Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 06:25
Static task
static1
Behavioral task
behavioral1
Sample
90d1b04b1fce031c27fa7d852bb30ab3_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
90d1b04b1fce031c27fa7d852bb30ab3_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
90d1b04b1fce031c27fa7d852bb30ab3_JaffaCakes118.html
-
Size
62KB
-
MD5
90d1b04b1fce031c27fa7d852bb30ab3
-
SHA1
b781ab58452d0dc2e6e30b6d649257ca8be3157b
-
SHA256
7512985c98458888c6f675ddd55bc5f86c03bbba7b8d7bc7eafda97a61c4b9fe
-
SHA512
5563ff68c81964055ba01b655f390aea417ec97c3d3d0e698d8ab54f49eeb0dab670d63db57293b0edfea2ca767390f39109adf22ac1209225d33d1b05eee4c2
-
SSDEEP
1536:OytK+CSpBNP7L16gejzPQ1x16Le91pp9yw:FK+CSpBN3eXQ4Qppcw
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2344 msedge.exe 2344 msedge.exe 3484 msedge.exe 3484 msedge.exe 1700 identity_helper.exe 1700 identity_helper.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3484 wrote to memory of 2792 3484 msedge.exe 82 PID 3484 wrote to memory of 2792 3484 msedge.exe 82 PID 3484 wrote to memory of 3040 3484 msedge.exe 83 PID 3484 wrote to memory of 3040 3484 msedge.exe 83 PID 3484 wrote to memory of 3040 3484 msedge.exe 83 PID 3484 wrote to memory of 3040 3484 msedge.exe 83 PID 3484 wrote to memory of 3040 3484 msedge.exe 83 PID 3484 wrote to memory of 3040 3484 msedge.exe 83 PID 3484 wrote to memory of 3040 3484 msedge.exe 83 PID 3484 wrote to memory of 3040 3484 msedge.exe 83 PID 3484 wrote to memory of 3040 3484 msedge.exe 83 PID 3484 wrote to memory of 3040 3484 msedge.exe 83 PID 3484 wrote to memory of 3040 3484 msedge.exe 83 PID 3484 wrote to memory of 3040 3484 msedge.exe 83 PID 3484 wrote to memory of 3040 3484 msedge.exe 83 PID 3484 wrote to memory of 3040 3484 msedge.exe 83 PID 3484 wrote to memory of 3040 3484 msedge.exe 83 PID 3484 wrote to memory of 3040 3484 msedge.exe 83 PID 3484 wrote to memory of 3040 3484 msedge.exe 83 PID 3484 wrote to memory of 3040 3484 msedge.exe 83 PID 3484 wrote to memory of 3040 3484 msedge.exe 83 PID 3484 wrote to memory of 3040 3484 msedge.exe 83 PID 3484 wrote to memory of 3040 3484 msedge.exe 83 PID 3484 wrote to memory of 3040 3484 msedge.exe 83 PID 3484 wrote to memory of 3040 3484 msedge.exe 83 PID 3484 wrote to memory of 3040 3484 msedge.exe 83 PID 3484 wrote to memory of 3040 3484 msedge.exe 83 PID 3484 wrote to memory of 3040 3484 msedge.exe 83 PID 3484 wrote to memory of 3040 3484 msedge.exe 83 PID 3484 wrote to memory of 3040 3484 msedge.exe 83 PID 3484 wrote to memory of 3040 3484 msedge.exe 83 PID 3484 wrote to memory of 3040 3484 msedge.exe 83 PID 3484 wrote to memory of 3040 3484 msedge.exe 83 PID 3484 wrote to memory of 3040 3484 msedge.exe 83 PID 3484 wrote to memory of 3040 3484 msedge.exe 83 PID 3484 wrote to memory of 3040 3484 msedge.exe 83 PID 3484 wrote to memory of 3040 3484 msedge.exe 83 PID 3484 wrote to memory of 3040 3484 msedge.exe 83 PID 3484 wrote to memory of 3040 3484 msedge.exe 83 PID 3484 wrote to memory of 3040 3484 msedge.exe 83 PID 3484 wrote to memory of 3040 3484 msedge.exe 83 PID 3484 wrote to memory of 3040 3484 msedge.exe 83 PID 3484 wrote to memory of 2344 3484 msedge.exe 84 PID 3484 wrote to memory of 2344 3484 msedge.exe 84 PID 3484 wrote to memory of 1464 3484 msedge.exe 85 PID 3484 wrote to memory of 1464 3484 msedge.exe 85 PID 3484 wrote to memory of 1464 3484 msedge.exe 85 PID 3484 wrote to memory of 1464 3484 msedge.exe 85 PID 3484 wrote to memory of 1464 3484 msedge.exe 85 PID 3484 wrote to memory of 1464 3484 msedge.exe 85 PID 3484 wrote to memory of 1464 3484 msedge.exe 85 PID 3484 wrote to memory of 1464 3484 msedge.exe 85 PID 3484 wrote to memory of 1464 3484 msedge.exe 85 PID 3484 wrote to memory of 1464 3484 msedge.exe 85 PID 3484 wrote to memory of 1464 3484 msedge.exe 85 PID 3484 wrote to memory of 1464 3484 msedge.exe 