Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 21:40
Static task
static1
Behavioral task
behavioral1
Sample
965ae225df02f8c070821a1a8cfa64e0_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
965ae225df02f8c070821a1a8cfa64e0_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
965ae225df02f8c070821a1a8cfa64e0_JaffaCakes118.html
-
Size
13KB
-
MD5
965ae225df02f8c070821a1a8cfa64e0
-
SHA1
73000305c85efaee5b627d45cd9a8af90f4f151d
-
SHA256
1a2cf7a40d3aa9c8586b0a86b080a90fc01695a4ba1a99ce19b8f199b5060ce0
-
SHA512
35325c45206e8584dc02ef13a95511cc1400849b55618273a6d098f05edf195a92d95adf8898a33be221d6e357af567d01e1de0e0fea1889be74054c36b712dd
-
SSDEEP
384:CyirRB/tGFgG5QFAi7hy1wHMG2P71gyGGTHQs:Cyib6QFAi7hI4Mz1gu
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3316 msedge.exe 3316 msedge.exe 3196 msedge.exe 3196 msedge.exe 1752 identity_helper.exe 1752 identity_helper.exe 1996 msedge.exe 1996 msedge.exe 1996 msedge.exe 1996 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3196 wrote to memory of 4996 3196 msedge.exe 83 PID 3196 wrote to memory of 4996 3196 msedge.exe 83 PID 3196 wrote to memory of 4784 3196 msedge.exe 84 PID 3196 wrote to memory of 4784 3196 msedge.exe 84 PID 3196 wrote to memory of 4784 3196 msedge.exe 84 PID 3196 wrote to memory of 4784 3196 msedge.exe 84 PID 3196 wrote to memory of 4784 3196 msedge.exe 84 PID 3196 wrote to memory of 4784 3196 msedge.exe 84 PID 3196 wrote to memory of 4784 3196 msedge.exe 84 PID 3196 wrote to memory of 4784 3196 msedge.exe 84 PID 3196 wrote to memory of 4784 3196 msedge.exe 84 PID 3196 wrote to memory of 4784 3196 msedge.exe 84 PID 3196 wrote to memory of 4784 3196 msedge.exe 84 PID 3196 wrote to memory of 4784 3196 msedge.exe 84 PID 3196 wrote to memory of 4784 3196 msedge.exe 84 PID 3196 wrote to memory of 4784 3196 msedge.exe 84 PID 3196 wrote to memory of 4784 3196 msedge.exe 84 PID 3196 wrote to memory of 4784 3196 msedge.exe 84 PID 3196 wrote to memory of 4784 3196 msedge.exe 84 PID 3196 wrote to memory of 4784 3196 msedge.exe 84 PID 3196 wrote to memory of 4784 3196 msedge.exe 84 PID 3196 wrote to memory of 4784 3196 msedge.exe 84 PID 3196 wrote to memory of 4784 3196 msedge.exe 84 PID 3196 wrote to memory of 4784 3196 msedge.exe 84 PID 3196 wrote to memory of 4784 3196 msedge.exe 84 PID 3196 wrote to memory of 4784 3196 msedge.exe 84 PID 3196 wrote to memory of 4784 3196 msedge.exe 84 PID 3196 wrote to memory of 4784 3196 msedge.exe 84 PID 3196 wrote to memory of 4784 3196 msedge.exe 84 PID 3196 wrote to memory of 4784 3196 msedge.exe 84 PID 3196 wrote to memory of 4784 3196 msedge.exe 84 PID 3196 wrote to memory of 4784 3196 msedge.exe 84 PID 3196 wrote to memory of 4784 3196 msedge.exe 84 PID 3196 wrote to memory of 4784 3196 msedge.exe 84 PID 3196 wrote to memory of 4784 3196 msedge.exe 84 PID 3196 wrote to memory of 4784 3196 msedge.exe 84 PID 3196 wrote to memory of 4784 3196 msedge.exe 84 PID 3196 wrote to memory of 4784 3196 msedge.exe 84 PID 3196 wrote to memory of 4784 3196 msedge.exe 84 PID 3196 wrote to memory of 4784 3196 msedge.exe 84 PID 3196 wrote to memory of 4784 3196 msedge.exe 84 PID 3196 wrote to memory of 4784 3196 msedge.exe 84 PID 3196 wrote to memory of 3316 3196 msedge.exe 85 PID 3196 wrote to memory of 3316 3196 msedge.exe 85 PID 3196 wrote to memory of 2052 3196 msedge.exe 86 PID 3196 wrote to memory of 2052 3196 msedge.exe 86 PID 3196 wrote to memory of 2052 3196 msedge.exe 86 PID 3196 wrote to memory of 2052 3196 msedge.exe 86 PID 