Analysis
-
max time kernel
145s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 11:28
Static task
static1
Behavioral task
behavioral1
Sample
919d5c5f5466cdf5d80aa3335c8155ba_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
919d5c5f5466cdf5d80aa3335c8155ba_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
919d5c5f5466cdf5d80aa3335c8155ba_JaffaCakes118.html
-
Size
23KB
-
MD5
919d5c5f5466cdf5d80aa3335c8155ba
-
SHA1
deb50b45c2ca03a4725512b3dbd7f1e34dc62d25
-
SHA256
eab79f8a882ec09b5e6a4afea5be316c6afc659ab1d8be0528c72bdcfc5e6b8d
-
SHA512
e08aa18f7e7a593fccd1fad5f8437e2c79ef9817ac38ebab4f3e135ba5f3de5be6cfb30ea0cd34bd233341177c952faf00621a9b1f43b8f012b1ea70cc4e1846
-
SSDEEP
192:uWbQb5nK+nQjxn5Q/NnQiewNnlnQOkEntnjnQTbnRnQ+CnQtiwMBQqnYnQ7tnGY8:HQ/JyP
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2424 msedge.exe 2424 msedge.exe 2748 msedge.exe 2748 msedge.exe 2536 identity_helper.exe 2536 identity_helper.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2748 wrote to memory of 4296 2748 msedge.exe 82 PID 2748 wrote to memory of 4296 2748 msedge.exe 82 PID 2748 wrote to memory of 672 2748 msedge.exe 83 PID 2748 wrote to memory of 672 2748 msedge.exe 83 PID 2748 wrote to memory of 672 2748 msedge.exe 83 PID 2748 wrote to memory of 672 2748 msedge.exe 83 PID 2748 wrote to memory of 672 2748 msedge.exe 83 PID 2748 wrote to memory of 672 2748 msedge.exe 83 PID 2748 wrote to memory of 672 2748 msedge.exe 83 PID 2748 wrote to memory of 672 2748 msedge.exe 83 PID 2748 wrote to memory of 672 2748 msedge.exe 83 PID 2748 wrote to memory of 672 2748 msedge.exe 83 PID 2748 wrote to memory of 672 2748 msedge.exe 83 PID 2748 wrote to memory of 672 2748 msedge.exe 83 PID 2748 wrote to memory of 672 2748 msedge.exe 83 PID 2748 wrote to memory of 672 2748 msedge.exe 83 PID 2748 wrote to memory of 672 2748 msedge.exe 83 PID 2748 wrote to memory of 672 2748 msedge.exe 83 PID 2748 wrote to memory of 672 2748 msedge.exe 83 PID 2748 wrote to memory of 672 2748 msedge.exe 83 PID 2748 wrote to memory of 672 2748 msedge.exe 83 PID 2748 wrote to memory of 672 2748 msedge.exe 83 PID 2748 wrote to memory of 672 2748 msedge.exe 83 PID 2748 wrote to memory of 672 2748 msedge.exe 83 PID 2748 wrote to memory of 672 2748 msedge.exe 83 PID 2748 wrote to memory of 672 2748 msedge.exe 83 PID 2748 wrote to memory of 672 2748 msedge.exe 83 PID 2748 wrote to memory of 672 2748 msedge.exe 83 PID 2748 wrote to memory of 672 2748 msedge.exe 83 PID 2748 wrote to memory of 672 2748 msedge.exe 83 PID 2748 wrote to memory of 672 2748 msedge.exe 83 PID 2748 wrote to memory of 672 2748 msedge.exe 83 PID 2748 wrote to memory of 672 2748 msedge.exe 83 PID 2748 wrote to memory of 672 2748 msedge.exe 83 PID 2748 wrote to memory of 672 2748 msedge.exe 83 PID 2748 wrote to memory of 672 2748 msedge.exe 83 PID 2748 wrote to memory of 672 2748 msedge.exe 83 PID 2748 wrote to memory of 672 2748 msedge.exe 83 PID 2748 wrote to memory of 672 2748 msedge.exe 83 PID 2748 wrote to memory of 672 2748 msedge.exe 83 PID 2748 wrote to memory of 672 2748 msedge.exe 83 PID 2748 wrote to memory of 672 2748 msedge.exe 83 PID 2748 wrote to memory of 2424 2748 msedge.exe 84 PID 2748 wrote to memory of 2424 2748 msedge.exe 84 PID 2748 wrote to memory of 2316 2748 msedge.exe 85 PID 2748 wrote to memory of 2316 2748 msedge.exe 85 PID 2748 wrote to memory of 2316 2748 msedge.exe 85 PID 2748 wrote to memory of 2316 2748 msedge.exe 85 PID 2748 wrote to memory of 2316 2748 msedge.exe 85 PID 2748 wrote to memory of 2316 2748 msedge.exe 85 PID 2748 wrote to memory of 2316 2748 msedge.exe 85 PID 2748 wrote to memory of 2316 2748 msedge.exe 85 PID 2748 wrote to memory of 2316 2748 msedge.exe 85 PID 2748 wrote to memory of 2316 2748 msedge.exe 85 PID 2748 wrote to