Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
05/06/2024, 00:03
Static task
static1
Behavioral task
behavioral1
Sample
96b40c68f5604e1ba12f8e72b804d464_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
96b40c68f5604e1ba12f8e72b804d464_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
96b40c68f5604e1ba12f8e72b804d464_JaffaCakes118.html
-
Size
27KB
-
MD5
96b40c68f5604e1ba12f8e72b804d464
-
SHA1
84342ff6cff05df50eb95abd30e7ebc997609468
-
SHA256
0ce182d734349aec718c11fc67cb98cb39f50bc8d89c8ef5e11facc3ad83f949
-
SHA512
ea6069030290b9baeefc4affc65aae7d03968132224520c14084f9440ba9c97e64358b39fabf05351b1bc3f624598732f3e689bea1fe50fe6bbb3bdf90d4f0a6
-
SSDEEP
768:YZvgUlMSXcp/tl6TOORQEvaOedk2pxYF3tD0kre434EtblkxgbaglOEbtEAS4l43:YZvgUlMSXcp/tl6TOORQEvaOedk2pxYq
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4984 msedge.exe 4984 msedge.exe 1240 msedge.exe 1240 msedge.exe 1824 identity_helper.exe 1824 identity_helper.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1240 wrote to memory of 2068 1240 msedge.exe 83 PID 1240 wrote to memory of 2068 1240 msedge.exe 83 PID 1240 wrote to memory of 1164 1240 msedge.exe 84 PID 1240 wrote to memory of 1164 1240 msedge.exe 84 PID 1240 wrote to memory of 1164 1240 msedge.exe 84 PID 1240 wrote to memory of 1164 1240 msedge.exe 84 PID 1240 wrote to memory of 1164 1240 msedge.exe 84 PID 1240 wrote to memory of 1164 1240 msedge.exe 84 PID 1240 wrote to memory of 1164 1240 msedge.exe 84 PID 1240 wrote to memory of 1164 1240 msedge.exe 84 PID 1240 wrote to memory of 1164 1240 msedge.exe 84 PID 1240 wrote to memory of 1164 1240 msedge.exe 84 PID 1240 wrote to memory of 1164 1240 msedge.exe 84 PID 1240 wrote to memory of 1164 1240 msedge.exe 84 PID 1240 wrote to memory of 1164 1240 msedge.exe 84 PID 1240 wrote to memory of 1164 1240 msedge.exe 84 PID 1240 wrote to memory of 1164 1240 msedge.exe 84 PID 1240 wrote to memory of 1164 1240 msedge.exe 84 PID 1240 wrote to memory of 1164 1240 msedge.exe 84 PID 1240 wrote to memory of 1164 1240 msedge.exe 84 PID 1240 wrote to memory of 1164 1240 msedge.exe 84 PID 1240 wrote to memory of 1164 1240 msedge.exe 84 PID 1240 wrote to memory of 1164 1240 msedge.exe 84 PID 1240 wrote to memory of 1164 1240 msedge.exe 84 PID 1240 wrote to memory of 1164 1240 msedge.exe 84 PID 1240 wrote to memory of 1164 1240 msedge.exe 84 PID 1240 wrote to memory of 1164 1240 msedge.exe 84 PID 1240 wrote to memory of 1164 1240 msedge.exe 84 PID 1240 wrote to memory of 1164 1240 msedge.exe 84 PID 1240 wrote to memory of 1164 1240 msedge.exe 84 PID 1240 wrote to memory of 1164 1240 msedge.exe 84 PID 1240 wrote to memory of 1164 1240 msedge.exe 84 PID 1240 wrote to memory of 1164 1240 msedge.exe 84 PID 1240 wrote to memory of 1164 1240 msedge.exe 84 PID 1240 wrote to memory of 1164 1240 msedge.exe 84 PID 1240 wrote to memory of 1164 1240 msedge.exe 84 PID 1240 wrote to memory of 1164 1240 msedge.exe 84 PID 1240 wrote to memory of 1164 1240 msedge.exe 84 PID 1240 wrote to memory of 1164 1240 msedge.exe 84 PID 1240 wrote to memory of 1164 1240 msedge.exe 84 PID 1240 wrote to memory of 1164 1240 msedge.exe 84 PID 1240 wrote to memory of 1164 1240 msedge.exe 84 PID 1240 wrote to memory of 4984 1240 msedge.exe 85 PID 1240 wrote to memory of 4984 1240 msedge.exe 85 PID 1240 wrote to memory of 884 1240 msedge.exe 86 PID 1240 wrote to memory of 884 1240 msedge.exe 86 PID 1240 wrote to memory of 884 1240 msedge.exe 86 PID 1240 wrote to memory of 884 1240 msedge.exe 86 PID 1240 wrote to memory of 884 1240 msedge.exe 86 PID 1240 wrote to memory of 884 1240 msedge.exe 86 PID 1240 wrote to memory of 884 1240 msedge.exe 86 PID 1240 wrote to memory of 884 1240 msedge.exe 86 PID 1240 wrote