Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
03-06-2024 16:32
Static task
static1
Behavioral task
behavioral1
Sample
927482d9e179752debf1d1c7ac519579_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
927482d9e179752debf1d1c7ac519579_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
927482d9e179752debf1d1c7ac519579_JaffaCakes118.html
-
Size
17KB
-
MD5
927482d9e179752debf1d1c7ac519579
-
SHA1
c8e4700c01ebfa1012ed626e2e0e6c0052f37436
-
SHA256
29187df8f6471fc6cc2fcb8ecb6b56bd96210a77319dbd2c37967a8344f3de62
-
SHA512
4f5b2057c838212513070ebc96c1b03ebb0f4eb485feae44a99094d9ec628ee3c5f234ed23868b90395e24b0d729a495ffa333f9232f67dfa073891cff6744eb
-
SSDEEP
384:dSxhi/xzfg+oQKWfAWOXDkoXbiRBEvA1cv3nKY:Jt1dOTkoXbjAKnKY
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1436 msedge.exe 1436 msedge.exe 2224 msedge.exe 2224 msedge.exe 1608 identity_helper.exe 1608 identity_helper.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2224 wrote to memory of 1968 2224 msedge.exe 82 PID 2224 wrote to memory of 1968 2224 msedge.exe 82 PID 2224 wrote to memory of 2460 2224 msedge.exe 83 PID 2224 wrote to memory of 2460 2224 msedge.exe 83 PID 2224 wrote to memory of 2460 2224 msedge.exe 83 PID 2224 wrote to memory of 2460 2224 msedge.exe 83 PID 2224 wrote to memory of 2460 2224 msedge.exe 83 PID 2224 wrote to memory of 2460 2224 msedge.exe 83 PID 2224 wrote to memory of 2460 2224 msedge.exe 83 PID 2224 wrote to memory of 2460 2224 msedge.exe 83 PID 2224 wrote to memory of 2460 2224 msedge.exe 83 PID 2224 wrote to memory of 2460 2224 msedge.exe 83 PID 2224 wrote to memory of 2460 2224 msedge.exe 83 PID 2224 wrote to memory of 2460 2224 msedge.exe 83 PID 2224 wrote to memory of 2460 2224 msedge.exe 83 PID 2224 wrote to memory of 2460 2224 msedge.exe 83 PID 2224 wrote to memory of 2460 2224 msedge.exe 83 PID 2224 wrote to memory of 2460 2224 msedge.exe 83 PID 2224 wrote to memory of 2460 2224 msedge.exe 83 PID 2224 wrote to memory of 2460 2224 msedge.exe 83 PID 2224 wrote to memory of 2460 2224 msedge.exe 83 PID 2224 wrote to memory of 2460 2224 msedge.exe 83 PID 2224 wrote to memory of 2460 2224 msedge.exe 83 PID 2224 wrote to memory of 2460 2224 msedge.exe 83 PID 2224 wrote to memory of 2460 2224 msedge.exe 83 PID 2224 wrote to memory of 2460 2224 msedge.exe 83 PID 2224 wrote to memory of 2460 2224 msedge.exe 83 PID 2224 wrote to memory of 2460 2224 msedge.exe 83 PID 2224 wrote to memory of 2460 2224 msedge.exe 83 PID 2224 wrote to memory of 2460 2224 msedge.exe 83 PID 2224 wrote to memory of 2460 2224 msedge.exe 83 PID 2224 wrote to memory of 2460 2224 msedge.exe 83 PID 2224 wrote to memory of 2460 2224 msedge.exe 83 PID 2224 wrote to memory of 2460 2224 msedge.exe 83 PID 2224 wrote to memory of 2460 2224 msedge.exe 83 PID 2224 wrote to memory of 2460 2224 msedge.exe 83 PID 2224 wrote to memory of 2460 2224 msedge.exe 83 PID 2224 wrote to memory of 2460 2224 msedge.exe 83 PID 2224 wrote to memory of 2460 2224 msedge.exe 83 PID 2224 wrote to memory of 2460 2224 msedge.exe 83 PID 2224 wrote to memory of 2460 2224 msedge.exe 83 PID 2224 wrote to memory of 2460 2224 msedge.exe 83 PID 2224 wrote to memory of 1436 2224 msedge.exe 84 PID 2224 wrote to memory of 1436 2224 msedge.exe 84 PID 2224 wrote to memory of 4960 2224 msedge.exe 85 PID 2224 wrote to memory of 4960 2224 msedge.exe 85 PID 2224 wrote to memory of 4960 2224 msedge.exe 85 PID 2224 wrote to memory of 4960 2224 msedge.exe 85 PID 2224 wrote to memory of 4960 2224 msedge.exe 85 PID 2224 wrote to memory of 4960 2224 msedge.exe 85 PID 2224 wrote to memory of 4960 2224 msedge.exe 85 PID 2224 wrote to memory of 4960 2224 msedge.exe 85 PID 2224 wrote to memory of 4960 2224 msedge.exe 85 PID 2224 wrote to memory of 4960 2224 msedge.exe 85 PID 2224 wrote to memory of 4960 2224 msedge.exe 85 PID 2224 wrote to memory of 4960 2224 msedge.exe 