Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 17:20
Static task
static1
Behavioral task
behavioral1
Sample
929637b4dda31b7d6e13657875219879_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
929637b4dda31b7d6e13657875219879_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
929637b4dda31b7d6e13657875219879_JaffaCakes118.html
-
Size
944B
-
MD5
929637b4dda31b7d6e13657875219879
-
SHA1
6d090e978fc37a51585a6c7a322e81fc79d31644
-
SHA256
493e412864f27067aee09eb9853537c5e8142c3f74a72d0c209b56566621c453
-
SHA512
6f394fc4a09c0a537a8fea6b4e16eaf4398dcfc0614c99939f0915659b3ca0d0b3b0d1de8e4acf50bcaf373d9d906e9ddb4e51c88df019fcc6821f4fa8e6bf19
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3320 msedge.exe 3320 msedge.exe 1500 msedge.exe 1500 msedge.exe 3476 identity_helper.exe 3476 identity_helper.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1500 wrote to memory of 3848 1500 msedge.exe 85 PID 1500 wrote to memory of 3848 1500 msedge.exe 85 PID 1500 wrote to memory of 3976 1500 msedge.exe 86 PID 1500 wrote to memory of 3976 1500 msedge.exe 86 PID 1500 wrote to memory of 3976 1500 msedge.exe 86 PID 1500 wrote to memory of 3976 1500 msedge.exe 86 PID 1500 wrote to memory of 3976 1500 msedge.exe 86 PID 1500 wrote to memory of 3976 1500 msedge.exe 86 PID 1500 wrote to memory of 3976 1500 msedge.exe 86 PID 1500 wrote to memory of 3976 1500 msedge.exe 86 PID 1500 wrote to memory of 3976 1500 msedge.exe 86 PID 1500 wrote to memory of 3976 1500 msedge.exe 86 PID 1500 wrote to memory of 3976 1500 msedge.exe 86 PID 1500 wrote to memory of 3976 1500 msedge.exe 86 PID 1500 wrote to memory of 3976 1500 msedge.exe 86 PID 1500 wrote to memory of 3976 1500 msedge.exe 86 PID 1500 wrote to memory of 3976 1500 msedge.exe 86 PID 1500 wrote to memory of 3976 1500 msedge.exe 86 PID 1500 wrote to memory of 3976 1500 msedge.exe 86 PID 1500 wrote to memory of 3976 1500 msedge.exe 86 PID 1500 wrote to memory of 3976 1500 msedge.exe 86 PID 1500 wrote to memory of 3976 1500 msedge.exe 86 PID 1500 wrote to memory of 3976 1500 msedge.exe 86 PID 1500 wrote to memory of 3976 1500 msedge.exe 86 PID 1500 wrote to memory of 3976 1500 msedge.exe 86 PID 1500 wrote to memory of 3976 1500 msedge.exe 86 PID 1500 wrote to memory of 3976 1500 msedge.exe 86 PID 1500 wrote to memory of 3976 1500 msedge.exe 86 PID 1500 wrote to memory of 3976 1500 msedge.exe 86 PID 1500 wrote to memory of 3976 1500 msedge.exe 86 PID 1500 wrote to memory of 3976 1500 msedge.exe 86 PID 1500 wrote to memory of 3976 1500 msedge.exe 86 PID 1500 wrote to memory of 3976 1500 msedge.exe 86 PID 1500 wrote to memory of 3976 1500 msedge.exe 86 PID 1500 wrote to memory of 3976 1500 msedge.exe 86 PID 1500 wrote to memory of 3976 1500 msedge.exe 86 PID 1500 wrote to memory of 3976 1500 msedge.exe 86 PID 1500 wrote to memory of 3976 1500 msedge.exe 86 PID 1500 wrote to memory of 3976 1500 msedge.exe 86 PID 1500 wrote to memory of 3976 1500 msedge.exe 86 PID 1500 wrote to memory of 3976 1500 msedge.exe 86 PID 1500 wrote to memory of 3976 1500 msedge.exe 86 PID 1500 wrote to memory of 3320 1500 msedge.exe 87 PID 1500 wrote to memory of 3320 1500 msedge.exe 87 PID 1500 wrote to memory of 4288 1500 msedge.exe 88 PID 1500 wrote to memory of 4288 1500 msedge.exe 88 PID 1500 wrote to memory of 4288 1500 msedge.exe 88 PID 1500 wrote to memory of 4288 1500 msedge.exe 88 PID 1500 wrote to memory of 4288 1500 msedge.exe 88 PID 1500 wrote to memory of 4288 1500 msedge.exe 88 PID 1500 wrote to memory of 4288 1500 msedge.exe 