Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 14:46
Static task
static1
Behavioral task
behavioral1
Sample
953d8faba3f2c2cfc7b0e0fb62d0fa45_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
953d8faba3f2c2cfc7b0e0fb62d0fa45_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
953d8faba3f2c2cfc7b0e0fb62d0fa45_JaffaCakes118.html
-
Size
3KB
-
MD5
953d8faba3f2c2cfc7b0e0fb62d0fa45
-
SHA1
570901a79884fec2fe44cabe212df50770facae7
-
SHA256
3bae0986ad4d393b7b51169bf0f8103fafc36e2e4776da6eba5ae792f9024241
-
SHA512
6782e8cfeb774f03e03d7eb5a8a24d2dadf2341f07d35514e01897056ce9dfea2031ee5dd2c025e2c5ec2b7702684a86fd47fb61eb1bc7cf9c8fd1f20386a38e
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2208 msedge.exe 2208 msedge.exe 2332 msedge.exe 2332 msedge.exe 3064 identity_helper.exe 3064 identity_helper.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2332 wrote to memory of 1824 2332 msedge.exe 82 PID 2332 wrote to memory of 1824 2332 msedge.exe 82 PID 2332 wrote to memory of 2144 2332 msedge.exe 83 PID 2332 wrote to memory of 2144 2332 msedge.exe 83 PID 2332 wrote to memory of 2144 2332 msedge.exe 83 PID 2332 wrote to memory of 2144 2332 msedge.exe 83 PID 2332 wrote to memory of 2144 2332 msedge.exe 83 PID 2332 wrote to memory of 2144 2332 msedge.exe 83 PID 2332 wrote to memory of 2144 2332 msedge.exe 83 PID 2332 wrote to memory of 2144 2332 msedge.exe 83 PID 2332 wrote to memory of 2144 2332 msedge.exe 83 PID 2332 wrote to memory of 2144 2332 msedge.exe 83 PID 2332 wrote to memory of 2144 2332 msedge.exe 83 PID 2332 wrote to memory of 2144 2332 msedge.exe 83 PID 2332 wrote to memory of 2144 2332 msedge.exe 83 PID 2332 wrote to memory of 2144 2332 msedge.exe 83 PID 2332 wrote to memory of 2144 2332 msedge.exe 83 PID 2332 wrote to memory of 2144 2332 msedge.exe 83 PID 2332 wrote to memory of 2144 2332 msedge.exe 83 PID 2332 wrote to memory of 2144 2332 msedge.exe 83 PID 2332 wrote to memory of 2144 2332 msedge.exe 83 PID 2332 wrote to memory of 2144 2332 msedge.exe 83 PID 2332 wrote to memory of 2144 2332 msedge.exe 83 PID 2332 wrote to memory of 2144 2332 msedge.exe 83 PID 2332 wrote to memory of 2144 2332 msedge.exe 83 PID 2332 wrote to memory of 2144 2332 msedge.exe 83 PID 2332 wrote to memory of 2144 2332 msedge.exe 83 PID 2332 wrote to memory of 2144 2332 msedge.exe 83 PID 2332 wrote to memory of 2144 2332 msedge.exe 83 PID 2332 wrote to memory of 2144 2332 msedge.exe 83 PID 2332 wrote to memory of 2144 2332 msedge.exe 83 PID 2332 wrote to memory of 2144 2332 msedge.exe 83 PID 2332 wrote to memory of 2144 2332 msedge.exe 83 PID 2332 wrote to memory of 2144 2332 msedge.exe 83 PID 2332 wrote to memory of 2144 2332 msedge.exe 83 PID 2332 wrote to memory of 2144 2332 msedge.exe 83 PID 2332 wrote to memory of 2144 2332 msedge.exe 83 PID 2332 wrote to memory of 2144 2332 msedge.exe 83 PID 2332 wrote to memory of 2144 2332 msedge.exe 83 PID 2332 wrote to memory of 2144 2332 msedge.exe 83 PID 2332 wrote to memory of 2144 2332 msedge.exe 83 PID 2332 wrote to memory of 2144 2332 msedge.exe 83 PID 2332 wrote to memory of 2208 2332 msedge.exe 84 PID 2332 wrote to memory of 2208 2332 msedge.exe 84 PID 2332 wrote to memory of 4552 2332 msedge.exe 85 PID 2332 wrote to memory of 4552 2332 msedge.exe 85 PID 2332 wrote to memory of 4552 2332 msedge.exe 85 PID 2332 wrote to memory of 4552 2332 msedge.exe 85 PID 2332 wrote to memory of 4552 2332 msedge.exe 85 PID 2332 wrote to memory of 4552 2332 msedge.exe 85 PID 2332 wrote to memory of 4552 2332 msedge.exe 85 PID 2332 wrote to memory of 4552 2332 msedge.exe 85 PID 2332 wrote to memory