Analysis
-
max time kernel
145s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 04:15
Static task
static1
Behavioral task
behavioral1
Sample
93976f1b5fff29fcf59c45174c809cd0_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
93976f1b5fff29fcf59c45174c809cd0_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
93976f1b5fff29fcf59c45174c809cd0_JaffaCakes118.html
-
Size
27KB
-
MD5
93976f1b5fff29fcf59c45174c809cd0
-
SHA1
56619bec714ab2a417018943cf5f99fb4b46b981
-
SHA256
53e6a0a4d9aaf89db93b6d0d0dea155d68c25938da216d05cab2e83e12946ba9
-
SHA512
7fd3f37c5379a7b4aba88b99ccd6df5975af107be500303bd3540c1903d9b93f56c3ad7326b5f0ae774e4de762fcd4d1023268c426744b4117f4021f610f222d
-
SSDEEP
192:uwHsb5nl6nQjxn5Q/4nQiezNnanQOkEntcCnQTbndnQ9e//m6MXRvQl7MBTqnYnH:cQ/gihgRuS5yK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3520 msedge.exe 3520 msedge.exe 1432 msedge.exe 1432 msedge.exe 4280 identity_helper.exe 4280 identity_helper.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1432 wrote to memory of 1916 1432 msedge.exe 82 PID 1432 wrote to memory of 1916 1432 msedge.exe 82 PID 1432 wrote to memory of 3344 1432 msedge.exe 84 PID 1432 wrote to memory of 3344 1432 msedge.exe 84 PID 1432 wrote to memory of 3344 1432 msedge.exe 84 PID 1432 wrote to memory of 3344 1432 msedge.exe 84 PID 1432 wrote to memory of 3344 1432 msedge.exe 84 PID 1432 wrote to memory of 3344 1432 msedge.exe 84 PID 1432 wrote to memory of 3344 1432 msedge.exe 84 PID 1432 wrote to memory of 3344 1432 msedge.exe 84 PID 1432 wrote to memory of 3344 1432 msedge.exe 84 PID 1432 wrote to memory of 3344 1432 msedge.exe 84 PID 1432 wrote to memory of 3344 1432 msedge.exe 84 PID 1432 wrote to memory of 3344 1432 msedge.exe 84 PID 1432 wrote to memory of 3344 1432 msedge.exe 84 PID 1432 wrote to memory of 3344 1432 msedge.exe 84 PID 1432 wrote to memory of 3344 1432 msedge.exe 84 PID 1432 wrote to memory of 3344 1432 msedge.exe 84 PID 1432 wrote to memory of 3344 1432 msedge.exe 84 PID 1432 wrote to memory of 3344 1432 msedge.exe 84 PID 1432 wrote to memory of 3344 1432 msedge.exe 84 PID 1432 wrote to memory of 3344 1432 msedge.exe 84 PID 1432 wrote to memory of 3344 1432 msedge.exe 84 PID 1432 wrote to memory of 3344 1432 msedge.exe 84 PID 1432 wrote to memory of 3344 1432 msedge.exe 84 PID 1432 wrote to memory of 3344 1432 msedge.exe 84 PID 1432 wrote to memory of 3344 1432 msedge.exe 84 PID 1432 wrote to memory of 3344 1432 msedge.exe 84 PID 1432 wrote to memory of 3344 1432 msedge.exe 84 PID 1432 wrote to memory of 3344 1432 msedge.exe 84 PID 1432 wrote to memory of 3344 1432 msedge.exe 84 PID 1432 wrote to memory of 3344 1432 msedge.exe 84 PID 1432 wrote to memory of 3344 1432 msedge.exe 84 PID 1432 wrote to memory of 3344 1432 msedge.exe 84 PID 1432 wrote to memory of 3344 1432 msedge.exe 84 PID 1432 wrote to memory of 3344 1432 msedge.exe 84 PID 1432 wrote to memory of 3344 1432 msedge.exe 84 PID 1432 wrote to memory of 3344 1432 msedge.exe 84 PID 1432 wrote to memory of 3344 1432 msedge.exe 84 PID 1432 wrote to memory of 3344 1432 msedge.exe 84 PID 1432 wrote to memory of 3344 1432 msedge.exe 84 PID 1432 wrote to memory of 3344 1432 msedge.exe 84 PID 1432 wrote to memory of 3520 1432 msedge.exe 85 PID 1432 wrote to memory of 3520 1432 msedge.exe 85 PID 1432 wrote to memory of 3456 1432 msedge.exe 86 PID 1432 wrote to memory of 3456 1432 msedge.exe 86 PID 1432 wrote to memory of 3456 1432 msedge.exe 86 PID 1432 wrote to memory of 3456 1432 msedge.exe 86 PID 1432 wrote to memory of 3456 1432 msedge.exe 86 PID 1432 wrote to memory of 3456 1432 msedge.exe 86 PID 1432 wrote to memory of 3456 1432 msedge.exe 