88 PID 1500 wrote to memory of 4288 1500 msedge.exe 88 PID 1500 wrote to memory of 4288 1500 msedge.exe 88 PID 1500 wrote to memory of 4288 1500 msedge.exe 88 PID 1500 wrote to memory of 4288 1500 msedge.exe 88 PID 1500 wrote to memory of 4288 1500 msedge.exe 88 PID 1500 wrote to memory of 4288 1500 msedge.exe 88 PID 1500 wrote to memory of 4288 1500 msedge.exe 88 PID 1500 wrote to memory of 4288 1500 msedge.exe 88 PID 1500 wrote to memory of 4288 1500 msedge.exe 88 PID 1500 wrote to memory of 4288 1500 msedge.exe 88 PID 1500 wrote to memory of 4288 1500 msedge.exe 88 PID 1500 wrote to memory of 4288 1500 msedge.exe 88 PID 1500 wrote to memory of 4288 1500 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\929637b4dda31b7d6e13657875219879_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcca3d46f8,0x7ffcca3d4708,0x7ffcca3d47182⤵PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,5293373781778319612,463025810406219646,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,5293373781778319612,463025810406219646,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,5293373781778319612,463025810406219646,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:82⤵PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,5293373781778319612,463025810406219646,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:1068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,5293373781778319612,463025810406219646,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,5293373781778319612,463025810406219646,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,5293373781778319612,463025810406219646,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 /prefetch:82⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,5293373781778319612,463025810406219646,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,5293373781778319612,463025810406219646,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3552 /prefetch:12⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,5293373781778319612,463025810406219646,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3540 /prefetch:12⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,5293373781778319612,463025810406219646,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:12⤵PID:1796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,5293373781778319612,463025810406219646,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4704 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4384
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3700
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
5KB
MD552e6928f542e8508b1a7ecb8ca47e9a3
SHA112d1a01dee68f9040b91033758d1769855449dbb
SHA2568cb1262e2d32679b8d9db40d46dc86ef65759bc352aebf3dc27a2f75fbef77c0
SHA5126c1d6ea625f9fb0b1fa1b53575d0f427ae495bf011a5ef5d4a47b35f4ff7c8d4caeaba57fbf6d5e5bfb10d1acb7d80e16c6a35c3f96684dc34949f9cb9665a54
-
Filesize
6KB
MD593eb130caeca3d4aa96624d65239291b
SHA15ef0996b331f7e057637ceaca65b6eee95f0f627
SHA2568bdb24efda8384e1638777dd01cb995419007e422ca93ca875b94aec46bb282e
SHA512a1cae081218c9ccbf263f821b7197b0895eb047034fd1e98ec93050e52209520536645df089f61e48772d337f5c21bcd50fcc88590ca00baa3b971ee85a97912
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5a5b75f1e0a34cd651032a29b02270b1c
SHA1153b1e21ffe3ddf1a9b471e94a7d616154ee0429
SHA256010e8c3a30e80bd866fa648eedae25223e8a5afbb00a88a49feeebfffdbe1acc
SHA512626faec9235fd0a2d92a5961c66c71c2429ed48c12dc6665e04c9401eae19a60b22be425e2542df48cec5a2bebbae3c692304d4f27f3876b020c295aea49f05b