Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 13:53
Static task
static1
Behavioral task
behavioral1
Sample
92065eddd96d5b78a0b712c1473ec642_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
92065eddd96d5b78a0b712c1473ec642_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
92065eddd96d5b78a0b712c1473ec642_JaffaCakes118.html
-
Size
23KB
-
MD5
92065eddd96d5b78a0b712c1473ec642
-
SHA1
31766d056ac8694b52bac130c8709a9f81e36507
-
SHA256
35d945ba76baaa26b252fc1d19aa13b346b33283ad4d40214b6614c1e3aded0d
-
SHA512
1045f96b950bcc10ccdd39068771c77681b5f239eb9357332fde7d8bb08940f878c151cb5f08517cd4e2ee0c98c1a48b6caeda934a045f4d2c834a9b6a9469bb
-
SSDEEP
192:uwLGENn/b5n9ynQjxn5Q/QnQieA6NnLRnQOkEntqjqnQTbndnQtBXUUvMBg6qnYb:/Q/dwB/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4668 msedge.exe 4668 msedge.exe 1468 msedge.exe 1468 msedge.exe 1964 identity_helper.exe 1964 identity_helper.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1468 wrote to memory of 3112 1468 msedge.exe 83 PID 1468 wrote to memory of 3112 1468 msedge.exe 83 PID 1468 wrote to memory of 2104 1468 msedge.exe 84 PID 1468 wrote to memory of 2104 1468 msedge.exe 84 PID 1468 wrote to memory of 2104 1468 msedge.exe 84 PID 1468 wrote to memory of 2104 1468 msedge.exe 84 PID 1468 wrote to memory of 2104 1468 msedge.exe 84 PID 1468 wrote to memory of 2104 1468 msedge.exe 84 PID 1468 wrote to memory of 2104 1468 msedge.exe 84 PID 1468 wrote to memory of 2104 1468 msedge.exe 84 PID 1468 wrote to memory of 2104 1468 msedge.exe 84 PID 1468 wrote to memory of 2104 1468 msedge.exe 84 PID 1468 wrote to memory of 2104 1468 msedge.exe 84 PID 1468 wrote to memory of 2104 1468 msedge.exe 84 PID 1468 wrote to memory of 2104 1468 msedge.exe 84 PID 1468 wrote to memory of 2104 1468 msedge.exe 84 PID 1468 wrote to memory of 2104 1468 msedge.exe 84 PID 1468 wrote to memory of 2104 1468 msedge.exe 84 PID 1468 wrote to memory of 2104 1468 msedge.exe 84 PID 1468 wrote to memory of 2104 1468 msedge.exe 84 PID 1468 wrote to memory of 2104 1468 msedge.exe 84 PID 1468 wrote to memory of 2104 1468 msedge.exe 84 PID 1468 wrote to memory of 2104 1468 msedge.exe 84 PID 1468 wrote to memory of 2104 1468 msedge.exe 84 PID 1468 wrote to memory of 2104 1468 msedge.exe 84 PID 1468 wrote to memory of 2104 1468 msedge.exe 84 PID 1468 wrote to memory of 2104 1468 msedge.exe 84 PID 1468 wrote to memory of 2104 1468 msedge.exe 84 PID 1468 wrote to memory of 2104 1468 msedge.exe 84 PID 1468 wrote to memory of 2104 1468 msedge.exe 84 PID 1468 wrote to memory of 2104 1468 msedge.exe 84 PID 1468 wrote to memory of 2104 1468 msedge.exe 84 PID 1468 wrote to memory of 2104 1468 msedge.exe 84 PID 1468 wrote to memory of 2104 1468 msedge.exe 84 PID 1468 wrote to memory of 2104 1468 msedge.exe 84 PID 1468 wrote to memory of 2104 1468 msedge.exe 84 PID 1468 wrote to memory of 2104 1468 msedge.exe 84 PID 1468 wrote to memory of 2104 1468 msedge.exe 84 PID 1468 wrote to memory of 2104 1468 msedge.exe 84 PID 1468 wrote to memory of 2104 1468 msedge.exe 84 PID 1468 wrote to memory of 2104 1468 msedge.exe 84 PID 1468 wrote to memory of 2104 1468 msedge.exe 84 PID 1468 wrote to memory of 4668 1468 msedge.exe 85 PID 1468 wrote to memory of 4668 1468 msedge.exe 85 PID 1468 wrote to memory of 2204 1468 msedge.exe 86 PID 1468 wrote to memory of 2204 1468 msedge.exe 86 PID 1468 wrote to memory of 2204 1468 msedge.exe 86 PID 1468 wrote to memory of 2204 1468 msedge.exe 86 PID 1468 wrote to memory of 2204 1468 msedge.exe 86 PID 1468 wrote to memory of 2204 1468 msedge.exe 86 PID 1468 wrote to memory of 2204 1468 msedge.exe 86 PID 1468 wrote to memory of 2204 1468 msedge.exe 86 PID 1468 wrote to memory of 2204 1468 msedge.exe 86 PID 1468 wrote to memory of 2204 1468 