Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2024 00:01
Static task
static1
Behavioral task
behavioral1
Sample
930f51b5bade6d7b2ae88260778b4b9c_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
930f51b5bade6d7b2ae88260778b4b9c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
930f51b5bade6d7b2ae88260778b4b9c_JaffaCakes118.html
-
Size
460KB
-
MD5
930f51b5bade6d7b2ae88260778b4b9c
-
SHA1
d67a8df390ed25fb1358547c0b352a01d315d634
-
SHA256
623480897f2132b9329576d580420f0fc594c1869b57974c9b0b5e9b124e1d58
-
SHA512
f5862f1c38a2a69ea58bd24108deea2b3eb5967078bc7d5171d41266056df3c0e44b039c42fdb5203871164399904e104a193d1e2c0780589d551197bc39dc64
-
SSDEEP
6144:S1sMYod+X3oI+YQsMYod+X3oI+YvsMYod+X3oI+YLsMYod+X3oI+YQ:k5d+X3M5d+X3R5d+X315d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1984 msedge.exe 1984 msedge.exe 2752 msedge.exe 2752 msedge.exe 3176 identity_helper.exe 3176 identity_helper.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2752 wrote to memory of 2316 2752 msedge.exe 81 PID 2752 wrote to memory of 2316 2752 msedge.exe 81 PID 2752 wrote to memory of 3008 2752 msedge.exe 82 PID 2752 wrote to memory of 3008 2752 msedge.exe 82 PID 2752 wrote to memory of 3008 2752 msedge.exe 82 PID 2752 wrote to memory of 3008 2752 msedge.exe 82 PID 2752 wrote to memory of 3008 2752 msedge.exe 82 PID 2752 wrote to memory of 3008 2752 msedge.exe 82 PID 2752 wrote to memory of 3008 2752 msedge.exe 82 PID 2752 wrote to memory of 3008 2752 msedge.exe 82 PID 2752 wrote to memory of 3008 2752 msedge.exe 82 PID 2752 wrote to memory of 3008 2752 msedge.exe 82 PID 2752 wrote to memory of 3008 2752 msedge.exe 82 PID 2752 wrote to memory of 3008 2752 msedge.exe 82 PID 2752 wrote to memory of 3008 2752 msedge.exe 82 PID 2752 wrote to memory of 3008 2752 msedge.exe 82 PID 2752 wrote to memory of 3008 2752 msedge.exe 82 PID 2752 wrote to memory of 3008 2752 msedge.exe 82 PID 2752 wrote to memory of 3008 2752 msedge.exe 82 PID 2752 wrote to memory of 3008 2752 msedge.exe 82 PID 2752 wrote to memory of 3008 2752 msedge.exe 82 PID 2752 wrote to memory of 3008 2752 msedge.exe 82 PID 2752 wrote to memory of 3008 2752 msedge.exe 82 PID 2752 wrote to memory of 3008 2752 msedge.exe 82 PID 2752 wrote to memory of 3008 2752 msedge.exe 82 PID 2752 wrote to memory of 3008 2752 msedge.exe 82 PID 2752 wrote to memory of 3008 2752 msedge.exe 82 PID 2752 wrote to memory of 3008 2752 msedge.exe 82 PID 2752 wrote to memory of 3008 2752 msedge.exe 82 PID 2752 wrote to memory of 3008 2752 msedge.exe 82 PID 2752 wrote to memory of 3008 2752 msedge.exe 82 PID 2752 wrote to memory of 3008 2752 msedge.exe 82 PID 2752 wrote to memory of 3008 2752 msedge.exe 82 PID 2752 wrote to memory of 3008 2752 msedge.exe 82 PID 2752 wrote to memory of 3008 2752 msedge.exe 82 PID 2752 wrote to memory of 3008 2752 msedge.exe 82 PID 2752 wrote to memory of 3008 2752 msedge.exe 82 PID 2752 wrote to memory of 3008 2752 msedge.exe 82 PID 2752 wrote to memory of 3008 2752 msedge.exe 82 PID 2752 wrote to memory of 3008 2752 msedge.exe 82 PID 2752 wrote to memory of 3008 2752 msedge.exe 82 PID 2752 wrote to memory of 3008 2752 msedge.exe 82 PID 2752 wrote to memory of 1984 2752 msedge.exe 83 PID 2752 wrote to memory of 1984 2752 msedge.exe 83 PID 2752 wrote to memory of 1968 2752 msedge.exe 84 PID 2752 wrote to memory of 1968 2752 msedge.exe 84 PID 2752 wrote to memory