86 PID 1432 wrote to memory of 3456 1432 msedge.exe 86 PID 1432 wrote to memory of 3456 1432 msedge.exe 86 PID 1432 wrote to memory of 3456 1432 msedge.exe 86 PID 1432 wrote to memory of 3456 1432 msedge.exe 86 PID 1432 wrote to memory of 3456 1432 msedge.exe 86 PID 1432 wrote to memory of 3456 1432 msedge.exe 86 PID 1432 wrote to memory of 3456 1432 msedge.exe 86 PID 1432 wrote to memory of 3456 1432 msedge.exe 86 PID 1432 wrote to memory of 3456 1432 msedge.exe 86 PID 1432 wrote to memory of 3456 1432 msedge.exe 86 PID 1432 wrote to memory of 3456 1432 msedge.exe 86 PID 1432 wrote to memory of 3456 1432 msedge.exe 86 PID 1432 wrote to memory of 3456 1432 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\93976f1b5fff29fcf59c45174c809cd0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd6fe746f8,0x7ffd6fe74708,0x7ffd6fe747182⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,18257968271948915207,8324277751021998237,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,18257968271948915207,8324277751021998237,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,18257968271948915207,8324277751021998237,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18257968271948915207,8324277751021998237,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18257968271948915207,8324277751021998237,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,18257968271948915207,8324277751021998237,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 /prefetch:82⤵PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,18257968271948915207,8324277751021998237,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18257968271948915207,8324277751021998237,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4176 /prefetch:12⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18257968271948915207,8324277751021998237,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18257968271948915207,8324277751021998237,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:1548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18257968271948915207,8324277751021998237,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,18257968271948915207,8324277751021998237,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5364 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4900
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2084
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
5KB
MD574569f891b64a9fa779a1fb16bbdd296
SHA15786590bc97cd61cbeac661ece112fdbbf787f14
SHA256de76c89665c4242d15efe19af48ca2a6a351abf53eb0ba7bd09cca39aba6140b
SHA5121bcd494dd6feb2b46d6a95026d95e5a82babca85736abab59659a82374529fa0c9fb1c684a9b3b58e41edc948e31f5b4db01b12db0f8c01b21985b6b17c48b17
-
Filesize
6KB
MD519d8b2415888d27b4d5d5e47c46c9f05
SHA152704f51805d1ff001d65b3f152c2955cd3c43d0
SHA256ea1ff4aa078400805868c66030e75bf86c9c821853d87c01a26e1e6b8dc8ecd6
SHA51272111ae9af109cc1ac57d8f99d8c0cfdafb6562417129ee3ae1cd56c7e022126eb6e1e4822bee373b55c45a8f6165e419a2a1584a623213e23dd62cc2d3e524c
-
Filesize
6KB
MD56021a511dbce3a6295a8b540012e6504
SHA1b258db7f48dd80d00777d34ad49a2211e5376c11
SHA2563ec0e7ae8f64f4de6a76c761718da95cc3db9420ed45b27d68e1010eb82320ce
SHA51286fe0cabd323fbdbc311e1c42511d04cc6dd5d4b423a5a9d5710619a089d69c112d5eff257c534506655da74d502568af39ca953c1512c43bbacafd1f0effb24
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD587e9ef24252e2d218ba578e09b9562e3
SHA13300e8de62be78f1cab12c3bd35f10afb855b974
SHA2566105fb1d55d852b93592fd3470be20ab271e1b8c888fa2e6a13fd0258573c5c8
SHA512313da2f428a50659b5f45f04629cf057d3af511bc295fa811e450c0f2c3619aaae1e38af9cb07499bc15a0e41c8e181c618a98045c11a851d4eaacdccab35a13