Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
05/06/2024, 01:14
Static task
static1
Behavioral task
behavioral1
Sample
96dbd1c50ce5db9beadcb4a6dd899904_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
96dbd1c50ce5db9beadcb4a6dd899904_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
96dbd1c50ce5db9beadcb4a6dd899904_JaffaCakes118.html
-
Size
35KB
-
MD5
96dbd1c50ce5db9beadcb4a6dd899904
-
SHA1
4bb2d4bf224519485314ed8a188e9b02f4b4b21c
-
SHA256
863e0394fe04b86521ecfc9c23c90ce097ec8201f96c4f99ab6bfa861b51d4ac
-
SHA512
7207c5b29787e850aa481c514102622ed2c5448e0cfe8f62f4dd944a455139c377c584ab13064bbc4afba195b40bdd3cce3613bfc2a4e6ddc2adbc04f0900ae8
-
SSDEEP
768:KR5hITA4tJ/4nI8Fim7VYXF19xYh2ol1/u:KRp4tqI8m9xYh27
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3580 msedge.exe 3580 msedge.exe 2712 msedge.exe 2712 msedge.exe 3944 identity_helper.exe 3944 identity_helper.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2712 wrote to memory of 640 2712 msedge.exe 82 PID 2712 wrote to memory of 640 2712 msedge.exe 82 PID 2712 wrote to memory of 312 2712 msedge.exe 83 PID 2712 wrote to memory of 312 2712 msedge.exe 83 PID 2712 wrote to memory of 312 2712 msedge.exe 83 PID 2712 wrote to memory of 312 2712 msedge.exe 83 PID 2712 wrote to memory of 312 2712 msedge.exe 83 PID 2712 wrote to memory of 312 2712 msedge.exe 83 PID 2712 wrote to memory of 312 2712 msedge.exe 83 PID 2712 wrote to memory of 312 2712 msedge.exe 83 PID 2712 wrote to memory of 312 2712 msedge.exe 83 PID 2712 wrote to memory of 312 2712 msedge.exe 83 PID 2712 wrote to memory of 312 2712 msedge.exe 83 PID 2712 wrote to memory of 312 2712 msedge.exe 83 PID 2712 wrote to memory of 312 2712 msedge.exe 83 PID 2712 wrote to memory of 312 2712 msedge.exe 83 PID 2712 wrote to memory of 312 2712 msedge.exe 83 PID 2712 wrote to memory of 312 2712 msedge.exe 83 PID 2712 wrote to memory of 312 2712 msedge.exe 83 PID 2712 wrote to memory of 312 2712 msedge.exe 83 PID 2712 wrote to memory of 312 2712 msedge.exe 83 PID 2712 wrote to memory of 312 2712 msedge.exe 83 PID 2712 wrote to memory of 312 2712 msedge.exe 83 PID 2712 wrote to memory of 312 2712 msedge.exe 83 PID 2712 wrote to memory of 312 2712 msedge.exe 83 PID 2712 wrote to memory of 312 2712 msedge.exe 83 PID 2712 wrote to memory of 312 2712 msedge.exe 83 PID 2712 wrote to memory of 312 2712 msedge.exe 83 PID 2712 wrote to memory of 312 2712 msedge.exe 83 PID 2712 wrote to memory of 312 2712 msedge.exe 83 PID 2712 wrote to memory of 312 2712 msedge.exe 83 PID 2712 wrote to memory of 312 2712 msedge.exe 83 PID 2712 wrote to memory of 312 2712 msedge.exe 83 PID 2712 wrote to memory of 312 2712 msedge.exe 83 PID 2712 wrote to memory of 312 2712 msedge.exe 83 PID 2712 wrote to memory of 312 2712 msedge.exe 83 PID 2712 wrote to memory of 312 2712 msedge.exe 83 PID 2712 wrote to memory of 312 2712 msedge.exe 83 PID 2712 wrote to memory of 312 2712 msedge.exe 83 PID 2712 wrote to memory of 312 2712 msedge.exe 83 PID 2712 wrote to memory of 312 2712 msedge.exe 83 PID 2712 wrote to memory of 312 2712 msedge.exe 83 PID 2712 wrote to memory of 3580 2712 msedge.exe 84 PID 2712 wrote to memory of 3580 2712 msedge.exe 84 PID 2712 wrote to memory of 1028 2712 msedge.exe 85 PID 2712 wrote to memory of 1028 2712 msedge.exe 85 PID 2712 wrote to memory of 1028 2712 msedge.exe 85 PID 2712 wrote to memory of 1028 2712 msedge.exe 85 PID 2712 wrote to memory of 1028 2712 msedge.exe 85 PID 2712 wrote to memory of 1028 2712 msedge.exe 85 PID 2712 wrote to memory of 1028 2712 msedge.exe 85 PID 2712 wrote to memory of 1028 2712 msedge.exe 85 PID 2712 wrote to memory of 1028 2712 msedge.exe 85 PID 2712 wrote to memory