Analysis
-
max time kernel
145s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 17:33
Static task
static1
Behavioral task
behavioral1
Sample
95b2dc538de404e0723f1c9fd81048a9_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
95b2dc538de404e0723f1c9fd81048a9_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
95b2dc538de404e0723f1c9fd81048a9_JaffaCakes118.html
-
Size
58KB
-
MD5
95b2dc538de404e0723f1c9fd81048a9
-
SHA1
798258a1ea9434eb6089b7aa0ee020e4cfd0122d
-
SHA256
6446661c2621f1e739ba69f03af528e650c95491b60520ded343f9c5785b3edc
-
SHA512
0592b884deb27d7e9bcc3f0de7a3112202218e6f301ea6e31396cfb9aedff114d2d0e8e04ba0ec1cb1f3d9b69f84821b4986505ac7de7b4cfad87444d7094d73
-
SSDEEP
1536:EzAlU09NEtK9WzyOoGhFhCaSx+h7pr+8b9EelSoVpdv:UAawG0WzyOxhLC/+lXF
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1892 msedge.exe 1892 msedge.exe 3600 msedge.exe 3600 msedge.exe 4804 identity_helper.exe 4804 identity_helper.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3600 wrote to memory of 968 3600 msedge.exe 83 PID 3600 wrote to memory of 968 3600 msedge.exe 83 PID 3600 wrote to memory of 3892 3600 msedge.exe 84 PID 3600 wrote to memory of 3892 3600 msedge.exe 84 PID 3600 wrote to memory of 3892 3600 msedge.exe 84 PID 3600 wrote to memory of 3892 3600 msedge.exe 84 PID 3600 wrote to memory of 3892 3600 msedge.exe 84 PID 3600 wrote to memory of 3892 3600 msedge.exe 84 PID 3600 wrote to memory of 3892 3600 msedge.exe 84 PID 3600 wrote to memory of 3892 3600 msedge.exe 84 PID 3600 wrote to memory of 3892 3600 msedge.exe 84 PID 3600 wrote to memory of 3892 3600 msedge.exe 84 PID 3600 wrote to memory of 3892 3600 msedge.exe 84 PID 3600 wrote to memory of 3892 3600 msedge.exe 84 PID 3600 wrote to memory of 3892 3600 msedge.exe 84 PID 3600 wrote to memory of 3892 3600 msedge.exe 84 PID 3600 wrote to memory of 3892 3600 msedge.exe 84 PID 3600 wrote to memory of 3892 3600 msedge.exe 84 PID 3600 wrote to memory of 3892 3600 msedge.exe 84 PID 3600 wrote to memory of 3892 3600 msedge.exe 84 PID 3600 wrote to memory of 3892 3600 msedge.exe 84 PID 3600 wrote to memory of 3892 3600 msedge.exe 84 PID 3600 wrote to memory of 3892 3600 msedge.exe 84 PID 3600 wrote to memory of 3892 3600 msedge.exe 84 PID 3600 wrote to memory of 3892 3600 msedge.exe 84 PID 3600 wrote to memory of 3892 3600 msedge.exe 84 PID 3600 wrote to memory of 3892 3600 msedge.exe 84 PID 3600 wrote to memory of 3892 3600 msedge.exe 84 PID 3600 wrote to memory of 3892 3600 msedge.exe 84 PID 3600 wrote to memory of 3892 3600 msedge.exe 84 PID 3600 wrote to memory of 3892 3600 msedge.exe 84 PID 3600 wrote to memory of 3892 3600 msedge.exe 84 PID 3600 wrote to memory of 3892 3600 msedge.exe 84 PID 3600 wrote to memory of 3892 3600 msedge.exe 84 PID 3600 wrote to memory of 3892 3600 msedge.exe 84 PID 3600 wrote to memory of 3892 3600 msedge.exe 84 PID 3600 wrote to memory of 3892 3600 msedge.exe 84 PID 3600 wrote to memory of 3892 3600 msedge.exe 84 PID 3600 wrote to memory of 3892 3600 msedge.exe 84 PID 3600 wrote to memory of 3892 3600 msedge.exe 84 PID 3600 wrote to memory of 3892 3600 msedge.exe 84 PID 3600 wrote to memory of 3892 3600 msedge.exe 84 PID 3600 wrote to memory of 1892 3600 msedge.exe 85 PID 3600 wrote to memory of 1892 3600 msedge.exe 85 PID 3600 wrote to memory of 4792 3600 msedge.exe 86 PID 3600 wrote to memory of 4792 3600 msedge.exe 86 PID 3600 wrote to memory of 4792 3600 msedge.exe 86 PID 3600 wrote to memory of 4792 3600 msedge.exe 86 PID 3600 wrote to memory of 4792 3600 