Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 09:35
Static task
static1
Behavioral task
behavioral1
Sample
945877b28976a6572421fed88977d16b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
945877b28976a6572421fed88977d16b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
945877b28976a6572421fed88977d16b_JaffaCakes118.html
-
Size
19KB
-
MD5
945877b28976a6572421fed88977d16b
-
SHA1
ac82a1ad3a411de9f797b18399e225800881f0cc
-
SHA256
2ecad54d01aa605a9c7897333596850c60b1e1865e73774dc9105b6940ec394c
-
SHA512
784b18252c470994cc11f19aa42f92051af0b89f3c022c3d38a34361561bb1dc66cc67810ea63506feb4bdb616f0a5818704019e79ec6f2dff5cdf7cb62b5f1d
-
SSDEEP
192:9K/ypUhTLiqEWOLTgE9d31IUNKM8CjQ33ChdNIMlUx9V6cxjb79DX+OunUiF8iSg:4/yoTLiRLXfm+Q3iqp55OOunUiOin
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3744 msedge.exe 3744 msedge.exe 3876 msedge.exe 3876 msedge.exe 880 identity_helper.exe 880 identity_helper.exe 5296 msedge.exe 5296 msedge.exe 5296 msedge.exe 5296 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3876 wrote to memory of 4408 3876 msedge.exe 83 PID 3876 wrote to memory of 4408 3876 msedge.exe 83 PID 3876 wrote to memory of 456 3876 msedge.exe 84 PID 3876 wrote to memory of 456 3876 msedge.exe 84 PID 3876 wrote to memory of 456 3876 msedge.exe 84 PID 3876 wrote to memory of 456 3876 msedge.exe 84 PID 3876 wrote to memory of 456 3876 msedge.exe 84 PID 3876 wrote to memory of 456 3876 msedge.exe 84 PID 3876 wrote to memory of 456 3876 msedge.exe 84 PID 3876 wrote to memory of 456 3876 msedge.exe 84 PID 3876 wrote to memory of 456 3876 msedge.exe 84 PID 3876 wrote to memory of 456 3876 msedge.exe 84 PID 3876 wrote to memory of 456 3876 msedge.exe 84 PID 3876 wrote to memory of 456 3876 msedge.exe 84 PID 3876 wrote to memory of 456 3876 msedge.exe 84 PID 3876 wrote to memory of 456 3876 msedge.exe 84 PID 3876 wrote to memory of 456 3876 msedge.exe 84 PID 3876 wrote to memory of 456 3876 msedge.exe 84 PID 3876 wrote to memory of 456 3876 msedge.exe 84 PID 3876 wrote to memory of 456 3876 msedge.exe 84 PID 3876 wrote to memory of 456 3876 msedge.exe 84 PID 3876 wrote to memory of 456 3876 msedge.exe 84 PID 3876 wrote to memory of 456 3876 msedge.exe 84 PID 3876 wrote to memory of 456 3876 msedge.exe 84 PID 3876 wrote to memory of 456 3876 msedge.exe 84 PID 3876 wrote to memory of 456 3876 msedge.exe 84 PID 3876 wrote to memory of 456 3876 msedge.exe 84 PID 3876 wrote to memory of 456 3876 msedge.exe 84 PID 3876 wrote to memory of 456 3876 msedge.exe 84 PID 3876 wrote to memory of 456 3876 msedge.exe 84 PID 3876 wrote to memory of 456 3876 msedge.exe 84 PID 3876 wrote to memory of 456 3876 msedge.exe 84 PID 3876 wrote to memory of 456 3876 msedge.exe 84 PID 3876 wrote to memory of 456 3876 msedge.exe 84 PID 3876 wrote to memory of 456 3876 msedge.exe 84 PID 3876 wrote to memory of 456 3876 msedge.exe 84 PID 3876 wrote to memory of 456 3876 msedge.exe 84 PID 3876 wrote to memory of 456 3876 msedge.exe 84 PID 3876 wrote to memory of 456 3876 msedge.exe 84 PID 3876 wrote to memory of 456 3876 msedge.exe 84 PID 3876 wrote to memory of 456 3876 msedge.exe 84 PID 3876 wrote to memory of 456 3876 msedge.exe 84 PID 3876 wrote to memory of 3744 3876 msedge.exe 85 PID 3876 wrote to memory of 3744 3876 msedge.exe 85 PID 3876 wrote to memory of 4012 3876 msedge.exe 86 PID 3876 wrote to memory of 4012 3876 msedge.exe 86 PID 3876 wrote to memory of 4012 3876 msedge.exe 86 PID 3876 wrote to memory of 4012 3876 msedge.exe 86 PID 3876 wrote to memory of 4012 3876 msedge.exe 86 PID 3876 wrote to memory of 4012 3876 msedge.exe 86 PID 3876 wrote to memory of 4012 3876 msedge.exe 86 PID 3876 wrote to memory of 4012 3876 msedge.exe 86 PID 3876 wrote to memory of 4012 3876 msedge.exe 86 PID 3876 wrote to memory of 4012 3876 msedge.exe 86 PID 3876 wrote