of 1968 2752 msedge.exe 84 PID 2752 wrote to memory of 1968 2752 msedge.exe 84 PID 2752 wrote to memory of 1968 2752 msedge.exe 84 PID 2752 wrote to memory of 1968 2752 msedge.exe 84 PID 2752 wrote to memory of 1968 2752 msedge.exe 84 PID 2752 wrote to memory of 1968 2752 msedge.exe 84 PID 2752 wrote to memory of 1968 2752 msedge.exe 84 PID 2752 wrote to memory of 1968 2752 msedge.exe 84 PID 2752 wrote to memory of 1968 2752 msedge.exe 84 PID 2752 wrote to memory of 1968 2752 msedge.exe 84 PID 2752 wrote to memory of 1968 2752 msedge.exe 84 PID 2752 wrote to memory of 1968 2752 msedge.exe 84 PID 2752 wrote to memory of 1968 2752 msedge.exe 84 PID 2752 wrote to memory of 1968 2752 msedge.exe 84 PID 2752 wrote to memory of 1968 2752 msedge.exe 84 PID 2752 wrote to memory of 1968 2752 msedge.exe 84 PID 2752 wrote to memory of 1968 2752 msedge.exe 84 PID 2752 wrote to memory of 1968 2752 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\930f51b5bade6d7b2ae88260778b4b9c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa5ce246f8,0x7ffa5ce24708,0x7ffa5ce247182⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,4339829477296463887,10477708530844881067,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,4339829477296463887,10477708530844881067,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,4339829477296463887,10477708530844881067,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,4339829477296463887,10477708530844881067,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,4339829477296463887,10477708530844881067,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,4339829477296463887,10477708530844881067,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,4339829477296463887,10477708530844881067,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,4339829477296463887,10477708530844881067,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,4339829477296463887,10477708530844881067,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,4339829477296463887,10477708530844881067,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:12⤵PID:3676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,4339829477296463887,10477708530844881067,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,4339829477296463887,10477708530844881067,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4652
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4072
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD5866e5f9837da919d923affe7fe793d45
SHA17ce093b639794988fa8fbbe990be722bdecb2534
SHA25672268f5d1e9cabcc6696ad30287b46be3416de978fb7ea6f8b9fc59f6e634e9c
SHA512952de553157fbca4b6893e5dadf40690dacf3892a7bc3376d02f04c0fb0d51be00ee3d2e597359b716932d19c1ff4abc49afdae503f3d4bc3816412c5c2d5f8d
-
Filesize
6KB
MD5935b599c9eafcc171371bc08320fddbb
SHA15865d84b0634ee3e13ac3a7f02507b48db042121
SHA256de98389f604d79c5e0fdcfe722b7836a707a5e564d694199c421d03e0a813208
SHA51296b2c9840242b2a4a70bcd2c785a0bdd748de512ac6659ba582b399f27517960af88a4a6c3088bf1f54682fbe6fb9ca78562a10fb86eaccfe147b2791ab045ec
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5b76e0cb98ef58c4dda361e03b832e6a8
SHA118679ac7d1ffc695fc1c8f64e1940aeef3dac42f
SHA2565ed90febdb1c40625fc861e3f8fe9058b32c146d1aa764f70f67297847d8f26e
SHA51286274f6462b99c751c18214618dba187f3cc557f087a3a92e858b63eafe90f90e9e3740acbfac6bbc44fd4b08c399983d196696237b9f0b63ebd5033e1df09ff