwbab5nW7mnQjxn5Q/7nQieCNnBnQOkEntJNnQTbnxnQrRGLnLnQt0qMBiqnYnQz:zQ/jGx8x0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1760 msedge.exe 1760 msedge.exe 3024 msedge.exe 3024 msedge.exe 1824 identity_helper.exe 1824 identity_helper.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3024 wrote to memory of 3092 3024 msedge.exe 83 PID 3024 wrote to memory of 3092 3024 msedge.exe 83 PID 3024 wrote to memory of 4356 3024 msedge.exe 84 PID 3024 wrote to memory of 4356 3024 msedge.exe 84 PID 3024 wrote to memory of 4356 3024 msedge.exe 84 PID 3024 wrote to memory of 4356 3024 msedge.exe 84 PID 3024 wrote to memory of 4356 3024 msedge.exe 84 PID 3024 wrote to memory of 4356 3024 msedge.exe 84 PID 3024 wrote to memory of 4356 3024 msedge.exe 84 PID 3024 wrote to memory of 4356 3024 msedge.exe 84 PID 3024 wrote to memory of 4356 3024 msedge.exe 84 PID 3024 wrote to memory of 4356 3024 msedge.exe 84 PID 3024 wrote to memory of 4356 3024 msedge.exe 84 PID 3024 wrote to memory of 4356 3024 msedge.exe 84 PID 3024 wrote to memory of 4356 3024 msedge.exe 84 PID 3024 wrote to memory of 4356 3024 msedge.exe 84 PID 3024 wrote to memory of 4356 3024 msedge.exe 84 PID 3024 wrote to memory of 4356 3024 msedge.exe 84 PID 3024 wrote to memory of 4356 3024 msedge.exe 84 PID 3024 wrote to memory of 4356 3024 msedge.exe 84 PID 3024 wrote to memory of 4356 3024 msedge.exe 84 PID 3024 wrote to memory of 4356 3024 msedge.exe 84 PID 3024 wrote to memory of 4356 3024 msedge.exe 84 PID 3024 wrote to memory of 4356 3024 msedge.exe 84 PID 3024 wrote to memory of 4356 3024 msedge.exe 84 PID 3024 wrote to memory of 4356 3024 msedge.exe 84 PID 3024 wrote to memory of 4356 3024 msedge.exe 84 PID 3024 wrote to memory of 4356 3024 msedge.exe 84 PID 3024 wrote to memory of 4356 3024 msedge.exe 84 PID 3024 wrote to memory of 4356 3024 msedge.exe 84 PID 3024 wrote to memory of 4356 3024 msedge.exe 84 PID 3024 wrote to memory of 4356 3024 msedge.exe 84 PID 3024 wrote to memory of 4356 3024 msedge.exe 84 PID 3024 wrote to memory of 4356 3024 msedge.exe 84 PID 3024 wrote to memory of 4356 3024 msedge.exe 84 PID 3024 wrote to memory of 4356 3024 msedge.exe 84 PID 3024 wrote to memory of 4356 3024 msedge.exe 84 PID 3024 wrote to memory of 4356 3024 msedge.exe 84 PID 3024 wrote to memory of 4356 3024 msedge.exe 84 PID 3024 wrote to memory of 4356 3024 msedge.exe 84 PID 3024 wrote to memory of 4356 3024 msedge.exe 84 PID 3024 wrote to memory of 4356 3024 msedge.exe 84 PID 3024 wrote to memory of 1760 3024 msedge.exe 85 PID 3024 wrote to memory of 1760 3024 msedge.exe 85 PID 3024 wrote to memory of 2052 3024 msedge.exe 86 PID 3024 wrote to memory of 2052 3024 msedge.exe 86 PID 3024 wrote to memory of 2052 3024 msedge.exe 86 PID 3024 wrote to memory of 2052 3024 msedge.exe 86 PID 3024 wrote to memory of 2052 3024 msedge.exe 86 PID 3024 wrote to memory of 2052 3024 msedge.exe 86 PID 3024 wrote to memory of 2052 3024 msedge.exe 86 PID 3024 wrote to memory of 2052 3024 msedge.exe 86 PID 3024 wrote to memory of 2052 3024 msedge.exe 86 PID 3024 wrote to memory of 2052 3024 msedge.exe 86 PID 3024 wrote to memory of 2052 3024 msedge.exe 86 PID 3024 wrote to memory of 2052 3024 msedge.exe 86 PID 3024 wrote to memory of 2052 3024 msedge.exe 86 PID 3024 wrote to memory of 2052 3024 msedge.exe 86 PID 3024 wrote to memory of 2052 3024 msedge.exe 86 PID 3024 wrote to