msedge.exe 86 PID 3600 wrote to memory of 4792 3600 msedge.exe 86 PID 3600 wrote to memory of 4792 3600 msedge.exe 86 PID 3600 wrote to memory of 4792 3600 msedge.exe 86 PID 3600 wrote to memory of 4792 3600 msedge.exe 86 PID 3600 wrote to memory of 4792 3600 msedge.exe 86 PID 3600 wrote to memory of 4792 3600 msedge.exe 86 PID 3600 wrote to memory of 4792 3600 msedge.exe 86 PID 3600 wrote to memory of 4792 3600 msedge.exe 86 PID 3600 wrote to memory of 4792 3600 msedge.exe 86 PID 3600 wrote to memory of 4792 3600 msedge.exe 86 PID 3600 wrote to memory of 4792 3600 msedge.exe 86 PID 3600 wrote to memory of 4792 3600 msedge.exe 86 PID 3600 wrote to memory of 4792 3600 msedge.exe 86 PID 3600 wrote to memory of 4792 3600 msedge.exe 86 PID 3600 wrote to memory of 4792 3600 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\95b2dc538de404e0723f1c9fd81048a9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa05d646f8,0x7ffa05d64708,0x7ffa05d647182⤵PID:968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,8752377817175324642,16980651692427009295,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,8752377817175324642,16980651692427009295,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,8752377817175324642,16980651692427009295,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8752377817175324642,16980651692427009295,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8752377817175324642,16980651692427009295,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:2836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,8752377817175324642,16980651692427009295,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4732 /prefetch:82⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,8752377817175324642,16980651692427009295,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4732 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8752377817175324642,16980651692427009295,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8752377817175324642,16980651692427009295,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8752377817175324642,16980651692427009295,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8752377817175324642,16980651692427009295,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:4240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,8752377817175324642,16980651692427009295,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5720 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2364
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4440
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
5KB
MD553d71cb67117e8db3a952e150537aa47
SHA1d53eaee98f2cb25e1d8df4e5f4f20431bf49c88d
SHA2568cd88b0515cd3e195011533d39a5db64a14cc202e44db50c524f4be02f724a0b
SHA512cbdb65d53bd5ce7150c4208069a00257732ae2fb91fca5dde5d86b642153fcc364d6b1f3ff29054cfeca0e8009d0eee5d843e02489b1bcdebe7934b13d0e9c88
-
Filesize
6KB
MD5217e3841ec731cb9386df5cfa51221b2
SHA1c6fc019b45172998bfe97dcf19276b21816397c8
SHA25686c89a4aa1cb9635fbd5c4745a59d27ada96ed04559203a335ef26c0eec6e09d
SHA5125fb929f2018cbec6813e5d01815da178a6d645b0ffc3f4d845cfd3cda952fac9957a91cc397fa6876889e35ef374f808d8e6bf70157c52e4e82e5978ee25927e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD500eeef0c8330961b357f99a9690e916e
SHA123598f01f399af398997d4ac183cb814d0ed79a7
SHA256db70293811f6714fda6dc1f073b8d3c2b7e71061b21aa17644d48fcf3e296706
SHA512851176c0b86c5c0736cf8410f28cdcc2689114c7013f35cbb31876e157b5488d399499e6668aca2bfaf115c4ed31694356aefc5c47e0bf0d2e7c7ae76b8193b6