Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 23:54
Static task
static1
Behavioral task
behavioral1
Sample
96af229c1322259aa14c077042cda4ee_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
96af229c1322259aa14c077042cda4ee_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
96af229c1322259aa14c077042cda4ee_JaffaCakes118.html
-
Size
3KB
-
MD5
96af229c1322259aa14c077042cda4ee
-
SHA1
e7162cec08469e84f0f9e4618fc2d6c168220ce3
-
SHA256
f7d6fb0e1a48cfd1f38573ded60c5d85396a324f8600d844237e89148cf0b31e
-
SHA512
7eff06f8b3bb761d49e4b082f1dfdfba9b50a59eae0169cac370d5318b9c37126b60ab9fac5b48ae906795c0098f4a8fd4628748fa572caf9c36a59afcbfda21
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4040 msedge.exe 4040 msedge.exe 1012 msedge.exe 1012 msedge.exe 1540 identity_helper.exe 1540 identity_helper.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1012 wrote to memory of 220 1012 msedge.exe 83 PID 1012 wrote to memory of 220 1012 msedge.exe 83 PID 1012 wrote to memory of 4900 1012 msedge.exe 84 PID 1012 wrote to memory of 4900 1012 msedge.exe 84 PID 1012 wrote to memory of 4900 1012 msedge.exe 84 PID 1012 wrote to memory of 4900 1012 msedge.exe 84 PID 1012 wrote to memory of 4900 1012 msedge.exe 84 PID 1012 wrote to memory of 4900 1012 msedge.exe 84 PID 1012 wrote to memory of 4900 1012 msedge.exe 84 PID 1012 wrote to memory of 4900 1012 msedge.exe 84 PID 1012 wrote to memory of 4900 1012 msedge.exe 84 PID 1012 wrote to memory of 4900 1012 msedge.exe 84 PID 1012 wrote to memory of 4900 1012 msedge.exe 84 PID 1012 wrote to memory of 4900 1012 msedge.exe 84 PID 1012 wrote to memory of 4900 1012 msedge.exe 84 PID 1012 wrote to memory of 4900 1012 msedge.exe 84 PID 1012 wrote to memory of 4900 1012 msedge.exe 84 PID 1012 wrote to memory of 4900 1012 msedge.exe 84 PID 1012 wrote to memory of 4900 1012 msedge.exe 84 PID 1012 wrote to memory of 4900 1012 msedge.exe 84 PID 1012 wrote to memory of 4900 1012 msedge.exe 84 PID 1012 wrote to memory of 4900 1012 msedge.exe 84 PID 1012 wrote to memory of 4900 1012 msedge.exe 84 PID 1012 wrote to memory of 4900 1012 msedge.exe 84 PID 1012 wrote to memory of 4900 1012 msedge.exe 84 PID 1012 wrote to memory of 4900 1012 msedge.exe 84 PID 1012 wrote to memory of 4900 1012 msedge.exe 84 PID 1012 wrote to memory of 4900 1012 msedge.exe 84 PID 1012 wrote to memory of 4900 1012 msedge.exe 84 PID 1012 wrote to memory of 4900 1012 msedge.exe 84 PID 1012 wrote to memory of 4900 1012 msedge.exe 84 PID 1012 wrote to memory of 4900 1012 msedge.exe 84 PID 1012 wrote to memory of 4900 1012 msedge.exe 84 PID 1012 wrote to memory of 4900 1012 msedge.exe 84 PID 1012 wrote to memory of 4900 1012 msedge.exe 84 PID 1012 wrote to memory of 4900 1012 msedge.exe 84 PID 1012 wrote to memory of 4900 1012 msedge.exe 84 PID 1012 wrote to memory of 4900 1012 msedge.exe 84 PID 1012 wrote to memory of 4900 1012 msedge.exe 84 PID 1012 wrote to memory of 4900 1012 msedge.exe 84 PID 1012 wrote to memory of 4900 1012 msedge.exe 84 PID 1012 wrote to memory of 4900 1012 msedge.exe 84 PID 1012 wrote to memory of 4040 1012 msedge.exe 85 PID 1012 wrote to memory of 4040 1012 msedge.exe 85 PID 1012 wrote to memory of 1408 1012 msedge.exe 86 PID 1012 wrote to memory of 1408 1012 msedge.exe 86 PID 1012 wrote to memory of 1408 1012 msedge.exe 86 PID 1012 wrote to memory of 1408 1012 msedge.exe 86 PID 1012 wrote to memory of 1408 1012 msedge.exe 86 PID 1012 wrote to memory of 1408 1012 msedge.exe 86 PID 1012 wrote to memory of 1408 1012 msedge.exe 86 PID 1012 wrote to memory of 1408 1012 msedge.exe 