of 4552 2332 msedge.exe 85 PID 2332 wrote to memory of 4552 2332 msedge.exe 85 PID 2332 wrote to memory of 4552 2332 msedge.exe 85 PID 2332 wrote to memory of 4552 2332 msedge.exe 85 PID 2332 wrote to memory of 4552 2332 msedge.exe 85 PID 2332 wrote to memory of 4552 2332 msedge.exe 85 PID 2332 wrote to memory of 4552 2332 msedge.exe 85 PID 2332 wrote to memory of 4552 2332 msedge.exe 85 PID 2332 wrote to memory of 4552 2332 msedge.exe 85 PID 2332 wrote to memory of 4552 2332 msedge.exe 85 PID 2332 wrote to memory of 4552 2332 msedge.exe 85 PID 2332 wrote to memory of 4552 2332 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\953d8faba3f2c2cfc7b0e0fb62d0fa45_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9e90546f8,0x7ff9e9054708,0x7ff9e90547182⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,11141745907123527916,3457621181911045379,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:22⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,11141745907123527916,3457621181911045379,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,11141745907123527916,3457621181911045379,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,11141745907123527916,3457621181911045379,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,11141745907123527916,3457621181911045379,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,11141745907123527916,3457621181911045379,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,11141745907123527916,3457621181911045379,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,11141745907123527916,3457621181911045379,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,11141745907123527916,3457621181911045379,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:1740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,11141745907123527916,3457621181911045379,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,11141745907123527916,3457621181911045379,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,11141745907123527916,3457621181911045379,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3064 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1040
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1372
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4472
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\0af9210a-001b-4f66-ad88-b3a8e7e3660a.tmp
Filesize6KB
MD546a652bb76054f31985dee522537dc7a
SHA13d6e34660d0628ae7260376194a2863ead0a1e2c
SHA256fdcfd4e219fcf1e00991f81ff2c3bbfca530b2c4d1e750019370c55d7c5cd42c
SHA512769310baef228206cd113818e0501db25bd850d1d1de2715370003de7ec307f9345ab2cfdfbdc93a2982a83ef789252a8e614a8b27436f04e68be66b201241c1
-
Filesize
276B
MD563e94862b42530f86676ad4d8dad984d
SHA13fd2230f79711e641c7d8bc1fc8f6d671319aec8
SHA25602bd271fbf1d8f8cfeb229ec24d7bfb1c261116853c2e66a3f5d0b3536f59a25
SHA5128f57ba1d96f3a97a7867f7eb43efd22baea3a78766fd88e87affcbc1e2e1699de833cbe9d78d22fa784ebf9602bd2006ee315ea13aebbcb79b56ec137c7a5aff
-
Filesize
5KB
MD5fee663da5e5a350c47849d3230640b78
SHA137cc509f5dbb6b2d22e654ddd5004ec5d66b7d8c
SHA256139b5a7eba7500fec67a517ca9e16025ce5f60e82c17f76c2f1d6362c3d9a7d5
SHA512e47e2303375165537c8ef1d9b838a5692892c2f47b520cfd92dbcee1ca5627785d9e146b6160c752d3dc031d7e4118fac81e1503bc7c92d7fda2afcdb66df3a7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD59ea6fc55ec9e15eaf689d919ece61451
SHA1320fec920c2aaaabd2b83b082261f61044f3066c
SHA256c886e858eae464d75fc43abc058fea0334adaba481bb3da1088957416b4587ed
SHA512e3023986efbcfef2b17eac7eed7d483e9871571249f24c21beeceb79e48ea36eb73cd4e20049a3515fdcde658aabf00cd8b986ef60c658dcec0981fdd9dbc253