to memory of 4012 3876 msedge.exe 86 PID 3876 wrote to memory of 4012 3876 msedge.exe 86 PID 3876 wrote to memory of 4012 3876 msedge.exe 86 PID 3876 wrote to memory of 4012 3876 msedge.exe 86 PID 3876 wrote to memory of 4012 3876 msedge.exe 86 PID 3876 wrote to memory of 4012 3876 msedge.exe 86 PID 3876 wrote to memory of 4012 3876 msedge.exe 86 PID 3876 wrote to memory of 4012 3876 msedge.exe 86 PID 3876 wrote to memory of 4012 3876 msedge.exe 86 PID 3876 wrote to memory of 4012 3876 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\945877b28976a6572421fed88977d16b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff6dc846f8,0x7fff6dc84708,0x7fff6dc847182⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,9387199639167165027,10757582792452089734,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,9387199639167165027,10757582792452089734,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,9387199639167165027,10757582792452089734,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2472 /prefetch:82⤵PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9387199639167165027,10757582792452089734,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9387199639167165027,10757582792452089734,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9387199639167165027,10757582792452089734,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,9387199639167165027,10757582792452089734,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5784 /prefetch:82⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,9387199639167165027,10757582792452089734,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5784 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9387199639167165027,10757582792452089734,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9387199639167165027,10757582792452089734,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9387199639167165027,10757582792452089734,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9387199639167165027,10757582792452089734,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,9387199639167165027,10757582792452089734,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5296
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3660
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
1KB
MD5c95330c93ead5272915f11ac9cb1718b
SHA1ed63a7eba65eb00dc8bd47854ce7753d96f57175
SHA25603a31f8e070eeacd8da55f051769015b603db9d7853ddb71face4c9ce4e98fa2
SHA512dda6f5a133479e78643ec0a27fe5c2ad350881231311b89ae4bd23c2d605017c00e9a1636ef8f3827b400e82765c1d978792fa1c5a633cb45ca43908b6183b8a
-
Filesize
5KB
MD5d40033ad09d7698510fdbce57fe0ddd2
SHA1c2dcfa9ee7dfae729982fa00fcd23a2e3cddac82
SHA2566e8422d65efcac15fa961a7919aac1fe438cb624b705bf9a39ffcb56dd119417
SHA5120ab9b24c28c462940881ec2f2e2a6727bbc245d2556601a3c80ee703ef8f0620eb6a93ab03ec38dfaacd6a3038b41be68d60f18709bf9a0354ad8cd10af99448
-
Filesize
6KB
MD54b864aabaf97ead6c7f216ae659a1e3b
SHA1b5e652abdfc18010c93d2efc241ffe9beb7ad71b
SHA2563b02e16bdc88e6bc4efc20e055249089ad3eeb4a19724806db8bfb7e73da5ede
SHA512d9b0bf5aaf887cbfc98eb4269c902648ddeee1d3e55f1182b40f6262f283c846e599cb2d5b6046fe2c1ac97dacb6d4af29567c5475ee74319fb8c9466527c789
-
Filesize
6KB
MD5b7dc9a6fc3a40f2bf976ec6a24f68020
SHA1d8044c40680d3135d52b10ccbb384c67f2306430
SHA256a4f3fb1f5a549e17d6b07db59cdcb700567b965039e76d1b64fb75c2532d3a1e
SHA512ae8895dd93d6120da5a288e7cb36c786843ecc8f7d540c1f5b66264083c682ed2a3d0a960b31f3225b885be18d39fa41c9166ac1db4e667aaa6690df6c064fc5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5907063f552c79a34e8075e4dd13901fa
SHA109ee1a90fae2b7192dc920b6e052a2566ecd2c05
SHA256328337d346433e4473171912837c837c25495146e171e9cb394e8ab506b53772
SHA512a3880ff2a254642f4aadc04fb5cf63d9573f93b42642153df2d8a28c9c4092f687addd7c9ea2c7d8641eaaa3b78badcccf3cf20d3493b54a2c185e11d6aa09c4