Analysis
-
max time kernel
45s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
05-06-2024 22:31
Static task
static1
Behavioral task
behavioral1
Sample
9969cec3ba8302e2399fcd3a7aae1ab2_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
9969cec3ba8302e2399fcd3a7aae1ab2_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9969cec3ba8302e2399fcd3a7aae1ab2_JaffaCakes118.html
-
Size
14KB
-
MD5
9969cec3ba8302e2399fcd3a7aae1ab2
-
SHA1
398e4c72013d3f3c8780192541d78350535b9d1b
-
SHA256
3b75691d8a6cc0342feca0862afb0922e879c50ee4cf367842fb67e70052cadc
-
SHA512
4f97d4822167bb8adaff0d0dc65661379eae13dca842c9b50c0d2906f201a4bdf1b67cd2e6c1da3b26a03bd49af229723ac87b0811a4465648fe766da996b826
-
SSDEEP
384:wr+6r6WY0bIwqf9SnMTOtUgvzdYd2eSu4vEtAsB:oPbI5fCtvatbB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2768 msedge.exe 2768 msedge.exe 2144 msedge.exe 2144 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2144 msedge.exe 2144 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2144 wrote to memory of 3652 2144 msedge.exe 82 PID 2144 wrote to memory of 3652 2144 msedge.exe 82 PID 2144 wrote to memory of 1424 2144 msedge.exe 83 PID 2144 wrote to memory of 1424 2144 msedge.exe 83 PID 2144 wrote to memory of 1424 2144 msedge.exe 83 PID 2144 wrote to memory of 1424 2144 msedge.exe 83 PID 2144 wrote to memory of 1424 2144 msedge.exe 83 PID 2144 wrote to memory of 1424 2144 msedge.exe 83 PID 2144 wrote to memory of 1424 2144 msedge.exe 83 PID 2144 wrote to memory of 1424 2144 msedge.exe 83 PID 2144 wrote to memory of 1424 2144 msedge.exe 83 PID 2144 wrote to memory of 1424 2144 msedge.exe 83 PID 2144 wrote to memory of 1424 2144 msedge.exe 83 PID 2144 wrote to memory of 1424 2144 msedge.exe 83 PID 2144 wrote to memory of 1424 2144 msedge.exe 83 PID 2144 wrote to memory of 1424 2144 msedge.exe 83 PID 2144 wrote to memory of 1424 2144 msedge.exe 83 PID 2144 wrote to memory of 1424 2144 msedge.exe 83 PID 2144 wrote to memory of 1424 2144 msedge.exe 83 PID 2144 wrote to memory of 1424 2144 msedge.exe 83 PID 2144 wrote to memory of 1424 2144 msedge.exe 83 PID 2144 wrote to memory of 1424 2144 msedge.exe 83 PID 2144 wrote to memory of 1424 2144 msedge.exe 83 PID 2144 wrote to memory of 1424 2144 msedge.exe 83 PID 2144 wrote to memory of 1424 2144 msedge.exe 83 PID 2144 wrote to memory of 1424 2144 msedge.exe 83 PID 2144 wrote to memory of 1424 2144 msedge.exe 83 PID 2144 wrote to memory of 1424 2144 msedge.exe 83 PID 2144 wrote to memory of 1424 2144 msedge.exe 83 PID 2144 wrote to memory of 1424 2144 msedge.exe 83 PID 2144 wrote to memory of 1424 2144 msedge.exe 83 PID 2144 wrote to memory of 1424 2144 msedge.exe 83 PID 2144 wrote to memory of 1424 2144 msedge.exe 83 PID 2144 wrote to memory of 1424 2144 msedge.exe 83 PID 2144 wrote to memory of 1424 2144 msedge.exe 83 PID 2144 wrote to memory of 1424 2144 msedge.exe 83 PID 2144 wrote to memory of 1424 2144 msedge.exe 83 PID 2144 wrote to memory of 1424 2144 msedge.exe 83 PID 2144 wrote to memory of 1424 2144 msedge.exe 83 PID 2144 wrote to memory of 1424 2144 msedge.exe 83 PID 2144 wrote to memory of 1424 2144 msedge.exe 83 PID 2144 wrote to memory of 1424 2144 msedge.exe 83 PID 2144 wrote to memory of 2768 2144 msedge.exe 84 PID 2144 wrote to memory of 2768 2144 msedge.exe 84 PID 2144 wrote to memory of 4908 2144 msedge.exe 85 PID 2144 wrote to memory of 4908 2144 msedge.exe 85 PID 2144 wrote to memory of 4908 2144 msedge.exe 85 PID 2144 wrote to memory of 4908 2144 msedge.exe 85 PID 2144 wrote to memory of 4908 2144 msedge.exe 85 PID 2144 wrote to memory of 4908 2144 msedge.exe 85 PID 2144 wrote to memory of 4908 2144 msedge.exe 85 PID 2144 wrote to memory of 4908 2144 msedge.exe 85 PID 2144 wrote to memory of 4908 2144 msedge.exe 85 PID 2144 wrote to memory of 4908 2144 msedge.exe 85 PID 2144 wrote to memory of 4908 2144 msedge.exe 85 PID 