Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 18:29
Static task
static1
Behavioral task
behavioral1
Sample
95db7bee93e01d7de97d858a0c5a36a5_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
95db7bee93e01d7de97d858a0c5a36a5_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
95db7bee93e01d7de97d858a0c5a36a5_JaffaCakes118.html
-
Size
35KB
-
MD5
95db7bee93e01d7de97d858a0c5a36a5
-
SHA1
f5234d43cb8f948b467a8a81f85eed12fac52cd2
-
SHA256
32865c525a3d38487ec35c487e7069b2bbac8d9afb4335c4858085775faad9e9
-
SHA512
bc096be03c238bd200f7b9051749e272401d6a960f42333016254ef01843aed3bbe1cc1a3b83fba8d9e5c417b336bf4d89ed840fa32c5675d9318bc09ee6dbc3
-
SSDEEP
768:zwx/MDTHP388hARqpZPXRE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6TIZOC6sgg+6lLY:Q/bbJxNVpu0Sx/P8FK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1096 msedge.exe 1096 msedge.exe 1216 msedge.exe 1216 msedge.exe 396 identity_helper.exe 396 identity_helper.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1216 wrote to memory of 2508 1216 msedge.exe 83 PID 1216 wrote to memory of 2508 1216 msedge.exe 83 PID 1216 wrote to memory of 848 1216 msedge.exe 84 PID 1216 wrote to memory of 848 1216 msedge.exe 84 PID 1216 wrote to memory of 848 1216 msedge.exe 84 PID 1216 wrote to memory of 848 1216 msedge.exe 84 PID 1216 wrote to memory of 848 1216 msedge.exe 84 PID 1216 wrote to memory of 848 1216 msedge.exe 84 PID 1216 wrote to memory of 848 1216 msedge.exe 84 PID 1216 wrote to memory of 848 1216 msedge.exe 84 PID 1216 wrote to memory of 848 1216 msedge.exe 84 PID 1216 wrote to memory of 848 1216 msedge.exe 84 PID 1216 wrote to memory of 848 1216 msedge.exe 84 PID 1216 wrote to memory of 848 1216 msedge.exe 84 PID 1216 wrote to memory of 848 1216 msedge.exe 84 PID 1216 wrote to memory of 848 1216 msedge.exe 84 PID 1216 wrote to memory of 848 1216 msedge.exe 84 PID 1216 wrote to memory of 848 1216 msedge.exe 84 PID 1216 wrote to memory of 848 1216 msedge.exe 84 PID 1216 wrote to memory of 848 1216 msedge.exe 84 PID 1216 wrote to memory of 848 1216 msedge.exe 84 PID 1216 wrote to memory of 848 1216 msedge.exe 84 PID 1216 wrote to memory of 848 1216 msedge.exe 84 PID 1216 wrote to memory of 848 1216 msedge.exe 84 PID 1216 wrote to memory of 848 1216 msedge.exe 84 PID 1216 wrote to memory of 848 1216 msedge.exe 84 PID 1216 wrote to memory of 848 1216 msedge.exe 84 PID 1216 wrote to memory of 848 1216 msedge.exe 84 PID 1216 wrote to memory of 848 1216 msedge.exe 84 PID 1216 wrote to memory of 848 1216 msedge.exe 84 PID 1216 wrote to memory of 848 1216 msedge.exe 84 PID 1216 wrote to memory of 848 1216 msedge.exe 84 PID 1216 wrote to memory of 848 1216 msedge.exe 84 PID 1216 wrote to memory of 848 1216 msedge.exe 84 PID 1216 wrote to memory of 848 1216 msedge.exe 84 PID 1216 wrote to memory of 848 1216 msedge.exe 84 PID 1216 wrote to memory of 848 1216 msedge.exe 84 PID 1216 wrote to memory of 848 1216 msedge.exe 84 PID 1216 wrote to memory of 848 1216 msedge.exe 84 PID 1216 wrote to memory of 848 1216 msedge.exe 84 PID 1216 wrote to memory of 848 1216 msedge.exe 84 PID 1216 wrote to memory of 848 1216 msedge.exe 84 PID 1216 wrote to memory of 1096 1216 msedge.exe 85 PID 1216 wrote to memory of 1096 1216 msedge.exe 85 PID 1216 wrote to memory of 2208 1216 msedge.exe 86 PID 1216 wrote to memory of 2208 1216 msedge.exe 86 PID 1216 wrote to memory of 2208 1216 msedge.exe 86 PID 1216 wrote to memory of 2208 1216 msedge.exe 86 PID 1216 wrote to memory of 2208 1216 msedge.exe 86 PID 1216 wrote to memory of 2208 1216 msedge.exe 86 PID 1216 wrote to memory of 2208 1216 msedge.exe 86 PID 1216 wrote to memory of 2208 1216 msedge.exe 86 PID 1216 wrote to memory