Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 07:36
Static task
static1
Behavioral task
behavioral1
Sample
94056c03ce9e251bfd1267da46658df2_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
94056c03ce9e251bfd1267da46658df2_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
94056c03ce9e251bfd1267da46658df2_JaffaCakes118.html
-
Size
115KB
-
MD5
94056c03ce9e251bfd1267da46658df2
-
SHA1
36f40c0f29accedf51b574eb08aa4d5456c8238c
-
SHA256
f53ec3bfb19a8e585a2e3f858fc5b1f6763f35ea3a19990663dafa9c3e18334f
-
SHA512
d35dc6a889d7f39ca3bc22b68f810e1580ec202433f8f8c79dbe238510e51389670e9e960089d8b2525ffc0c95d0d8207aaf3689ec7a55ff9ee14986e74f8ec2
-
SSDEEP
1536:fRmzCzKAylfJ8CxeV/O2YQU2/d2Fn20y21r2182KBjEn/PHcCgvJJO2RRjaud:MsV/O2YQUcdWn3yurO8XBj6TgvJJO2V
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 980 msedge.exe 980 msedge.exe 3564 msedge.exe 3564 msedge.exe 3920 identity_helper.exe 3920 identity_helper.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3564 wrote to memory of 1952 3564 msedge.exe 81 PID 3564 wrote to memory of 1952 3564 msedge.exe 81 PID 3564 wrote to memory of 2308 3564 msedge.exe 82 PID 3564 wrote to memory of 2308 3564 msedge.exe 82 PID 3564 wrote to memory of 2308 3564 msedge.exe 82 PID 3564 wrote to memory of 2308 3564 msedge.exe 82 PID 3564 wrote to memory of 2308 3564 msedge.exe 82 PID 3564 wrote to memory of 2308 3564 msedge.exe 82 PID 3564 wrote to memory of 2308 3564 msedge.exe 82 PID 3564 wrote to memory of 2308 3564 msedge.exe 82 PID 3564 wrote to memory of 2308 3564 msedge.exe 82 PID 3564 wrote to memory of 2308 3564 msedge.exe 82 PID 3564 wrote to memory of 2308 3564 msedge.exe 82 PID 3564 wrote to memory of 2308 3564 msedge.exe 82 PID 3564 wrote to memory of 2308 3564 msedge.exe 82 PID 3564 wrote to memory of 2308 3564 msedge.exe 82 PID 3564 wrote to memory of 2308 3564 msedge.exe 82 PID 3564 wrote to memory of 2308 3564 msedge.exe 82 PID 3564 wrote to memory of 2308 3564 msedge.exe 82 PID 3564 wrote to memory of 2308 3564 msedge.exe 82 PID 3564 wrote to memory of 2308 3564 msedge.exe 82 PID 3564 wrote to memory of 2308 3564 msedge.exe 82 PID 3564 wrote to memory of 2308 3564 msedge.exe 82 PID 3564 wrote to memory of 2308 3564 msedge.exe 82 PID 3564 wrote to memory of 2308 3564 msedge.exe 82 PID 3564 wrote to memory of 2308 3564 msedge.exe 82 PID 3564 wrote to memory of 2308 3564 msedge.exe 82 PID 3564 wrote to memory of 2308 3564 msedge.exe 82 PID 3564 wrote to memory of 2308 3564 msedge.exe 82 PID 3564 wrote to memory of 2308 3564 msedge.exe 82 PID 3564 wrote to memory of 2308 3564 msedge.exe 82 PID 3564 wrote to memory of 2308 3564 msedge.exe 82 PID 3564 wrote to memory of 2308 3564 msedge.exe 82 PID 3564 wrote to memory of 2308 3564 msedge.exe 82 PID 3564 wrote to memory of 2308 3564 msedge.exe 82 PID 3564 wrote to memory of 2308 3564 msedge.exe 82 PID 3564 wrote to memory of 2308 3564 msedge.exe 82 PID 3564 wrote to memory of 2308 3564 msedge.exe 82 PID 3564 wrote to memory of 2308 3564 msedge.exe 82 PID 3564 wrote to memory of 2308 3564 msedge.exe 82 PID 3564 wrote to memory of 2308 3564 msedge.exe 82 PID 3564 wrote to memory of 2308 3564 msedge.exe 82 PID 3564 wrote to memory of 980 3564 msedge.exe 83 PID 3564 wrote to memory of 980 3564 msedge.exe 83 PID 3564 wrote to memory of 4844 3564 msedge.exe 84 PID 3564 wrote to memory of 4844 3564 msedge.exe 84 PID 3564 wrote to memory of 4844 3564 msedge.exe 84 PID 3564 wrote to memory of 4844 3564 msedge.exe 84 PID 3564 wrote to memory of 4844 3564 msedge.exe 84 PID 3564 wrote to memory of 4844 3564 msedge.exe 84 PID 3564 wrote to memory of 4844 3564 msedge.exe 84 PID 3564 wrote to memory of 4844 3564 msedge.exe 84 PID 3564 wrote to memory of 4844 3564 msedge.exe 84 PID 3564 wrote to memory of 4844 3564 msedge.exe 84 PID 3564 wrote to memory of 4844 3564 msedge.exe 84 PID 3564 wrote to memory of 4844 3564 msedge.exe 84 PID 3564 wrote to memory of 4844 3564 msedge.exe 84 PID 3564 wrote to memory of 4844 3564 msedge.exe 84 PID 3564 wrote to memory of 4844 3564 msedge.exe 84 PID 3564 wrote to memory of 4844 3564 msedge.exe 84 PID 3564 wrote to