Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 19:08
Static task
static1
Behavioral task
behavioral1
Sample
95f4275b82b32ea0dddf8c39a7de5692_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
95f4275b82b32ea0dddf8c39a7de5692_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
95f4275b82b32ea0dddf8c39a7de5692_JaffaCakes118.html
-
Size
67KB
-
MD5
95f4275b82b32ea0dddf8c39a7de5692
-
SHA1
b496dfd7774f69d45fe673bb75a45d05c9948a3a
-
SHA256
8c49f8bf7a56b329ac6dce14474e2e212b6368b76d24bde3225cbc6db0bf6b76
-
SHA512
7dd885dd53a79617d6bf03554ecb65eb290d3dc1123b3353f9b95e123d17ef5e050bb0d1b73d7876e938333f78e3fd39801f6c483fd537f1d049e2bb416ca15e
-
SSDEEP
768:JiLtgcMiR3sI2PDDnX0g6ynjboTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVG8sM:JRQTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3312 msedge.exe 3312 msedge.exe 4236 msedge.exe 4236 msedge.exe 2480 identity_helper.exe 2480 identity_helper.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4236 wrote to memory of 4104 4236 msedge.exe 81 PID 4236 wrote to memory of 4104 4236 msedge.exe 81 PID 4236 wrote to memory of 4024 4236 msedge.exe 82 PID 4236 wrote to memory of 4024 4236 msedge.exe 82 PID 4236 wrote to memory of 4024 4236 msedge.exe 82 PID 4236 wrote to memory of 4024 4236 msedge.exe 82 PID 4236 wrote to memory of 4024 4236 msedge.exe 82 PID 4236 wrote to memory of 4024 4236 msedge.exe 82 PID 4236 wrote to memory of 4024 4236 msedge.exe 82 PID 4236 wrote to memory of 4024 4236 msedge.exe 82 PID 4236 wrote to memory of 4024 4236 msedge.exe 82 PID 4236 wrote to memory of 4024 4236 msedge.exe 82 PID 4236 wrote to memory of 4024 4236 msedge.exe 82 PID 4236 wrote to memory of 4024 4236 msedge.exe 82 PID 4236 wrote to memory of 4024 4236 msedge.exe 82 PID 4236 wrote to memory of 4024 4236 msedge.exe 82 PID 4236 wrote to memory of 4024 4236 msedge.exe 82 PID 4236 wrote to memory of 4024 4236 msedge.exe 82 PID 4236 wrote to memory of 4024 4236 msedge.exe 82 PID 4236 wrote to memory of 4024 4236 msedge.exe 82 PID 4236 wrote to memory of 4024 4236 msedge.exe 82 PID 4236 wrote to memory of 4024 4236 msedge.exe 82 PID 4236 wrote to memory of 4024 4236 msedge.exe 82 PID 4236 wrote to memory of 4024 4236 msedge.exe 82 PID 4236 wrote to memory of 4024 4236 msedge.exe 82 PID 4236 wrote to memory of 4024 4236 msedge.exe 82 PID 4236 wrote to memory of 4024 4236 msedge.exe 82 PID 4236 wrote to memory of 4024 4236 msedge.exe 82 PID 4236 wrote to memory of 4024 4236 msedge.exe 82 PID 4236 wrote to memory of 4024 4236 msedge.exe 82 PID 4236 wrote to memory of 4024 4236 msedge.exe 82 PID 4236 wrote to memory of 4024 4236 msedge.exe 82 PID 4236 wrote to memory of 4024 4236 msedge.exe 82 PID 4236 wrote to memory of 4024 4236 msedge.exe 82 PID 4236 wrote to memory of 4024 4236 msedge.exe 82 PID 4236 wrote to memory of 4024 4236 msedge.exe 82 PID 4236 wrote to memory of 4024 4236 msedge.exe 82 PID 4236 wrote to memory of 4024 4236 msedge.exe 82 PID 4236 wrote to memory of 4024 4236 msedge.exe 82 PID 4236 wrote to memory of 4024 4236 msedge.exe 82 PID 4236 wrote to memory of 4024 4236 msedge.exe 82 PID 4236 wrote to memory of 4024 4236 msedge.exe 82 PID 4236 wrote to memory of 3312 4236 msedge.exe 83 PID 4236 wrote to memory of 3312 4236 msedge.exe 83 PID 4236 wrote to memory of 2460 4236 msedge.exe 84 PID 4236 wrote to memory of 2460 4236 msedge.exe 84 PID 4236 wrote to memory of 2460 4236 msedge.exe 84 PID 4236 wrote to memory of 2460 4236 msedge.exe 84 PID 4236 wrote to memory of 2460 4236 msedge.exe 84 PID 4236 wrote to memory of 2460 4236 msedge.exe 84 