of 2208 1216 msedge.exe 86 PID 1216 wrote to memory of 2208 1216 msedge.exe 86 PID 1216 wrote to memory of 2208 1216 msedge.exe 86 PID 1216 wrote to memory of 2208 1216 msedge.exe 86 PID 1216 wrote to memory of 2208 1216 msedge.exe 86 PID 1216 wrote to memory of 2208 1216 msedge.exe 86 PID 1216 wrote to memory of 2208 1216 msedge.exe 86 PID 1216 wrote to memory of 2208 1216 msedge.exe 86 PID 1216 wrote to memory of 2208 1216 msedge.exe 86 PID 1216 wrote to memory of 2208 1216 msedge.exe 86 PID 1216 wrote to memory of 2208 1216 msedge.exe 86 PID 1216 wrote to memory of 2208 1216 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\95db7bee93e01d7de97d858a0c5a36a5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdf58f46f8,0x7ffdf58f4708,0x7ffdf58f47182⤵PID:2508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,3990850792701903602,6754414587027198788,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,3990850792701903602,6754414587027198788,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,3990850792701903602,6754414587027198788,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,3990850792701903602,6754414587027198788,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,3990850792701903602,6754414587027198788,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,3990850792701903602,6754414587027198788,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,3990850792701903602,6754414587027198788,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:12⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,3990850792701903602,6754414587027198788,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5872 /prefetch:82⤵PID:1928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,3990850792701903602,6754414587027198788,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5872 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,3990850792701903602,6754414587027198788,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4304 /prefetch:12⤵PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,3990850792701903602,6754414587027198788,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,3990850792701903602,6754414587027198788,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2264 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:468
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1556
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\298bb10d-d5a1-4061-b657-6aa1eeea4043.tmp
Filesize5KB
MD5a565ad5e00710cc340a5cdfa37c0e6bb
SHA135521e676196e21cadab5a7197dad933fb6ac899
SHA25618c4a30f90ed4f516dace91ee4ce6e9be1b7af47a68a7b2f2856f8a2db14d382
SHA51282c69810d6e0f3cdbebdf633694835da6cc338ede36ba4c0a128deb05e0ef69163fa854d393a064e33b927acfe8b0690eee4b0c75178ba1615ab39a818e9b256
-
Filesize
614B
MD5f9bdd7f330ce85007ae13f394e3e5266
SHA16361d99995fd5449b896f6837fa654508ddb779e
SHA2567613d0e0dbb05823c0bcfd5b01733690391a6379eb0ffe63726431fef188c834
SHA512a369b65bb090b55f0eb95f0da77715f0912feeb54ebbab9d297288c9137eee724a797c21318819252f008af0815ef3b67d1490d5e0b73276135992931105a904
-
Filesize
6KB
MD5d8edcc9ff054ff74d9dc7d7045b5fc2e
SHA16c631773c39caae04b89d92a20b5b78fa9a9ec84
SHA2561734080f404daa6c83994e59f8c91ae2bf9bba95a7f40a9b0ffe57c26e9d624c
SHA51225a2bc814ed07d990f383a38b0f401e7cb06e601fde3c6d0277dce1eea48ae2192494880fc104d761aac6d18984a8ddc8600beb22d55f58fbf2c44d16302bf27
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ae3a1014185e6fc03cffaf8085afc379
SHA10cb19f7ddee073e9115e91c2b17c97d398321360
SHA25648dccc720d507eebe88b80b6c6af36dd1f8790880adeae202e250b75a7535735
SHA51253a6563ba9472e6a2b93665747b33f3d1518f373d9dcc8b7691b6808cf3dca2f076f60904be7df46e469fa3d67fe156829641f20b5790693aecf7f518d7697e0