to memory of 884 1240 msedge.exe 86 PID 1240 wrote to memory of 884 1240 msedge.exe 86 PID 1240 wrote to memory of 884 1240 msedge.exe 86 PID 1240 wrote to memory of 884 1240 msedge.exe 86 PID 1240 wrote to memory of 884 1240 msedge.exe 86 PID 1240 wrote to memory of 884 1240 msedge.exe 86 PID 1240 wrote to memory of 884 1240 msedge.exe 86 PID 1240 wrote to memory of 884 1240 msedge.exe 86 PID 1240 wrote to memory of 884 1240 msedge.exe 86 PID 1240 wrote to memory of 884 1240 msedge.exe 86 PID 1240 wrote to memory of 884 1240 msedge.exe 86 PID 1240 wrote to memory of 884 1240 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\96b40c68f5604e1ba12f8e72b804d464_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8a47946f8,0x7ff8a4794708,0x7ff8a47947182⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,10368629408632162270,6826367958289696341,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2268 /prefetch:22⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2208,10368629408632162270,6826367958289696341,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2208,10368629408632162270,6826367958289696341,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,10368629408632162270,6826367958289696341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,10368629408632162270,6826367958289696341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,10368629408632162270,6826367958289696341,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4452 /prefetch:82⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,10368629408632162270,6826367958289696341,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4452 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,10368629408632162270,6826367958289696341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2308 /prefetch:12⤵PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,10368629408632162270,6826367958289696341,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,10368629408632162270,6826367958289696341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,10368629408632162270,6826367958289696341,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,10368629408632162270,6826367958289696341,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5288 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4660
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1396
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4292
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD5ed228c1b1aa532b808989c87f0772f6b
SHA1aee2987b5580f408242e2681359f8129797c18d7
SHA2564dc29d983cbb9e1ff6e0cce2fc2240945c362d85687f8def7044a607e790a131
SHA5127639e9d181891525c6e7f292cb34492ab9bed19c5b483b62e36b25f6d31d7ef2ca72230cb45a21914dd4a7e2da048f18e253d5970f7ae354aef94addba26a4a3
-
Filesize
6KB
MD506ed3c07b2c3d641f326f5731e889df8
SHA1026cc7578a5934d7687c970bb4078f18e3274585
SHA2564cffb023a4296a2ecc378c7e82ddbad28f9e0b8554b945cd33ec0345c4cada1e
SHA512544f8680d4228df96c90f14b2a1bc1e658af350edfae6261bddb008f711850012cf3c8fb617ee7b754c6b41b81c7a406d5d5648f15683cb0c223f6593601461c
-
Filesize
6KB
MD5612c0593853104f6f35f2a90d46288ce
SHA1e30056bc7a291f7f11a4e96be09f801edcf1487a
SHA256cfa4ac2c31bbf155d61e7178782ec2070cdcedd3ee01292e2c4be9e02660bf22
SHA51271699bbdd0b073a4c46e1526466513f405d64d47296a7e65094d03a7bc61113c8b6b6d7eda54ac931049870fe1184db0cd5b5be8d22152f034eaf4857d381bc5
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD55982a0488242ca632a532a65b1059f21
SHA1b4d8c6160d20840cdfe95bcb4b7662221a6efe6d
SHA2568d4547729820548d2a37f8b97657497526c243d24ac26134c61bebdc5ac078ba
SHA512ab63ccbe62d29a14f96d83d192c63671d9d2ac6a3bbf5c48008f327a848494b159540892998df1a6e6f39a0b155935bbb7e3e4ba7db8d0407ed570a146fa1092