3196 wrote to memory of 2052 3196 msedge.exe 86 PID 3196 wrote to memory of 2052 3196 msedge.exe 86 PID 3196 wrote to memory of 2052 3196 msedge.exe 86 PID 3196 wrote to memory of 2052 3196 msedge.exe 86 PID 3196 wrote to memory of 2052 3196 msedge.exe 86 PID 3196 wrote to memory of 2052 3196 msedge.exe 86 PID 3196 wrote to memory of 2052 3196 msedge.exe 86 PID 3196 wrote to memory of 2052 3196 msedge.exe 86 PID 3196 wrote to memory of 2052 3196 msedge.exe 86 PID 3196 wrote to memory of 2052 3196 msedge.exe 86 PID 3196 wrote to memory of 2052 3196 msedge.exe 86 PID 3196 wrote to memory of 2052 3196 msedge.exe 86 PID 3196 wrote to memory of 2052 3196 msedge.exe 86 PID 3196 wrote to memory of 2052 3196 msedge.exe 86 PID 3196 wrote to memory of 2052 3196 msedge.exe 86 PID 3196 wrote to memory of 2052 3196 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\965ae225df02f8c070821a1a8cfa64e0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa047246f8,0x7ffa04724708,0x7ffa047247182⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,8441567088243674025,13667017197646463866,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2192,8441567088243674025,13667017197646463866,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2192,8441567088243674025,13667017197646463866,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1924 /prefetch:82⤵PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,8441567088243674025,13667017197646463866,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,8441567088243674025,13667017197646463866,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,8441567088243674025,13667017197646463866,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,8441567088243674025,13667017197646463866,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,8441567088243674025,13667017197646463866,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:1324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,8441567088243674025,13667017197646463866,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,8441567088243674025,13667017197646463866,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,8441567088243674025,13667017197646463866,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,8441567088243674025,13667017197646463866,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1348 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1996
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4464
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4472
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
5KB
MD563420cf421700cd702817355feabae7c
SHA1c248448a7d8d29f4a62bd42578807e5bc21099ca
SHA256e8287979b76d802cc49462222dd21b4d658dd97b590f5b65f63a1b2c10d2e698
SHA51282d982e8c8c23586ef485357a09c619bc2ad271c621dc72790e18aabcf963e042a6849d0ceb96252ac6137c211782920c514f41cc3360122b4293bda8b754397
-
Filesize
6KB
MD5b31c7c0699e7e977024bec53c5256a8f
SHA171c176c7e90dedae0430f47ac2c540c2966d6a97
SHA2562a46447f1769dcc061b077fa1456a5e716274a608a6134b52e6f9938c80111bd
SHA512ec3eb8a498f11fb5524e43264b6afb114d4d096fc1f683dcd4a1c165c624b0099ac26dd49d209b513edb64b8f50cb2787bef90b81a896bf7b1f3d31f0566f065
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD512e9c1843d273cac1af4bb3068a65313
SHA17e657121bf18694f8d2cb7a069c91c5df29189d2
SHA2560282b89d955f62befb25cb7afae3875e474023d783036f1e3e40169f952adcfc
SHA512f459a245d3a51ac160a3d9a00f038ccd23ee89af533bedba5328bf2211225880329d3124ed8609770f1db009496aeaefde54cccf5c765b66f21bca184ca6d7e3