Analysis
-
max time kernel
148s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 07:33
Static task
static1
Behavioral task
behavioral1
Sample
90f7b042c5e85eb34e62eac2ee169629_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
90f7b042c5e85eb34e62eac2ee169629_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
90f7b042c5e85eb34e62eac2ee169629_JaffaCakes118.html
-
Size
52KB
-
MD5
90f7b042c5e85eb34e62eac2ee169629
-
SHA1
f7deac4ba9f87b4d32a14acacbf5d8474035ca6d
-
SHA256
d67828f6cca31bc36e5646de4c6e9d137d0030d8d6979c44feb9c2a20e0ea85f
-
SHA512
01a18c37a86c5cbe2e4f413b91c75150f1c9e2aedf110df08d12e9aaf96da8db7dbdcd91c435c2e25f5fbd42c08698f4bac872a04de2e01f0f7801cd808846ba
-
SSDEEP
1536:6oWCnYKqUaIrbQizWQshjiLypliFao4GrDZaMkvww26rGrJ:zYKXxzm2FpD02EI
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4168 msedge.exe 4168 msedge.exe 1344 msedge.exe 1344 msedge.exe 2476 identity_helper.exe 2476 identity_helper.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1344 wrote to memory of 4900 1344 msedge.exe 82 PID 1344 wrote to memory of 4900 1344 msedge.exe 82 PID 1344 wrote to memory of 4180 1344 msedge.exe 83 PID 1344 wrote to memory of 4180 1344 msedge.exe 83 PID 1344 wrote to memory of 4180 1344 msedge.exe 83 PID 1344 wrote to memory of 4180 1344 msedge.exe 83 PID 1344 wrote to memory of 4180 1344 msedge.exe 83 PID 1344 wrote to memory of 4180 1344 msedge.exe 83 PID 1344 wrote to memory of 4180 1344 msedge.exe 83 PID 1344 wrote to memory of 4180 1344 msedge.exe 83 PID 1344 wrote to memory of 4180 1344 msedge.exe 83 PID 1344 wrote to memory of 4180 1344 msedge.exe 83 PID 1344 wrote to memory of 4180 1344 msedge.exe 83 PID 1344 wrote to memory of 4180 1344 msedge.exe 83 PID 1344 wrote to memory of 4180 1344 msedge.exe 83 PID 1344 wrote to memory of 4180 1344 msedge.exe 83 PID 1344 wrote to memory of 4180 1344 msedge.exe 83 PID 1344 wrote to memory of 4180 1344 msedge.exe 83 PID 1344 wrote to memory of 4180 1344 msedge.exe 83 PID 1344 wrote to memory of 4180 1344 msedge.exe 83 PID 1344 wrote to memory of 4180 1344 msedge.exe 83 PID 1344 wrote to memory of 4180 1344 msedge.exe 83 PID 1344 wrote to memory of 4180 1344 msedge.exe 83 PID 1344 wrote to memory of 4180 1344 msedge.exe 83 PID 1344 wrote to memory of 4180 1344 msedge.exe 83 PID 1344 wrote to memory of 4180 1344 msedge.exe 83 PID 1344 wrote to memory of 4180 1344 msedge.exe 83 PID 1344 wrote to memory of 4180 1344 msedge.exe 83 PID 1344 wrote to memory of 4180 1344 msedge.exe 83 PID 1344 wrote to memory of 4180 1344 msedge.exe 83 PID 1344 wrote to memory of 4180 1344 msedge.exe 83 PID 1344 wrote to memory of 4180 1344 msedge.exe 83 PID 1344 wrote to memory of 4180 1344 msedge.exe 83 PID 1344 wrote to memory of 4180 1344 msedge.exe 83 PID 1344 wrote to memory of 4180 1344 msedge.exe 83 PID 1344 wrote to memory of 4180 1344 msedge.exe 83 PID 1344 wrote to memory of 4180 1344 msedge.exe 83 PID 1344 wrote to memory of 4180 1344 msedge.exe 83 PID 1344 wrote to memory of 4180 1344 msedge.exe 83 PID 1344 wrote to memory of 4180 1344 msedge.exe 83 PID 1344 wrote to memory of 4180 1344 msedge.exe 83 PID 1344 wrote to memory of 4180 1344 msedge.exe 83 PID 1344 wrote to memory of 4168 1344 msedge.exe 84 PID 1344 wrote to memory of 4168 1344 msedge.exe 84 PID 1344 wrote to memory of 1620 1344 msedge.exe 85 PID 1344 wrote to memory of 1620 1344 msedge.exe 85 PID 1344 wrote to memory of 1620 1344 msedge.exe 85 PID 1344 wrote to memory of 1620 1344 msedge.exe 85 PID 1344 wrote to memory of 1620 1344 msedge.exe 85 PID 1344 wrote to memory of 1620 1344 msedge.exe 85 PID 1344 wrote to memory of 1620 1344 msedge.exe 85 PID 1344 wrote to memory of 1620 1344 msedge.exe 85 PID 1344 wrote to memory of 1620 1344 msedge.exe 85 PID 1344 wrote to memory of 1620 1344 msedge.exe 85 PID 1344 wrote to memory of 1620 1344 msedge.exe 85 PID 1344 wrote to memory of 1620 1344 msedge.exe 85 PID 1344 wrote to memory of 1620 1344 msedge.exe 85 PID 1344 wrote to memory of 1620 1344 msedge.exe 85 PID 1344 wrote to memory of 1620 1344 msedge.exe 85 PID 1344 wrote to memory of 1620 1344 msedge.exe 85 PID 1344 wrote to memory of 1620 1344 msedge.exe 85 PID 1344 wrote to memory