msedge.exe 86 PID 1468 wrote to memory of 2204 1468 msedge.exe 86 PID 1468 wrote to memory of 2204 1468 msedge.exe 86 PID 1468 wrote to memory of 2204 1468 msedge.exe 86 PID 1468 wrote to memory of 2204 1468 msedge.exe 86 PID 1468 wrote to memory of 2204 1468 msedge.exe 86 PID 1468 wrote to memory of 2204 1468 msedge.exe 86 PID 1468 wrote to memory of 2204 1468 msedge.exe 86 PID 1468 wrote to memory of 2204 1468 msedge.exe 86 PID 1468 wrote to memory of 2204 1468 msedge.exe 86 PID 1468 wrote to memory of 2204 1468 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\92065eddd96d5b78a0b712c1473ec642_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe40aa46f8,0x7ffe40aa4708,0x7ffe40aa47182⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,14146314162686627220,2448932871325230912,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,14146314162686627220,2448932871325230912,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,14146314162686627220,2448932871325230912,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:2204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14146314162686627220,2448932871325230912,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14146314162686627220,2448932871325230912,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,14146314162686627220,2448932871325230912,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2532 /prefetch:82⤵PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,14146314162686627220,2448932871325230912,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2532 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14146314162686627220,2448932871325230912,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2552 /prefetch:12⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14146314162686627220,2448932871325230912,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2248 /prefetch:12⤵PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14146314162686627220,2448932871325230912,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6020 /prefetch:12⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14146314162686627220,2448932871325230912,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,14146314162686627220,2448932871325230912,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1292 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2376
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3216
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1836
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD515c09221bb709391af6c2d7299e1b8ee
SHA1db9f06633cc9479395f88cb0d0cc0bfeaa202aa3
SHA256b9fb14e6b4896e66d3bcb63e0f45a77a61b85d6757919d547ad8e50371880d6f
SHA512708798a8f4ef8014b6f32b3dac6ce9d6b4c23c7188f34d63e3df45325e1c6060b9edaa40aa5d5bcad475fb1afe6c6516b1c75c641b71bb8bfcb3af63c0492b12
-
Filesize
6KB
MD5b580f0969b219020d466dda1d631ace9
SHA1e70b2dd0f14a95d825e9001a8af58ff13960cdbc
SHA2563411fa2d8a41c19f2212d70954efd5d176d137408a94f8d4060225c49cd64ef7
SHA5121e5341f56a20a13528f815fa7d02dfe3ee0abaedc6e1a34e9ca8761dea0f2d98a1ec6a67a125689f821e30acd2025fee5afbe6fcc4e8a9fb3b64b7c9d11603fb
-
Filesize
6KB
MD50a1ff328c2d4d1b869ba98bab3e5bbfa
SHA1cecdec935c5b56491d8fb3998548f1e71e39fb16
SHA256d9f56dca8bd3ac7115d3d11134a3e58f472d709e27312ac906903889f02ad865
SHA512c9d83cf93cc4f0b6c753a84832aa8726b1f0efe0ebfafee9344fe2e479f634d0e1350b673338d79c10f2db034672f1c3cadd60b74ed7f941168635a905a6eaef
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d88435ffd150d0017882711c04d676a4
SHA1f9f6d1cc07bc93bf8f8cb7658d4bb26b2289a73a
SHA2562ff1adadf4de0cc148115f8fcdf09360a4feba41c1335cde4862ad8143b33142
SHA512060187929af9164677262efacce35a58e69f90bbea774060099b9467edc197c3e57c8cdfe585228cfa7532b475d17bced891e8c3c9f1c3894cdb7bd4a01580cd