Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2024 18:12
Static task
static1
Behavioral task
behavioral1
Sample
95ce16d2027fa96630469e8f0f6720a6_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
95ce16d2027fa96630469e8f0f6720a6_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
95ce16d2027fa96630469e8f0f6720a6_JaffaCakes118.html
-
Size
3KB
-
MD5
95ce16d2027fa96630469e8f0f6720a6
-
SHA1
9cbe93fb3a12504de1bee3d06074fd82d9da5fd3
-
SHA256
2c44b862168633482089201edfc2c22adc6dd9c5595483a81732b6d1fbff6db3
-
SHA512
cc1aca204e4185958f9381e59999beb47e3ca3bd3757eabc3cca382bd1af534c44b8c3df41ba27ba211198b5612df41a5685293cb956e4f0657331cd995e90a6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3508 msedge.exe 3508 msedge.exe 4604 msedge.exe 4604 msedge.exe 628 identity_helper.exe 628 identity_helper.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4604 wrote to memory of 2480 4604 msedge.exe 82 PID 4604 wrote to memory of 2480 4604 msedge.exe 82 PID 4604 wrote to memory of 5076 4604 msedge.exe 84 PID 4604 wrote to memory of 5076 4604 msedge.exe 84 PID 4604 wrote to memory of 5076 4604 msedge.exe 84 PID 4604 wrote to memory of 5076 4604 msedge.exe 84 PID 4604 wrote to memory of 5076 4604 msedge.exe 84 PID 4604 wrote to memory of 5076 4604 msedge.exe 84 PID 4604 wrote to memory of 5076 4604 msedge.exe 84 PID 4604 wrote to memory of 5076 4604 msedge.exe 84 PID 4604 wrote to memory of 5076 4604 msedge.exe 84 PID 4604 wrote to memory of 5076 4604 msedge.exe 84 PID 4604 wrote to memory of 5076 4604 msedge.exe 84 PID 4604 wrote to memory of 5076 4604 msedge.exe 84 PID 4604 wrote to memory of 5076 4604 msedge.exe 84 PID 4604 wrote to memory of 5076 4604 msedge.exe 84 PID 4604 wrote to memory of 5076 4604 msedge.exe 84 PID 4604 wrote to memory of 5076 4604 msedge.exe 84 PID 4604 wrote to memory of 5076 4604 msedge.exe 84 PID 4604 wrote to memory of 5076 4604 msedge.exe 84 PID 4604 wrote to memory of 5076 4604 msedge.exe 84 PID 4604 wrote to memory of 5076 4604 msedge.exe 84 PID 4604 wrote to memory of 5076 4604 msedge.exe 84 PID 4604 wrote to memory of 5076 4604 msedge.exe 84 PID 4604 wrote to memory of 5076 4604 msedge.exe 84 PID 4604 wrote to memory of 5076 4604 msedge.exe 84 PID 4604 wrote to memory of 5076 4604 msedge.exe 84 PID 4604 wrote to memory of 5076 4604 msedge.exe 84 PID 4604 wrote to memory of 5076 4604 msedge.exe 84 PID 4604 wrote to memory of 5076 4604 msedge.exe 84 PID 4604 wrote to memory of 5076 4604 msedge.exe 84 PID 4604 wrote to memory of 5076 4604 msedge.exe 84 PID 4604 wrote to memory of 5076 4604 msedge.exe 84 PID 4604 wrote to memory of 5076 4604 msedge.exe 84 PID 4604 wrote to memory of 5076 4604 msedge.exe 84 PID 4604 wrote to memory of 5076 4604 msedge.exe 84 PID 4604 wrote to memory of 5076 4604 msedge.exe 84 PID 4604 wrote to memory of 5076 4604 msedge.exe 84 PID 4604 wrote to memory of 5076 4604 msedge.exe 84 PID 4604 wrote to memory of 5076 4604 msedge.exe 84 PID 4604 wrote to memory of 5076 4604 msedge.exe 84 PID 4604 wrote to memory of 5076 4604 msedge.exe 84 PID 4604 wrote to memory of 3508 4604 msedge.exe 85 PID 4604 wrote to memory of 3508 4604 msedge.exe 85 PID 4604 wrote to memory of 5060 4604 msedge.exe 86 PID 4604 wrote to memory of 5060 4604 msedge.exe 86 PID 4604 wrote to memory of 5060 4604 msedge.exe 86 PID 4604 wrote to memory of 5060 4604 msedge.exe 86 PID 4604 wrote to memory of 5060 4604 msedge.exe 86 PID 4604 wrote to memory of 5060 4604 msedge.exe 86 PID 4604 wrote to memory of 5060 4604 msedge.exe 86 PID 4604 wrote to memory of 5060 4604 msedge.exe 