2144 wrote to memory of 4908 2144 msedge.exe 85 PID 2144 wrote to memory of 4908 2144 msedge.exe 85 PID 2144 wrote to memory of 4908 2144 msedge.exe 85 PID 2144 wrote to memory of 4908 2144 msedge.exe 85 PID 2144 wrote to memory of 4908 2144 msedge.exe 85 PID 2144 wrote to memory of 4908 2144 msedge.exe 85 PID 2144 wrote to memory of 4908 2144 msedge.exe 85 PID 2144 wrote to memory of 4908 2144 msedge.exe 85 PID 2144 wrote to memory of 4908 2144 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9969cec3ba8302e2399fcd3a7aae1ab2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa439e46f8,0x7ffa439e4708,0x7ffa439e47182⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,3136182145661987410,17004948274897520930,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,3136182145661987410,17004948274897520930,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,3136182145661987410,17004948274897520930,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3136182145661987410,17004948274897520930,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3136182145661987410,17004948274897520930,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,3136182145661987410,17004948274897520930,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5276 /prefetch:82⤵PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,3136182145661987410,17004948274897520930,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5276 /prefetch:82⤵PID:4196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3136182145661987410,17004948274897520930,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4164 /prefetch:12⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3136182145661987410,17004948274897520930,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4136 /prefetch:12⤵PID:2304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3136182145661987410,17004948274897520930,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:1636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3136182145661987410,17004948274897520930,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,3136182145661987410,17004948274897520930,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2020 /prefetch:22⤵PID:2796
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2024
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
185B
MD5efa3b79297b792ddfa72609e2389407a
SHA17c959b0d9c508607119d7c112fe81939169c8ccb
SHA25604371cb7276a5868761433e311d805f97da580075fc9bf1a66f0a9d8ac9a4017
SHA5121f08b7ea9823ae979382586db83b05c0d0dc5cb565b3946fb8134c0dfaaf61fdf80d6c666ceca6522964ac446d2a2e798e1f0eaff3dd2ab5cae88a793db20eaf
-
Filesize
6KB
MD54bc764694446dd089445afdc525ed589
SHA1bef0cbddcbd893dc88e65199a3f9967d665a6cbc
SHA256d5b3cc9494d66f636a250978c62725a8b121b5cd29399ab1abee30e461adeb84
SHA512912fee304771141ca1f35d9cb92fcc334514f86aa9dceae8d17145d79b630163486b441fd7d7b5bf9e8bb1f827c03885c0e5815e8f9fb35007caeccb0a05996d
-
Filesize
5KB
MD5cedec893a5c304c2c8fdf305d08c0615
SHA1024c6f9714f393dd12aa819e7579412d147b723f
SHA25698bd0394355eb88f10e01d528ad3a672c57ad3b0ee7b1927169591a2c10cf050
SHA5127f5db1005389c4d9ad341e62a87472d0eaff1aa33021608ba9dd90a6aa2938cebc639c03f33f97dc5d4bd2e762420274a907c4d57b90aecfca4c6e4c8264222f
-
Filesize
6KB
MD56ff850bfd6374745cd9c9e1d37ff9a28
SHA1968c494db3926745e6e879ee22ad2f5f50927b78
SHA2563ae973e7dcd6572314a6e6769fd84bfbea5e06a590b47794b84d0ada75d381a4
SHA512b938ee070a6cb976e05f96ca06afac1d8a848681f4094dff14afa1934621c60b6f8e14c021a75f091214ea6c5572080b6404bdac59ddca35150544e79ce89dc4
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD51881b5d45bb16d7834f729ff4c7c630b
SHA1d8450df63343218e6453fe9b65c0fe7f3fa4c381
SHA256374aff495a4b714cd66cc507b66fc634a3e33568030ffebc0f2ecdd78228f97b
SHA51271a49ab96bd7e036a15ebef661400e131ebae9260b268b5f97bc20998fb105c0c981607f25182c6502e8fadffaf709ced8ef1c4b1cd19fa087ca71d83a22a216