of 1620 1344 msedge.exe 85 PID 1344 wrote to memory of 1620 1344 msedge.exe 85 PID 1344 wrote to memory of 1620 1344 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\90f7b042c5e85eb34e62eac2ee169629_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8fd0746f8,0x7ff8fd074708,0x7ff8fd0747182⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,3436861175832109328,2960145783183035210,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,3436861175832109328,2960145783183035210,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,3436861175832109328,2960145783183035210,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:1620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,3436861175832109328,2960145783183035210,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:2128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,3436861175832109328,2960145783183035210,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,3436861175832109328,2960145783183035210,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5708 /prefetch:82⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,3436861175832109328,2960145783183035210,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5708 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,3436861175832109328,2960145783183035210,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:12⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,3436861175832109328,2960145783183035210,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,3436861175832109328,2960145783183035210,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4648 /prefetch:12⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,3436861175832109328,2960145783183035210,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,3436861175832109328,2960145783183035210,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5508 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2628
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2184
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
588B
MD53accb0b3daa4f4048ebda870ecdd1e02
SHA1765759fee3231a219152ff1dd0fe2934707937f3
SHA256736162d02f2932e0367372dd3af8e22c0de593d854e300546f600e12b82eb930
SHA5129dba9351b53ba47ec3f0c07d9a72bb8dee1acbe1f540cf46f0eabc8b426fc31174c222a504cd39e9f249fc539fcb5c17b94e5023613ed7d53e7d58ff69a51161
-
Filesize
5KB
MD5cbb1ab34fef2f17a1474c612816e54d1
SHA14b83342be48ff522a651e03fe0f72f4be2f74e7a
SHA2566c2cf81bb8d4491f7e5ee808eb6518666a09903af19b74dfb53bab77d7c1359f
SHA5125dc2eab7673655f8a8074230c6a3dcf39ae382996f426ba966f9aff191ce5bc279338e08fb4a76067b27fcc933e1af34f25bb0d9cf8075469e0fdf6b72160cfb
-
Filesize
6KB
MD56e62272f76a0dfc8a598e526915642f9
SHA1d3506b087dc52936f76379bfc7ccb01cc5321e9a
SHA256859d881a66d680ddd5a7961aa6f98ebe41139a2d18fe0455c08e035928ea43c4
SHA5127306d78eae5d2089bd4904a5d137398bc01c692576321d6a186d693d3300c821e4fc3937ef320c0fbd9c6de3e0e654cd57a576bbbf4226baf14a98eb19a9142f
-
Filesize
6KB
MD5e70b38f3a8d3719479de08dded0cb360
SHA1e663e94e53b63ee0da3eb2f715e5ccf32657edd2
SHA2564db7243a9650f1dfea959fd016afea212049dfbfc5445295c9996f7d31f31da8
SHA5124f3016debc0ecf90f0cab26a389f1995bb5ddd192752ee917afab81b78516bffee8dc16b550240de5344b16753aa72f77ccd91e12d70e7b8a5a47475082f46b1
-
Filesize
702B
MD5cec1c70293d8dcd31c0ba3cca4f5d5e8
SHA1c24e1c8e5e169e605de4c4fdf263e9f081bb1330
SHA256cd6e30dc9c111cd6252fcf1ae76aaf5ec250e5e3dd0e4e3e86b204fd38f2cb04
SHA5129007635c4c750ea62baeb0c2560d8ed455636569733908c6611b105dd7c46626c4f8db1d43059aa0cbfd9531ca7911995e6c3f7401d52f8640b1110ac630d1a5
-
Filesize
702B
MD55d1a791940297716c09fa77630bb92e1
SHA162c5adccb2bc12803ced3c8f1fe262b01c6c10c4
SHA256fc58395b5a791a4adcdc8e0b630bddc724e5eaeb49a0cd587c873e72e56866b7
SHA512579af56a4fd645943f84a32c9f4937235245ef9a05f078d11d965718ca2e185c24bdf9dccbfcb0b4a5ec934d5a355a59f1b22ce37ebcb8cf55c6dd5b8b6a9612
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5a75444956bf8c7b8851310fc161f21f7
SHA16e4779f6a0b85e01ae09020aceefe7eac87474ed
SHA256c26e294a94c4efd61458bb59a50987eb0240f107c84f5c11ecee1843d91109f6
SHA5128e14c9e3d9c39d952cae79531e4e19be59be5fc7107f1c6c55d573d599a57e2137def7ef342235fe93b2d7c06271508fc56d78781fb2141b5343b07ca38a388f