86 PID 1012 wrote to memory of 1408 1012 msedge.exe 86 PID 1012 wrote to memory of 1408 1012 msedge.exe 86 PID 1012 wrote to memory of 1408 1012 msedge.exe 86 PID 1012 wrote to memory of 1408 1012 msedge.exe 86 PID 1012 wrote to memory of 1408 1012 msedge.exe 86 PID 1012 wrote to memory of 1408 1012 msedge.exe 86 PID 1012 wrote to memory of 1408 1012 msedge.exe 86 PID 1012 wrote to memory of 1408 1012 msedge.exe 86 PID 1012 wrote to memory of 1408 1012 msedge.exe 86 PID 1012 wrote to memory of 1408 1012 msedge.exe 86 PID 1012 wrote to memory of 1408 1012 msedge.exe 86 PID 1012 wrote to memory of 1408 1012 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\96af229c1322259aa14c077042cda4ee_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc19cc46f8,0x7ffc19cc4708,0x7ffc19cc47182⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2244,4992018770626388292,17062868996690305948,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2280 /prefetch:22⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2244,4992018770626388292,17062868996690305948,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2244,4992018770626388292,17062868996690305948,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,4992018770626388292,17062868996690305948,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,4992018770626388292,17062868996690305948,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2244,4992018770626388292,17062868996690305948,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 /prefetch:82⤵PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2244,4992018770626388292,17062868996690305948,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,4992018770626388292,17062868996690305948,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,4992018770626388292,17062868996690305948,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,4992018770626388292,17062868996690305948,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,4992018770626388292,17062868996690305948,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2244,4992018770626388292,17062868996690305948,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3940 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1892
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5068
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
276B
MD563e94862b42530f86676ad4d8dad984d
SHA13fd2230f79711e641c7d8bc1fc8f6d671319aec8
SHA25602bd271fbf1d8f8cfeb229ec24d7bfb1c261116853c2e66a3f5d0b3536f59a25
SHA5128f57ba1d96f3a97a7867f7eb43efd22baea3a78766fd88e87affcbc1e2e1699de833cbe9d78d22fa784ebf9602bd2006ee315ea13aebbcb79b56ec137c7a5aff
-
Filesize
5KB
MD5c9c7c65be623ea21b1b4ae8a0e43f0ac
SHA13072e7549598ac03f0f0004c6855a283cee0785a
SHA256efb704718239e9982ed50e87c6b906556b9532f7c21802c8f5531faae33a60d1
SHA512247f664d153aa6aea66f290aeac56a6b2133f8d4942a761fd23dfe5cb837301e6cfdfdfe35dad258bb78b87fa1a6737ffb5fbd0beb3bdbdae93e226a8b17306a
-
Filesize
6KB
MD5eb0af19d0382378303f826f73ad8567c
SHA19722fac51589704ec4a717bcc7905f2f87557d8c
SHA256bde5818b06bb4a8849f8b72252ed128477faa58201875db756fd465de5cdc29f
SHA5123d11204b32be2d7be92cefbac85e0700ead4ebcdb02c73cdad9e62e9cb0e98c50757aa1af2f76faab81aa1f3562607e7cbbb354603433324aba02ae643fb2b3f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52202fca1d665cd8355d443904030c1ea
SHA1eca25dc084bdf62f3398aced35d8f985c2ab8ee8
SHA256a851ffb741bae1b7a3d5b126d1c27613fa58b8929f5747565348baba7ff54bcb
SHA5125b1c64677aeac9d0aa3f69ab7eb173c15b2167f4065a81969180f72ce8b81094f017476e08f38df7d2c2f48d56e13b8e61cf73ee34a9a59c462a3001159164c7