Analysis
-
max time kernel
145s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03-06-2024 12:29
Static task
static1
Behavioral task
behavioral1
Sample
91c8fa4bb18f249b1740dd4a35b7ce54_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
91c8fa4bb18f249b1740dd4a35b7ce54_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
91c8fa4bb18f249b1740dd4a35b7ce54_JaffaCakes118.html
-
Size
4KB
-
MD5
91c8fa4bb18f249b1740dd4a35b7ce54
-
SHA1
f81e4a92b2796777dabb5e693f71b5bd1e5388c7
-
SHA256
4afdda8056e54765353c7511008a7f561fa509a240d95875c799997882cb4064
-
SHA512
88b908183c43b5b61fab8bf55c9ddc9a584415f5f3db9f24af434f13114afe9802b5961a31adc5cb074c5fcd38704aa6b89d3f711aa5e50cc646383743c2686d
-
SSDEEP
96:ziEtBZmV4MSEPBDvV0n47ej/hgOKiljSR1QnyneqhVaMzjVRmfU:zi6wV4GD8/h/KiZwQn/qOMzjVRm8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1056 msedge.exe 1056 msedge.exe 3052 msedge.exe 3052 msedge.exe 4660 identity_helper.exe 4660 identity_helper.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3052 wrote to memory of 5064 3052 msedge.exe 82 PID 3052 wrote to memory of 5064 3052 msedge.exe 82 PID 3052 wrote to memory of 2900 3052 msedge.exe 83 PID 3052 wrote to memory of 2900 3052 msedge.exe 83 PID 3052 wrote to memory of 2900 3052 msedge.exe 83 PID 3052 wrote to memory of 2900 3052 msedge.exe 83 PID 3052 wrote to memory of 2900 3052 msedge.exe 83 PID 3052 wrote to memory of 2900 3052 msedge.exe 83 PID 3052 wrote to memory of 2900 3052 msedge.exe 83 PID 3052 wrote to memory of 2900 3052 msedge.exe 83 PID 3052 wrote to memory of 2900 3052 msedge.exe 83 PID 3052 wrote to memory of 2900 3052 msedge.exe 83 PID 3052 wrote to memory of 2900 3052 msedge.exe 83 PID 3052 wrote to memory of 2900 3052 msedge.exe 83 PID 3052 wrote to memory of 2900 3052 msedge.exe 83 PID 3052 wrote to memory of 2900 3052 msedge.exe 83 PID 3052 wrote to memory of 2900 3052 msedge.exe 83 PID 3052 wrote to memory of 2900 3052 msedge.exe 83 PID 3052 wrote to memory of 2900 3052 msedge.exe 83 PID 3052 wrote to memory of 2900 3052 msedge.exe 83 PID 3052 wrote to memory of 2900 3052 msedge.exe 83 PID 3052 wrote to memory of 2900 3052 msedge.exe 83 PID 3052 wrote to memory of 2900 3052 msedge.exe 83 PID 3052 wrote to memory of 2900 3052 msedge.exe 83 PID 3052 wrote to memory of 2900 3052 msedge.exe 83 PID 3052 wrote to memory of 2900 3052 msedge.exe 83 PID 3052 wrote to memory of 2900 3052 msedge.exe 83 PID 3052 wrote to memory of 2900 3052 msedge.exe 83 PID 3052 wrote to memory of 2900 3052 msedge.exe 83 PID 3052 wrote to memory of 2900 3052 msedge.exe 83 PID 3052 wrote to memory of 2900 3052 msedge.exe 83 PID 3052 wrote to memory of 2900 3052 msedge.exe 83 PID 3052 wrote to memory of 2900 3052 msedge.exe 83 PID 3052 wrote to memory of 2900 3052 msedge.exe 83 PID 3052 wrote to memory of 2900 3052 msedge.exe 83 PID 3052 wrote to memory of 2900 3052 msedge.exe 83 PID 3052 wrote to memory of 2900 3052 msedge.exe 83 PID 3052 wrote to memory of 2900 3052 msedge.exe 83 PID 3052 wrote to memory of 2900 3052 msedge.exe 83 PID 3052 wrote to memory of 2900 3052 msedge.exe 83 PID 3052 wrote to memory of 2900 3052 msedge.exe 83 PID 3052 wrote to memory of 2900 3052 msedge.exe 83 PID 3052 wrote to memory of 1056 3052 msedge.exe 84 PID 3052 wrote to memory of 1056 3052 msedge.exe 84 PID 3052 wrote to memory of 3648 3052 msedge.exe 85 PID 3052 wrote to memory of 3648 3052 msedge.exe 85 PID 3052 wrote to memory of 3648 3052 msedge.exe 85 PID 3052 wrote to memory of 3648 3052 msedge.exe 85 PID 3052 wrote to memory of 3648 3052 msedge.exe 85 PID 3052 wrote to memory of 3648 3052 msedge.exe 85 PID 3052 wrote to memory of 3648 3052 msedge.exe 85 PID 3052 wrote to memory of 3648 3052 msedge.exe 85 PID 3052 wrote to memory of 3648 3052 msedge.exe 85 PID 3052 wrote to memory of 3648 3052 msedge.exe 85 PID 3052 wrote to memory of 3648 3052 msedge.exe 85 PID 3052 wrote to memory of 3648 3052 