memory of 4844 3564 msedge.exe 84 PID 3564 wrote to memory of 4844 3564 msedge.exe 84 PID 3564 wrote to memory of 4844 3564 msedge.exe 84 PID 3564 wrote to memory of 4844 3564 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\94056c03ce9e251bfd1267da46658df2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f93d46f8,0x7ff8f93d4708,0x7ff8f93d47182⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,18289708658815729303,2975674516626778935,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,18289708658815729303,2975674516626778935,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,18289708658815729303,2975674516626778935,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,18289708658815729303,2975674516626778935,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,18289708658815729303,2975674516626778935,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,18289708658815729303,2975674516626778935,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:82⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,18289708658815729303,2975674516626778935,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,18289708658815729303,2975674516626778935,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:12⤵PID:1244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,18289708658815729303,2975674516626778935,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,18289708658815729303,2975674516626778935,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4888 /prefetch:12⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,18289708658815729303,2975674516626778935,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,18289708658815729303,2975674516626778935,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4060 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4976
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4908
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3844
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
801B
MD559eba97e71fefef9d23257b6c4f38ee6
SHA1e848271f9af0a976f24a7b965e1d9b7b20ca6869
SHA256ff1fb5b5fc151ffbf58f1eae326dc0d844911b09c49e903a9445baa350671241
SHA5127693d799dbdf8340e97ddafe8f853aa8e4f4df4bbf473a9ddaca7e80f3d6f1fa264be0d0d300c378be1568276541fcb87f03083eae6e45b8d88be4a42f6bf5bc
-
Filesize
5KB
MD54c045eca68ea06577722cb20c888bc1a
SHA15df5bf4654286b5b276e94271bd5635068603924
SHA2567f92639412e2d380eed1c6cf55341ab41ac51f1a966e70ff0cdf591a45e618d9
SHA512bee094c1cda7409e84063bed1530b815e41591f5081c546d25179f87136e43bfffe07323d71a6a005b22199c13c1cea18fc701de0a8a28225f89bd5a10c5a2c6
-
Filesize
6KB
MD59f0ac780d691c37bb8499ec9ef8cdb18
SHA16d82505823bac029c7861148761e45e3475ac5ea
SHA256ff4d3a7ec7e9b9110505a3e56e426e02c64051eec92f2c9be1a62cb46ea2442d
SHA51286fadefacf2e3f0fa299327f11e72047ee44f5e7af7c2b08764ff9e8af19104c19f761b1baf67e74419816651a96b96666529554c019e4b4fe172fae8f19abb7
-
Filesize
6KB
MD529d20fa7b43a805badcba96bb63f513f
SHA1a08a81b9210e28df3776f26bb0ef897839d8f955
SHA2561b2ab1ec4ab7ccf82bfdb2e5df26b32cf06ed3345e3d9f0402ebd0fcff154af8
SHA5129f2be0cbaaa3f623eb3d587e64d93f04ec6674ab2bb450308ef76654459cb10e29e8eddf16640166d9ceb236a89255754632c2ce191902bd29a0c66508e87301
-
Filesize
371B
MD531b1478264b92e3bee84f575a4ef583d
SHA1b8a269c1c22c1c7ca867dce7f1633448556eabb6
SHA256422ced6aa1b0757a42c23af73368e8dc496cf3191bc48eae477927c560e27202
SHA512a59f00c10d82367fe87552ce1b693fc10f8d4aa242846ae65bd668fed52973db66d1474f789006d24ad7c212e719c0aa8f74b596d87146e5851fd77ec7c09abf
-
Filesize
37B
MD5661760f65468e15dd28c1fd21fb55e6d
SHA1207638003735c9b113b1f47bb043cdcdbf4b0b5f
SHA2560a5f22651f8fe6179e924a10a444b7c394c56e1ed6015d3fc336198252984c0e
SHA5126454c5f69a2d7d7f0df4f066f539561c365bb6b14c466f282a99bf1116b72d757bef0bf03a0e0c68a7538a02a993fc070c52133ca2162c8496017053194f441c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD543cc6ca73cc888f7ca35a9cc4d18b714
SHA1e81bcd2cc04d9e5857b9ea325633bc669bfdd999
SHA2569885450ab5534166f9c1b6baf3b22a7f05d13f918eb7588fa55e023b6c36a738
SHA5129409bef4f30dc7a08b5292e231ace733e441f11d6a5a2c43bd9340aedcdd98a525a910ce8eda098eabfdda597a2465ba8546f11e5bba443ad63a17e1bd1b7f2c