memory of 2052 3024 msedge.exe 86 PID 3024 wrote to memory of 2052 3024 msedge.exe 86 PID 3024 wrote to memory of 2052 3024 msedge.exe 86 PID 3024 wrote to memory of 2052 3024 msedge.exe 86 PID 3024 wrote to memory of 2052 3024 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\90a74cd63e274039f3f010153061d9ff_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffa75c46f8,0x7fffa75c4708,0x7fffa75c47182⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,16327435588810553838,1402366323404722704,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,16327435588810553838,1402366323404722704,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2548 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,16327435588810553838,1402366323404722704,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:82⤵PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,16327435588810553838,1402366323404722704,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:1656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,16327435588810553838,1402366323404722704,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,16327435588810553838,1402366323404722704,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4252 /prefetch:82⤵PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,16327435588810553838,1402366323404722704,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4252 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,16327435588810553838,1402366323404722704,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:1156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,16327435588810553838,1402366323404722704,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,16327435588810553838,1402366323404722704,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,16327435588810553838,1402366323404722704,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,16327435588810553838,1402366323404722704,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5108 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1220
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:756
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
6KB
MD56b7c226797e61412534220d34e4aca5e
SHA105723225f0a3093c6dd6397e40e28b479c6e25d7
SHA256fd67f951ebf6fb615d850fafeb3d2c840a2355fadb43aa9d001ec1194ce3c4bf
SHA51252253a1e3584ddbdc9a6b144d365d6b484d71223c539064840a75a9fcc2b970d98863d59fde35dad99ecc7fff9b0be4b44aeb63a405d5491caeff6da5994dd74
-
Filesize
5KB
MD5985701b464f69d32b8ec69e822e7f847
SHA148bc588e263435b50fc2abef35a6756524206d77
SHA256cdd6772fc8d844cb2bbae397f5b0d566c0490523c357d879e33223b69ad9b68a
SHA512c303d649cb0c6c2824bafc0a158789dd0ccb6bbd468ca030337362dfb587dc9bc49ab7c1799ba07917ea0e8702838a2f4be72f41a6dada0874077e874525fa68
-
Filesize
6KB
MD5791e29ecdfac78e9023ab06ef03814dc
SHA1d919ba37d3df6d5d939e2e0b5e0128146444355d
SHA25680589b91f85ed49bf086b7688bcfbf955ded27ce7819ea8a265eb50860b8b17a
SHA51268c2d8385ab964c221bb79849cd054a0a3cdb7863565bba8688b37cb3e85be00fd0668c37377ed5c8b74937f972bc6845a98e40a0c9d74c993e487f1478a2fb8
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD58b2e2adae6f901f1fed759c288596956
SHA10f96ace92bd35ef1fb41043e53ba175a92bad7ba
SHA256af35d0543010c5ba61a11c83ff4d5a9b00585ace856e7a5e30d6a0e338031ae7
SHA5126cc2e4cb63c8eaaf9467759d07106d4be6cff2eac2f5ced26017147fc9f3c9606947f5c719caf113596b19bc362a1e2e66737e9f8bc82a272cdfc344d3e8c0da