msedge.exe 85 PID 3052 wrote to memory of 3648 3052 msedge.exe 85 PID 3052 wrote to memory of 3648 3052 msedge.exe 85 PID 3052 wrote to memory of 3648 3052 msedge.exe 85 PID 3052 wrote to memory of 3648 3052 msedge.exe 85 PID 3052 wrote to memory of 3648 3052 msedge.exe 85 PID 3052 wrote to memory of 3648 3052 msedge.exe 85 PID 3052 wrote to memory of 3648 3052 msedge.exe 85 PID 3052 wrote to memory of 3648 3052 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\91c8fa4bb18f249b1740dd4a35b7ce54_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcdad846f8,0x7ffcdad84708,0x7ffcdad847182⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,14163657899199922033,9794675475689379461,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,14163657899199922033,9794675475689379461,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,14163657899199922033,9794675475689379461,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2472 /prefetch:82⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14163657899199922033,9794675475689379461,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14163657899199922033,9794675475689379461,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14163657899199922033,9794675475689379461,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4660 /prefetch:12⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14163657899199922033,9794675475689379461,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14163657899199922033,9794675475689379461,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3636 /prefetch:12⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,14163657899199922033,9794675475689379461,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4916 /prefetch:82⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,14163657899199922033,9794675475689379461,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4916 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14163657899199922033,9794675475689379461,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:12⤵PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14163657899199922033,9794675475689379461,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:12⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14163657899199922033,9794675475689379461,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14163657899199922033,9794675475689379461,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14163657899199922033,9794675475689379461,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3032 /prefetch:12⤵PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14163657899199922033,9794675475689379461,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:12⤵PID:972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,14163657899199922033,9794675475689379461,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2132
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3828
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
5KB
MD576ef76bfe9fd08b5c62d07d139d3b3f7
SHA188fe33a3725d2df18ce954de850a9b2c1e169264
SHA256480155948bd6342f311c8a305d55d1bea055872979c5c12c46441c170ff63cf1
SHA5128dddce5727d22aaa1b6d09a7f19ff7aa2d27a8ba929ccb602dea0a9a6b7f408f165f4063aad3fa28bea8a187c32e8410143a5d5bf6585791748464036d14c994
-
Filesize
6KB
MD5d33e503dd4988f883ddb6a65075d8e4b
SHA1a7a5bbc435eea46afb32bc072ffabe3171d4a7c1
SHA256fca70706bccfaec04ca036c031e9a5c3af178075cfaf39d4e35af335dd23bdb7
SHA512260648f9b391cf17dca4aa61439737f4b5a5ac5749d3a9395b87646e4c3a91938ea6f5f46634a53556dea650d8d8b027af7ba8d7145d1494296d35548ab83f00
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54be89658d589a2a04863e9281b7e9b2e
SHA1fb14e130098c1cd82596adb236ade436f583fcab
SHA256a052b1561de7c41b0901550af1c38af830d01ac9986599c430761fcb799f62d4
SHA5129a10d2a5ad385aaa76607a468f780fb02da23873535259c5d9923fde00cc752fe2257d8949d01599ce0f094a50903470b4e00b3ccd44ca48abbdd36aae0d9c21