Analysis
-
max time kernel
141s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 05:56
Static task
static1
Behavioral task
behavioral1
Sample
90bf80a79fbd1891e66e86a231730e37_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
90bf80a79fbd1891e66e86a231730e37_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
90bf80a79fbd1891e66e86a231730e37_JaffaCakes118.html
-
Size
32KB
-
MD5
90bf80a79fbd1891e66e86a231730e37
-
SHA1
10b20a8962186d73ab9c2f792181e7767261b67d
-
SHA256
47453b0383df019fe2639a2e167880f8226cfa20a0e7e2c0285d3df479bbc6f9
-
SHA512
1d86bd54913ceac3da2b4bb986f0d6a3ae6a0aac271f90106c14c8f0509a014101ec9333b66a248fd9adc8591511e77483201eb8e679db87795f0d8c207bcf3c
-
SSDEEP
384:3Q/l/sxcJUrVgRssWI6Gqw1HSKVHbFjMu:gZJUrVgRssWI6Gqw1HSK9bFjx
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 808 msedge.exe 808 msedge.exe 3388 msedge.exe 3388 msedge.exe 4564 identity_helper.exe 4564 identity_helper.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3388 wrote to memory of 1488 3388 msedge.exe 82 PID 3388 wrote to memory of 1488 3388 msedge.exe 82 PID 3388 wrote to memory of 4836 3388 msedge.exe 83 PID 3388 wrote to memory of 4836 3388 msedge.exe 83 PID 3388 wrote to memory of 4836 3388 msedge.exe 83 PID 3388 wrote to memory of 4836 3388 msedge.exe 83 PID 3388 wrote to memory of 4836 3388 msedge.exe 83 PID 3388 wrote to memory of 4836 3388 msedge.exe 83 PID 3388 wrote to memory of 4836 3388 msedge.exe 83 PID 3388 wrote to memory of 4836 3388 msedge.exe 83 PID 3388 wrote to memory of 4836 3388 msedge.exe 83 PID 3388 wrote to memory of 4836 3388 msedge.exe 83 PID 3388 wrote to memory of 4836 3388 msedge.exe 83 PID 3388 wrote to memory of 4836 3388 msedge.exe 83 PID 3388 wrote to memory of 4836 3388 msedge.exe 83 PID 3388 wrote to memory of 4836 3388 msedge.exe 83 PID 3388 wrote to memory of 4836 3388 msedge.exe 83 PID 3388 wrote to memory of 4836 3388 msedge.exe 83 PID 3388 wrote to memory of 4836 3388 msedge.exe 83 PID 3388 wrote to memory of 4836 3388 msedge.exe 83 PID 3388 wrote to memory of 4836 3388 msedge.exe 83 PID 3388 wrote to memory of 4836 3388 msedge.exe 83 PID 3388 wrote to memory of 4836 3388 msedge.exe 83 PID 3388 wrote to memory of 4836 3388 msedge.exe 83 PID 3388 wrote to memory of 4836 3388 msedge.exe 83 PID 3388 wrote to memory of 4836 3388 msedge.exe 83 PID 3388 wrote to memory of 4836 3388 msedge.exe 83 PID 3388 wrote to memory of 4836 3388 msedge.exe 83 PID 3388 wrote to memory of 4836 3388 msedge.exe 83 PID 3388 wrote to memory of 4836 3388 msedge.exe 83 PID 3388 wrote to memory of 4836 3388 msedge.exe 83 PID 3388 wrote to memory of 4836 3388 msedge.exe 83 PID 3388 wrote to memory of 4836 3388 msedge.exe 83 PID 3388 wrote to memory of 4836 3388 msedge.exe 83 PID 3388 wrote to memory of 4836 3388 msedge.exe 83 PID 3388 wrote to memory of 4836 3388 msedge.exe 83 PID 3388 wrote to memory of 4836 3388 msedge.exe 83 PID 3388 wrote to memory of 4836 3388 msedge.exe 83 PID 3388 wrote to memory of 4836 3388 msedge.exe 83 PID 3388 wrote to memory of 4836 3388 msedge.exe 83 PID 3388 wrote to memory of 4836 3388 msedge.exe 83 PID 3388 wrote to memory of 4836 3388 msedge.exe 83 PID 3388 wrote to memory of 808 3388 msedge.exe 84 PID 3388 wrote to memory of 808 3388 msedge.exe 84 PID 3388 wrote to memory of 4948 3388 msedge.exe 85 PID 3388 wrote to memory of 4948 3388 msedge.exe 85 PID 3388 wrote to memory of 4948 3388 msedge.exe 85 PID 3388 wrote to memory of 4948 3388 msedge.exe 85 PID 3388 wrote to memory of 4948 3388 msedge.exe 85 PID 3388 wrote to memory of 4948 3388 msedge.exe 85 PID 3388 wrote to memory of 4948 3388 msedge.exe 85 PID 3388 wrote to memory of 4948 3388 msedge.exe 85 