85 PID 2224 wrote to memory of 4960 2224 msedge.exe 85 PID 2224 wrote to memory of 4960 2224 msedge.exe 85 PID 2224 wrote to memory of 4960 2224 msedge.exe 85 PID 2224 wrote to memory of 4960 2224 msedge.exe 85 PID 2224 wrote to memory of 4960 2224 msedge.exe 85 PID 2224 wrote to memory of 4960 2224 msedge.exe 85 PID 2224 wrote to memory of 4960 2224 msedge.exe 85 PID 2224 wrote to memory of 4960 2224 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\927482d9e179752debf1d1c7ac519579_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff84d3746f8,0x7ff84d374708,0x7ff84d3747182⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,12829678677224159303,13337826115466031956,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,12829678677224159303,13337826115466031956,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,12829678677224159303,13337826115466031956,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2636 /prefetch:82⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12829678677224159303,13337826115466031956,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3128 /prefetch:12⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12829678677224159303,13337826115466031956,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12829678677224159303,13337826115466031956,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4660 /prefetch:12⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,12829678677224159303,13337826115466031956,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5008 /prefetch:82⤵PID:3768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,12829678677224159303,13337826115466031956,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5008 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12829678677224159303,13337826115466031956,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:1220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12829678677224159303,13337826115466031956,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12829678677224159303,13337826115466031956,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4660 /prefetch:12⤵PID:2732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12829678677224159303,13337826115466031956,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5912 /prefetch:12⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,12829678677224159303,13337826115466031956,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3568 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5104
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1928
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
507B
MD505b3773dda1159d0c5bd7668afabd10d
SHA1e96ac21dbae08aaa62daf28ca976163993fa891b
SHA256d1166aa51259aabf27df9973fbd1f76779b7edc18d449c71e27226a40edfd6bd
SHA512029ac6385cafa04b35fd911c9555c59d691be62dc79f104eb0a7a3ce94cce8eae528b6105a6d4952da13ff0425d2a854d9d5aa02dce4f01149cd762254305330
-
Filesize
5KB
MD58a3e8fe2853459689e2dc8cc86cabb82
SHA13e0904875b2428b4e75c6d052b7fe9ec986aeebc
SHA256df5bc9c06938b8ba92a7e541085c1bc2c08f196db07b807748b8adec27f10d6c
SHA51296337e44f688d79a4c4b14200d21056be8c788b906cb6bf4df63d8232d532800dd9382116178baec15b7c71845344ccdaaf8d60802f6da2c62d334d5b609d7dd
-
Filesize
6KB
MD5c398fe51a28c37a2253c5938b02d8ae1
SHA108e0de271205c71cbb5af4abb4f998902a509486
SHA2569d2786aaa73ca980b08d1f8eb400f2c6ac96cc7822e9c98cc20b2d58b945c33b
SHA5123d0fa615d8b699b3e506fa991105d101b8623e6048c371bf260ac2a36a9a9c1e95ac3aff545db5a28393eb3b04faddc9f6b61642dfa94807d25165461c0c49cf
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD55208ed4d246a4aa5ac82b9f64fc0dc81
SHA110109eeaa99b8d0626e69c83e6e00f0015bbd9f6
SHA2569c5c5d77bdcdc2bddcb8785f62c94886e1adee407a8673003b72d096ac63fc12
SHA512c26aae20ff000285bd35259010b1ce7dd51f5120c17ecacbe22f56e33dc1ae4b86eba03c7ff9a79f8cb96b87de4d3d606f343bd8b682563951809fa73f07ba3f