Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 22:47
Static task
static1
Behavioral task
behavioral1
Sample
967fd2bb6e52a179aa6a49a5fbfbdb14_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
967fd2bb6e52a179aa6a49a5fbfbdb14_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
967fd2bb6e52a179aa6a49a5fbfbdb14_JaffaCakes118.html
-
Size
69KB
-
MD5
967fd2bb6e52a179aa6a49a5fbfbdb14
-
SHA1
338ed8f364f348ba6b496201bf8ad645cc215d37
-
SHA256
9079b3bfd6a10090c0fc4ed1799a70dd52dcd749746db669ac5dca4f1b61a268
-
SHA512
65452f18e4fc0e2ec2fbe3e6916d38d1e4e342d4a6ddb2dc912a13c3bf5a18a4622f9ebaa4cae7d5e98c04fa0a31dc433ae6e279ecfa557d9e9cdc95979c853f
-
SSDEEP
768:D/NE2+NtiXM28JlFhGQCE4wz709Alo6gwpry:D/NGNt1hJThiE4wz709Alo6gwpry
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3208 msedge.exe 3208 msedge.exe 1884 msedge.exe 1884 msedge.exe 4708 identity_helper.exe 4708 identity_helper.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1884 wrote to memory of 2892 1884 msedge.exe 83 PID 1884 wrote to memory of 2892 1884 msedge.exe 83 PID 1884 wrote to memory of 1252 1884 msedge.exe 84 PID 1884 wrote to memory of 1252 1884 msedge.exe 84 PID 1884 wrote to memory of 1252 1884 msedge.exe 84 PID 1884 wrote to memory of 1252 1884 msedge.exe 84 PID 1884 wrote to memory of 1252 1884 msedge.exe 84 PID 1884 wrote to memory of 1252 1884 msedge.exe 84 PID 1884 wrote to memory of 1252 1884 msedge.exe 84 PID 1884 wrote to memory of 1252 1884 msedge.exe 84 PID 1884 wrote to memory of 1252 1884 msedge.exe 84 PID 1884 wrote to memory of 1252 1884 msedge.exe 84 PID 1884 wrote to memory of 1252 1884 msedge.exe 84 PID 1884 wrote to memory of 1252 1884 msedge.exe 84 PID 1884 wrote to memory of 1252 1884 msedge.exe 84 PID 1884 wrote to memory of 1252 1884 msedge.exe 84 PID 1884 wrote to memory of 1252 1884 msedge.exe 84 PID 1884 wrote to memory of 1252 1884 msedge.exe 84 PID 1884 wrote to memory of 1252 1884 msedge.exe 84 PID 1884 wrote to memory of 1252 1884 msedge.exe 84 PID 1884 wrote to memory of 1252 1884 msedge.exe 84 PID 1884 wrote to memory of 1252 1884 msedge.exe 84 PID 1884 wrote to memory of 1252 1884 msedge.exe 84 PID 1884 wrote to memory of 1252 1884 msedge.exe 84 PID 1884 wrote to memory of 1252 1884 msedge.exe 84 PID 1884 wrote to memory of 1252 1884 msedge.exe 84 PID 1884 wrote to memory of 1252 1884 msedge.exe 84 PID 1884 wrote to memory of 1252 1884 msedge.exe 84 PID 1884 wrote to memory of 1252 1884 msedge.exe 84 PID 1884 wrote to memory of 1252 1884 msedge.exe 84 PID 1884 wrote to memory of 1252 1884 msedge.exe 84 PID 1884 wrote to memory of 1252 1884 msedge.exe 84 PID 1884 wrote to memory of 1252 1884 msedge.exe 84 PID 1884 wrote to memory of 1252 1884 msedge.exe 84 PID 1884 wrote to memory of 1252 1884 msedge.exe 84 PID 1884 wrote to memory of 1252 1884 msedge.exe 84 PID 1884 wrote to memory of 1252 1884 msedge.exe 84 PID 1884 wrote to memory of 1252 1884 msedge.exe 84 PID 1884 wrote to memory of 1252 1884 msedge.exe 84 PID 1884 wrote to memory of 1252 1884 msedge.exe 84 PID 1884 wrote to memory of 1252 1884 msedge.exe 84 PID 1884 wrote to memory of 1252 1884 msedge.exe 84 PID 1884 wrote to memory of 3208 1884 msedge.exe 85 PID 1884 wrote to memory of 3208 1884 msedge.exe 85 PID 1884 wrote to memory of 1240 1884 msedge.exe 86 PID 1884 wrote to memory of 1240 1884 msedge.exe 86 PID 1884 wrote to memory of 1240 1884 msedge.exe 86 PID 1884 wrote to memory of 1240 1884 msedge.exe 86 PID 1884 wrote to memory of 1240 1884 msedge.exe 86 PID 1884 wrote to memory of 1240 1884 msedge.exe 86 PID 1884 wrote to memory of 1240 1884 msedge.exe 86 PID 1884 wrote to memory of 1240 1884 msedge.exe 86 PID 1884 wrote to memory of 1240 1884 msedge.exe 86 PID 1884 wrote to memory of 1240 1884 msedge.exe 86 PID 1884 wrote to memory of 1240 1884 msedge.exe 86 PID 1884 wrote to memory of 1240 1884 msedge.exe 86 PID 1884 wrote to memory of 1240 1884 msedge.exe 86 PID 1884 wrote to memory of 1240 1884 msedge.exe 86 PID 1884 wrote to memory of 1240 1884 msedge.exe 86 PID 1884 wrote to memory of 1240 1884 msedge.exe 86 PID 1884 wrote to memory of 1240 1884 msedge.exe 86 PID 1884 wrote to memory of 1240 1884 msedge.exe 86 PID 1884 wrote to memory of 1240 1884 msedge.exe 86 