Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 08:25
Static task
static1
Behavioral task
behavioral1
Sample
911c16efde8ce08295d1026490ace93f_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
911c16efde8ce08295d1026490ace93f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
911c16efde8ce08295d1026490ace93f_JaffaCakes118.html
-
Size
11KB
-
MD5
911c16efde8ce08295d1026490ace93f
-
SHA1
7cf1d1ee9b2dc94d1d40bfa97580bfae1593b62e
-
SHA256
7a1b11157e3c6994f838558655d792880a5d4bdea6c1d24176032a1c7e42ff96
-
SHA512
52f7943c5c95cafc55594c6cd98e5608a36d8a33d52d94b90f01431bb425c79b7c2c64b6f404161225cd5ce0c0f34fbba9a07b156502a13ac93aadf2fd578421
-
SSDEEP
192:pmmyPrFkIdfqiAoe+f6jIBRkJnXOMd41lJywy5v4rxqS:QDsiAoe+f6jIBz7y/wUS
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3500 msedge.exe 3500 msedge.exe 3136 msedge.exe 3136 msedge.exe 1048 identity_helper.exe 1048 identity_helper.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3136 wrote to memory of 5000 3136 msedge.exe 82 PID 3136 wrote to memory of 5000 3136 msedge.exe 82 PID 3136 wrote to memory of 4584 3136 msedge.exe 83 PID 3136 wrote to memory of 4584 3136 msedge.exe 83 PID 3136 wrote to memory of 4584 3136 msedge.exe 83 PID 3136 wrote to memory of 4584 3136 msedge.exe 83 PID 3136 wrote to memory of 4584 3136 msedge.exe 83 PID 3136 wrote to memory of 4584 3136 msedge.exe 83 PID 3136 wrote to memory of 4584 3136 msedge.exe 83 PID 3136 wrote to memory of 4584 3136 msedge.exe 83 PID 3136 wrote to memory of 4584 3136 msedge.exe 83 PID 3136 wrote to memory of 4584 3136 msedge.exe 83 PID 3136 wrote to memory of 4584 3136 msedge.exe 83 PID 3136 wrote to memory of 4584 3136 msedge.exe 83 PID 3136 wrote to memory of 4584 3136 msedge.exe 83 PID 3136 wrote to memory of 4584 3136 msedge.exe 83 PID 3136 wrote to memory of 4584 3136 msedge.exe 83 PID 3136 wrote to memory of 4584 3136 msedge.exe 83 PID 3136 wrote to memory of 4584 3136 msedge.exe 83 PID 3136 wrote to memory of 4584 3136 msedge.exe 83 PID 3136 wrote to memory of 4584 3136 msedge.exe 83 PID 3136 wrote to memory of 4584 3136 msedge.exe 83 PID 3136 wrote to memory of 4584 3136 msedge.exe 83 PID 3136 wrote to memory of 4584 3136 msedge.exe 83 PID 3136 wrote to memory of 4584 3136 msedge.exe 83 PID 3136 wrote to memory of 4584 3136 msedge.exe 83 PID 3136 wrote to memory of 4584 3136 msedge.exe 83 PID 3136 wrote to memory of 4584 3136 msedge.exe 83 PID 3136 wrote to memory of 4584 3136 msedge.exe 83 PID 3136 wrote to memory of 4584 3136 msedge.exe 83 PID 3136 wrote to memory of 4584 3136 msedge.exe 83 PID 3136 wrote to memory of 4584 3136 msedge.exe 83 PID 3136 wrote to memory of 4584 3136 msedge.exe 83 PID 3136 wrote to memory of 4584 3136 msedge.exe 83 PID 3136 wrote to memory of 4584 3136 msedge.exe 83 PID 3136 wrote to memory of 4584 3136 msedge.exe 83 PID 3136 wrote to memory of 4584 3136 msedge.exe 83 PID 3136 wrote to memory of 4584 3136 msedge.exe 83 PID 3136 wrote to memory of 4584 3136 msedge.exe 83 PID 3136 wrote to memory of 4584 3136 msedge.exe 83 PID 3136 wrote to memory of 4584 3136 msedge.exe 83 PID 3136 wrote to memory of 4584 3136 msedge.exe 83 PID 3136 wrote to memory of 3500 3136 msedge.exe 84 PID 3136 wrote to memory of 3500 3136 msedge.exe 84 PID 3136 wrote to memory of 1832 3136 msedge.exe 85 PID 3136 wrote to memory of 1832 3136 msedge.exe 85 PID 3136 wrote to memory of 1832 3136 msedge.exe 85 PID 3136 wrote to memory of 1832 3136 msedge.exe 85 PID 3136 wrote to memory of 1832 3136 msedge.exe 85 PID 3136 wrote to memory of 1832 3136 msedge.exe 85 PID 3136 wrote to memory of 1832 3136 msedge.exe 85 PID 3136 wrote to memory of 1832 3136 msedge.exe 85 PID 3136 wrote to memory