85 PID 3484 wrote to memory of 1464 3484 msedge.exe 85 PID 3484 wrote to memory of 1464 3484 msedge.exe 85 PID 3484 wrote to memory of 1464 3484 msedge.exe 85 PID 3484 wrote to memory of 1464 3484 msedge.exe 85 PID 3484 wrote to memory of 1464 3484 msedge.exe 85 PID 3484 wrote to memory of 1464 3484 msedge.exe 85 PID 3484 wrote to memory of 1464 3484 msedge.exe 85 PID 3484 wrote to memory of 1464 3484 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\90d1b04b1fce031c27fa7d852bb30ab3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe86fc46f8,0x7ffe86fc4708,0x7ffe86fc47182⤵PID:2792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,15990725084753746133,1889017386877814585,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,15990725084753746133,1889017386877814585,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,15990725084753746133,1889017386877814585,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2932 /prefetch:82⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15990725084753746133,1889017386877814585,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15990725084753746133,1889017386877814585,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,15990725084753746133,1889017386877814585,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4872 /prefetch:82⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,15990725084753746133,1889017386877814585,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4872 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15990725084753746133,1889017386877814585,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15990725084753746133,1889017386877814585,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15990725084753746133,1889017386877814585,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5968 /prefetch:12⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15990725084753746133,1889017386877814585,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6084 /prefetch:12⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,15990725084753746133,1889017386877814585,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1952 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:220
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1108
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
643B
MD542fad781f9cd9581a9720cdb832a69f2
SHA1410ec3f6746250b7e203e1ee6bcb31bb14914e59
SHA256bd4fce3bee818f788ed5a5f6c66386a9df0310d8c47d0e037351287f3c6e7ab2
SHA512cac51ca36e1824f52383a66f5400250ae77cbe827f7b3d6ac93a3476afb430817d474e336d0474f25070bfe29daf11bc61dba407c9307fbbed72cfc6e3b2c42f
-
Filesize
5KB
MD5fa118361a676735fb6c1e38d67cc8cd5
SHA15cc06e992d866b91d284242b012535264d723204
SHA2563deea6fb878403ed1dcb5cc76b63c0581755eb05d4bdef23e74aac5354f10d04
SHA512967d7820b85e9e88b8ee907ffdaf888843df118a3ba72464d8b1cc47d0b1d61f1f6342e909784217159299b4b284dd6edfbb759239aa4d244b8bd18c323cdf50
-
Filesize
6KB
MD5ae3707563d7c75486eab63283ecc241c
SHA1c793e64663625b547bdf9d2c6a166557b4182370
SHA256fb8bd5a517aaf85012306456046016d1fbc8576f26b65c81b0932e320821a993
SHA5123af63a3bce68d720d575f4ffe21912364e61610c64ddd638b76fae0471caf32c8043bfad4e500c64e7ccd564005f5e0fec1e50a22e45daaaad6ac8ff53950ddf
-
Filesize
6KB
MD5b210e7c0fbe8077a389932e6b9778dbe
SHA18eb0879dd0ccea195c64b69890e13c8b2c7cc0ca
SHA2567ca0f0bfe91e22275b534baa9f36425b50ef1ce6078a8c0ed56811367400b166
SHA512bd7d1448f0ac2d0b908cd22033d382185797c62cf4e40d625950ea1b798786fa244a24b2c3bd8a0635608b2f1116a97bfac16ec090c208e095145eb11a6ca884
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5cb22ded04e5dfcd67b427894236f714b
SHA1d548cbfef16ea535c53abaae0a61ecb01561658e
SHA256cbc09e2ab33cdfa86eb1bd3ec53f74e64831643290ab913d17b0cba946743aa9
SHA512ff255600838675350e7a02faa9ad31d88022b6bbbb7d9b2be84c161aa062359ce9c195b03e976befd2daada83ba4093de0e8ea5888db2ef63e9cf5341dd7117e