memory of 2316 2748 msedge.exe 85 PID 2748 wrote to memory of 2316 2748 msedge.exe 85 PID 2748 wrote to memory of 2316 2748 msedge.exe 85 PID 2748 wrote to memory of 2316 2748 msedge.exe 85 PID 2748 wrote to memory of 2316 2748 msedge.exe 85 PID 2748 wrote to memory of 2316 2748 msedge.exe 85 PID 2748 wrote to memory of 2316 2748 msedge.exe 85 PID 2748 wrote to memory of 2316 2748 msedge.exe 85 PID 2748 wrote to memory of 2316 2748 msedge.exe 85 PID 2748 wrote to memory of 2316 2748 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\919d5c5f5466cdf5d80aa3335c8155ba_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffff99546f8,0x7ffff9954708,0x7ffff99547182⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,11285444171818177272,14797526474997080837,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2260 /prefetch:22⤵PID:672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,11285444171818177272,14797526474997080837,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,11285444171818177272,14797526474997080837,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2608 /prefetch:82⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11285444171818177272,14797526474997080837,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:1788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11285444171818177272,14797526474997080837,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,11285444171818177272,14797526474997080837,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6112 /prefetch:82⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,11285444171818177272,14797526474997080837,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6112 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11285444171818177272,14797526474997080837,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11285444171818177272,14797526474997080837,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11285444171818177272,14797526474997080837,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6008 /prefetch:12⤵PID:1172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11285444171818177272,14797526474997080837,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5804 /prefetch:12⤵PID:1832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,11285444171818177272,14797526474997080837,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6036 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2936
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2780
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
5KB
MD5e559a47767957dc4b9c2bb37c6d6f96f
SHA1b368a1125ee31584f9b3bc36a13a4ec375e4aa53
SHA256f31185926a05d68a2925df1e8101d5a54354f0b5a9915ebf254132e91fabed67
SHA51277835ecc0826b3053b9f9f4daa3547c1c426a3524b6d2d42b9ba328280546968630ce7c63ffeefcc000e087eeb4eb70740a4d9edf1e8f8321c1c650c37366986
-
Filesize
6KB
MD5752773236137c795321c9c9c399f9726
SHA155e66c7f71decb0b9646f9fb36d90edabaf434bd
SHA2566656284f9314d2458b5d693383d23ebfef29cad9d46e5f9b65968a7b61584c81
SHA51247cfbdde2c0f54baaba067d8f4889694c96cf0adf6dd117b3a2e711707e38b4d334db55915ad281dc7a5de722f16d30bcc28640d1c6694882455a4001503d63c
-
Filesize
6KB
MD5addcda6afd3c0dd7cc1926061672f48f
SHA1fba1a3ae673385af658d20101742d5046e573aa8
SHA2561c2b78c40540c0f018fc2b3fbb8ff6b618f741576deed292dda21df972aee284
SHA5125572ef43212adef4bca423e609ffcdc18dec48685e5218f07de90813b3f3cca5fb558f655d4c3cefa28398e547d84382bfc3ba80141cdf20f6bf3dba39fb2b77
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5b4df263bc88ce5f7ccc01630269c0108
SHA18b83b745ffebad93c07ff23b5b2bfef6f7497b81
SHA25602db9807fda33d0167941b64c0c51b5edd3ca72f1c835145c6705123a32b4d39
SHA512d4e91ab7a4ccb2d9d58ae3099e908f0c5c0aa24ef986e96e49ddcc1f27cf5bfb1674e70f1716aa74ff945ca28c78ecd84bcea370322e01b33a500c55205b1146