PID 1884 wrote to memory of 1240 1884 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\967fd2bb6e52a179aa6a49a5fbfbdb14_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa797e46f8,0x7ffa797e4708,0x7ffa797e47182⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,12261354175908263890,4636816983859798068,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,12261354175908263890,4636816983859798068,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2412 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,12261354175908263890,4636816983859798068,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:1240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,12261354175908263890,4636816983859798068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,12261354175908263890,4636816983859798068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,12261354175908263890,4636816983859798068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5908 /prefetch:12⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,12261354175908263890,4636816983859798068,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5892 /prefetch:12⤵PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,12261354175908263890,4636816983859798068,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5484 /prefetch:82⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,12261354175908263890,4636816983859798068,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5484 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,12261354175908263890,4636816983859798068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,12261354175908263890,4636816983859798068,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,12261354175908263890,4636816983859798068,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5000 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2276
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4860
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:672
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\33249773-5c7c-4741-bdc8-6ba0c7074d31.tmp
Filesize5KB
MD5a726ebf04c4c3e89e5d21acc9f53b837
SHA15f4146daf7fbc44f28cfbc698f2d8a6fb7555b4e
SHA256db00b9e55ec292841fbc157e53d5ff6eefd94c83171dfe340f9404d7dc070b4c
SHA512106a44f136b1bd1221a2759ba454a97b5de21e1405ef86efdd0ba928eb7762a7416e8ac99f3f778a15785536b914e0dcd3920e2a629391e78b5dfd9afa2d99ea
-
Filesize
185B
MD51e82917119d74648cdfea28461083b08
SHA1996330927cf68775ecdcb9df3a112b1414afdf14
SHA25656149ac8737f0e038ae627688713f89c8091677483237aa38351cc1221abc0ee
SHA51250a733c7324630d9bb11747a8161b91b696bad2a10e466517340fbd7040292240f7d84fba3d5b94b5a51373071ead1a0ee809ecb29885aac2ddda38107b1896c
-
Filesize
6KB
MD5a183e4a83d4a4635c99b923bde678e01
SHA12ae9e168bd9473759f53eeec88d3c74e93a97332
SHA25622279781451a4100b8d023c149ebeab08698b56af946ed1bb365ab51679f2481
SHA512d49e1a16e8c56f95843c44fc46978c6eaf42de9d84277c0317a1082767c20258a8676483f850484206f29389c8b8fa1d50988a6f28dc6e5b10e87213b0775d6a
-
Filesize
6KB
MD518bb2d5b2f29806ac41db92647f627ec
SHA12144338a018c95830c9e7f6cd0b70cdd4d7abc0d
SHA256a40f9e24917d88fdffc7bc2cfa58bc77692d802f97fb7415f6d9428c25339866
SHA5120956099ae6deead6d94df2a485e1c15c3748b2291ed6101bd513f3a0ba2107e5b5b8586a8af6a3d4850c45b4498d86e7f44dc7b7c95c426d9f7d63928abbdc7f
-
Filesize
204B
MD579058c41b645673fd40834160c46a981
SHA12f07228e4f1fe0bc3be9750973f128f7c655e979
SHA2563b24322affc5fb2f61f0e749626c762550cda99a20ce71fe3a3b6e630ba788d6
SHA512534b11c0cd1828c69e7aff51d0b5f95611135efb27934fd24abbdb7d9ab4d97910e08804d48ad1696fc2bf5cad8f45f96adb868022ebb2c48b8fa6be9136b943
-
Filesize
204B
MD591235441cf36de36677e87615c30fe8a
SHA196e65424a3640bd969eed8dc668e6e8491f2fc3e
SHA256b0b7bc4a03320c7a154ff1c051c14519772b42a8b988698bb384a363910200a8
SHA512bf8593849562f46f08d768d794930420ea1193ec149d16ef7ad8a4ffc72aafd4c0d64bfc75e0aefc6106aa4dcb5a9c475bc53cda47e153f8ab0cee44e30b0004
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD55c2caf7240e6ea2758aa3ce8665e1af4
SHA1a9ccc3a7ffbee3231876415fcc20603205c93411
SHA2561bf4dadbaa729e503c068d16b2095225d392aa313b018243667f6628e0dad770
SHA512e9ffaca92626ddbf31543a3d5e054741d876f01f573b2a6ceda8e855ee8c403d5c6a56242837255fb1f9f5631489c9d8840cd1b77d206116ffcb75afda04c738