86 PID 4604 wrote to memory of 5060 4604 msedge.exe 86 PID 4604 wrote to memory of 5060 4604 msedge.exe 86 PID 4604 wrote to memory of 5060 4604 msedge.exe 86 PID 4604 wrote to memory of 5060 4604 msedge.exe 86 PID 4604 wrote to memory of 5060 4604 msedge.exe 86 PID 4604 wrote to memory of 5060 4604 msedge.exe 86 PID 4604 wrote to memory of 5060 4604 msedge.exe 86 PID 4604 wrote to memory of 5060 4604 msedge.exe 86 PID 4604 wrote to memory of 5060 4604 msedge.exe 86 PID 4604 wrote to memory of 5060 4604 msedge.exe 86 PID 4604 wrote to memory of 5060 4604 msedge.exe 86 PID 4604 wrote to memory of 5060 4604 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\95ce16d2027fa96630469e8f0f6720a6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb84cd46f8,0x7ffb84cd4708,0x7ffb84cd47182⤵PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,2836469886749115657,2029971922785507450,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,2836469886749115657,2029971922785507450,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,2836469886749115657,2029971922785507450,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:82⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2836469886749115657,2029971922785507450,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2836469886749115657,2029971922785507450,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,2836469886749115657,2029971922785507450,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,2836469886749115657,2029971922785507450,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2836469886749115657,2029971922785507450,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2836469886749115657,2029971922785507450,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2836469886749115657,2029971922785507450,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2836469886749115657,2029971922785507450,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3480 /prefetch:12⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,2836469886749115657,2029971922785507450,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2004 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3356
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2652
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\9f71ecc9-810a-4b5a-be0b-d146e9410eb3.tmp
Filesize5KB
MD5d9aa0abcbb4871f8fec513f328bbf0ee
SHA1743b8fe608a9ef8e0284ed26feb50afd989590d6
SHA25618b6aa3fe7465d635eb5b951dde26e2ecd172054653ff7def8e2eb1fd6712e8f
SHA512281de068eec7e61e41810830cdabe6de2d593ea0902836ee98fe1fc61176592f7898717052c9adaa11961c4c21ecb59ce5e1a60c7abb9e64240fdcec2443ee12
-
Filesize
276B
MD563e94862b42530f86676ad4d8dad984d
SHA13fd2230f79711e641c7d8bc1fc8f6d671319aec8
SHA25602bd271fbf1d8f8cfeb229ec24d7bfb1c261116853c2e66a3f5d0b3536f59a25
SHA5128f57ba1d96f3a97a7867f7eb43efd22baea3a78766fd88e87affcbc1e2e1699de833cbe9d78d22fa784ebf9602bd2006ee315ea13aebbcb79b56ec137c7a5aff
-
Filesize
6KB
MD58b3a1f0de1cd8c4dd689642e1fcf10bd
SHA13de770520c15f3b9143b2edc2066edf55232338c
SHA2566595a532b361704e1113c1ada9935397826d542d6c2839f6768623835387e022
SHA512b54a272c330ac752d8b7e30953bbf2f2fda457a249e289ac8c14658b3be21e7d8c169ab7d698b724a3c1c362d3362cb217e6be680f739782b2423374fe6f4e63
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD55ceb0b667de879a2be1e8bc5a23e5c96
SHA11c07fc4cdd5b9eae05b9f5fb1c6cf0dea799fdf7
SHA25651f37f6fda93e48ee3bad8dd1e90afe4a0fd434f712dacdd1809c9d80304cba9
SHA51229de656370b1d7ed768be707f01de410198c8763b6d3775aa354c40f41fe89b6183ff315777ec7b641659b544b0d6febf3314a66789dfd5591d29c402bb1b41c