of 1832 3136 msedge.exe 85 PID 3136 wrote to memory of 1832 3136 msedge.exe 85 PID 3136 wrote to memory of 1832 3136 msedge.exe 85 PID 3136 wrote to memory of 1832 3136 msedge.exe 85 PID 3136 wrote to memory of 1832 3136 msedge.exe 85 PID 3136 wrote to memory of 1832 3136 msedge.exe 85 PID 3136 wrote to memory of 1832 3136 msedge.exe 85 PID 3136 wrote to memory of 1832 3136 msedge.exe 85 PID 3136 wrote to memory of 1832 3136 msedge.exe 85 PID 3136 wrote to memory of 1832 3136 msedge.exe 85 PID 3136 wrote to memory of 1832 3136 msedge.exe 85 PID 3136 wrote to memory of 1832 3136 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\911c16efde8ce08295d1026490ace93f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc030346f8,0x7ffc03034708,0x7ffc030347182⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,2270676736270096724,14459668041697700685,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,2270676736270096724,14459668041697700685,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,2270676736270096724,14459668041697700685,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:1832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,2270676736270096724,14459668041697700685,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,2270676736270096724,14459668041697700685,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,2270676736270096724,14459668041697700685,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 /prefetch:82⤵PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,2270676736270096724,14459668041697700685,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,2270676736270096724,14459668041697700685,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,2270676736270096724,14459668041697700685,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,2270676736270096724,14459668041697700685,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:1004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,2270676736270096724,14459668041697700685,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:12⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,2270676736270096724,14459668041697700685,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2272 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1732
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1140
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4188
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
505B
MD545f03ac7a1d26061190a3495b3037037
SHA1e3c1265c48054ca1986bc13c0527d295645afc09
SHA256a754cc7221e5bdcd683e6212f289e04c98df6597a85f708f673e8dd7ad78426e
SHA512f0993d10c9a87c4633271e95f974a941f460e2d2f92ccf2e6fc2ae58e946ec31380fcce49bbc22ed1a47784da9b8ff3361a178a0255f89ec32477ce62a600849
-
Filesize
5KB
MD53ab562f2faf529cb134814da711dd5fe
SHA13285df9af52d524b14d4d5fe6535854dc814b52a
SHA256c0ef54553f00749a905f7433fcab1b01315ab9894a3929747516f42ec288b6cf
SHA512ca0eece96d9dd5bab6b003b07d517a80ce35daafd7f728574dcac6e427d9c73d4a0b0e02a8191c2231f49d2c4cf1cf35ab555acc64b6b6eb8c428c26c9881f39
-
Filesize
6KB
MD5271ae5f0b7847359f88a4174cb50f244
SHA18b527b8d6cd7da148255a0c9470b7809af9742ac
SHA25663e2d4fe941880af974823393f4e94a52fc109a330c72a1de5e8a316783751d7
SHA512ad2cef5fb9fc3a844df926cc21dc2f8a9e7be83537a4a354371344dc4a6c1ccf22311b4b04ebb172c9d51b723b4b4fb53f3af0f0768c9c53c5c847150829ca02
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD545ac372db215da4704eb7a1f983fefab
SHA18f3ffb8eb69af9f63293aa00228666eb4da315bc
SHA25655b693afdcff28a33ed230dbd8f6df561b5d94cb5a29d3549a5513205e0bf120
SHA512f354ab6615983f8188d16d9670531c64974bba7ff96e623cb23dfbf6303ffc5b0edff832ff833cab6304146d35b98e6e56eb2ba62ae16b65af3b430aab583289