PID 3388 wrote to memory of 4948 3388 msedge.exe 85 PID 3388 wrote to memory of 4948 3388 msedge.exe 85 PID 3388 wrote to memory of 4948 3388 msedge.exe 85 PID 3388 wrote to memory of 4948 3388 msedge.exe 85 PID 3388 wrote to memory of 4948 3388 msedge.exe 85 PID 3388 wrote to memory of 4948 3388 msedge.exe 85 PID 3388 wrote to memory of 4948 3388 msedge.exe 85 PID 3388 wrote to memory of 4948 3388 msedge.exe 85 PID 3388 wrote to memory of 4948 3388 msedge.exe 85 PID 3388 wrote to memory of 4948 3388 msedge.exe 85 PID 3388 wrote to memory of 4948 3388 msedge.exe 85 PID 3388 wrote to memory of 4948 3388 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\90bf80a79fbd1891e66e86a231730e37_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc4d6946f8,0x7ffc4d694708,0x7ffc4d6947182⤵PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,5342252071778422115,16483297575028492369,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,5342252071778422115,16483297575028492369,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,5342252071778422115,16483297575028492369,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5342252071778422115,16483297575028492369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5342252071778422115,16483297575028492369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,5342252071778422115,16483297575028492369,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6120 /prefetch:82⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,5342252071778422115,16483297575028492369,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6120 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5342252071778422115,16483297575028492369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5342252071778422115,16483297575028492369,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4592 /prefetch:12⤵PID:516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5342252071778422115,16483297575028492369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4660 /prefetch:12⤵PID:2820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5342252071778422115,16483297575028492369,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,5342252071778422115,16483297575028492369,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5988 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1504
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2772
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
5KB
MD5a9dd4acf288ec178d6b78f4d091ffc01
SHA154affcd5cef70f9f07a5b06338a4a9bed37b5364
SHA2564db0c7cbd31ca7a140cc1fd098ed7885d981dcb82d27f3b91d5a93a8c0010da7
SHA5125046bb55a6439e93a413a40d28cdc5a333f980fe00ceab6b9566cdb49beea717d761cee9fe4d9337dcf3b23f1470c100d8942c0acb124b61ca0abcfdae51a31a
-
Filesize
6KB
MD59cc2c0fbd5d65ff03ae2e2bc91e98abc
SHA1ce8ed4859c1d50553d9e2dc9b8b009bd0c3cd1cf
SHA25629e814318b8c76d95fdce2e6d79951c6459c99bca23ab21797a756b4d8f2d377
SHA5121f124930c89386264c637f314a37163e1dd42c03a897f3b429502afa3fe2ac24191a05cd98057002da00cf985e5fe054b839c170eb30e8b02f577d7784ee0ebe
-
Filesize
6KB
MD591b306614dc5c7c4d6d119a760df3ece
SHA1f62d70f82e11342b94eac8afe59843f37030b179
SHA25681765f922b71f0acda06017f1679feebe3236a56c6a3b29a51dd66e5044dce17
SHA512d8c93153d4d8d28a47b851efcda1f40bcaae3e7be344c095a30613f863acbe110c4847283383dff0c545414a4a5053e281315d9690e8e8e81217cfd0aaf81bea
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD58125b6fd65e71f800c2348c7ab5c5056
SHA1e1341e1b7d65b243e087b47d74def1495a7cdf3c
SHA256fee083bb5410f6fb1a1c61e5c7587eeb2ac1321520afed5349c8ca795cc72578
SHA5125e13fbba13a4070dc34d4df47263c352c807740c47b3a1737b8f8f3c7bebcfc534a204dbaa0021e4d9395d94ed696dc12ae75f0b9cbe5841579cdf6d561eb4c7