PID 4236 wrote to memory of 2460 4236 msedge.exe 84 PID 4236 wrote to memory of 2460 4236 msedge.exe 84 PID 4236 wrote to memory of 2460 4236 msedge.exe 84 PID 4236 wrote to memory of 2460 4236 msedge.exe 84 PID 4236 wrote to memory of 2460 4236 msedge.exe 84 PID 4236 wrote to memory of 2460 4236 msedge.exe 84 PID 4236 wrote to memory of 2460 4236 msedge.exe 84 PID 4236 wrote to memory of 2460 4236 msedge.exe 84 PID 4236 wrote to memory of 2460 4236 msedge.exe 84 PID 4236 wrote to memory of 2460 4236 msedge.exe 84 PID 4236 wrote to memory of 2460 4236 msedge.exe 84 PID 4236 wrote to memory of 2460 4236 msedge.exe 84 PID 4236 wrote to memory of 2460 4236 msedge.exe 84 PID 4236 wrote to memory of 2460 4236 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\95f4275b82b32ea0dddf8c39a7de5692_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff942d846f8,0x7ff942d84708,0x7ff942d847182⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1788,17211254131536524652,15564467093548139274,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1788,17211254131536524652,15564467093548139274,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2064 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1788,17211254131536524652,15564467093548139274,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1788,17211254131536524652,15564467093548139274,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1788,17211254131536524652,15564467093548139274,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1788,17211254131536524652,15564467093548139274,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 /prefetch:82⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1788,17211254131536524652,15564467093548139274,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1788,17211254131536524652,15564467093548139274,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1788,17211254131536524652,15564467093548139274,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:12⤵PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1788,17211254131536524652,15564467093548139274,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:12⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1788,17211254131536524652,15564467093548139274,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3464 /prefetch:12⤵PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1788,17211254131536524652,15564467093548139274,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4904 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1808
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4824
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
5KB
MD555daf20f170d2eeb8359bc9bd82d2107
SHA11d557f09507a1fb6b7cd8b772b5612957fc898ef
SHA256573a7fb35fc0aae9cc4fce2cef636c2834d720ed9bd80d3671223513b61025c2
SHA512df9fc4b3572a5b2c24516e0e91e3f817a715343c41f5d4e30bc19a21548dee7c02b06ff1603ab1bf8ed3c2e498b8bfdf4a3627b97a19b431c420063ff4b215bc
-
Filesize
6KB
MD593794eda3f9a27b31a6fe217a332e4e6
SHA1eee2713746ff19e1673af715c65818f2de603e3f
SHA2568b4412c67db25a250efe0fa49a764c16fcb6639960b9e9573ac5193389fa7d68
SHA512dca11e6bb6291d4b25531e294f6a9b5c2baa95f70f37cfac5ede783e760057fe904b6afc385dc0e0b97497b8163780d9cd5228c1d96018cc467b0cee2cfd2758
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e7e628eb1fb67e8a817bbf5841b57357
SHA121ba570dae1c4de394853bd2de8e07671f1d84fb
SHA256e3f18170b812d485e5ae84affcb6d979620ef8307c3a00bd80cb6c95db124a1d
SHA5122ea43f79254c55071453bea431b915bc66022ca7bcfd0ed02b675b7f237fda506d8caa781f11e16499e0b6d99bea286aae5316794f0def8bfd62d0a5dd41aa06