of 1028 2712 msedge.exe 85 PID 2712 wrote to memory of 1028 2712 msedge.exe 85 PID 2712 wrote to memory of 1028 2712 msedge.exe 85 PID 2712 wrote to memory of 1028 2712 msedge.exe 85 PID 2712 wrote to memory of 1028 2712 msedge.exe 85 PID 2712 wrote to memory of 1028 2712 msedge.exe 85 PID 2712 wrote to memory of 1028 2712 msedge.exe 85 PID 2712 wrote to memory of 1028 2712 msedge.exe 85 PID 2712 wrote to memory of 1028 2712 msedge.exe 85 PID 2712 wrote to memory of 1028 2712 msedge.exe 85 PID 2712 wrote to memory of 1028 2712 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\96dbd1c50ce5db9beadcb4a6dd899904_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa970046f8,0x7ffa97004708,0x7ffa970047182⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,8012197291844990456,13555233614493554598,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,8012197291844990456,13555233614493554598,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,8012197291844990456,13555233614493554598,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8012197291844990456,13555233614493554598,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8012197291844990456,13555233614493554598,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,8012197291844990456,13555233614493554598,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5980 /prefetch:82⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,8012197291844990456,13555233614493554598,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5980 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8012197291844990456,13555233614493554598,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5968 /prefetch:12⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8012197291844990456,13555233614493554598,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8012197291844990456,13555233614493554598,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5804 /prefetch:12⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8012197291844990456,13555233614493554598,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,8012197291844990456,13555233614493554598,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4860 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4952
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2400
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
989B
MD55441edbd9d39ab26a04b97931113db5d
SHA12a457518b6071ed565f863051e7016bafc677fbd
SHA25651dbf7709b8852a91eed9e1555a10829005fc81b24882e83f26b50273c690c38
SHA51251fbaba54d3dcfa97570d3dd30db13f60eef5c02888f51e5e14342da3d08abf0fa1d2261710caa5244c3b682d89fa2edf46147324a558744c7441364c4ec0f82
-
Filesize
6KB
MD5c6eed66c00f8e05a1eb7e5dcd9f302d1
SHA192a9e8a2dae0a9dddf04aef602debb71929e49d3
SHA256fa3b056f16e9fe7f1e4a8b48e31cdadedcdb05622e6e1e8b505f9ff61c9fa5b4
SHA5129693cd65261a4cc2f8ac78a71d8184c8858edc9384c788814d9fa5670648173ce7990b3b7c6a4549f8efce1bcb77c1da6b47719bee7c3a3549466cf847a4d0b0
-
Filesize
5KB
MD52e7c1a25fe9d7abc00be1726e25ec33f
SHA1aa3d1a6d6218e4652dac6b7d023506c730166a1e
SHA2567769c69b0e1860f675c55d0e66cdb72620a4f88b699758e96c6ce27128a138a3
SHA512ed1654fcf34e58162b3097619154c588aa06f1981e6cd12093073e1a987e32e81cf8f4df6d3bfd106966be312fbd6027d409beabc0433eee24637e547bde989c
-
Filesize
6KB
MD51d3d776135ec9a6b84ab2206af0ae05f
SHA14a7e9fc5d208dc08ad939810eda4e4d4a655b5ea
SHA25628fd92e708ea9ef7fef9c016d17f91c3573d38c3411877f35d5ae684e98231a3
SHA512a9e08fa8e4e1c57b3d0b0ba085506a8ac8c5e62b257b3b9fc559bab01b5fb10429ae50d0c4c8d4917913ae98293ccb3fbeabdd3f88e990e2f56c2abe8d0c4dc2
-
Filesize
204B
MD5693c252059bc2d004b8da033fd75a79e
SHA11bc68b83b368fcd2bd383684f0f26b89219fe095
SHA2565a1a5d984f5259c40cc4d14abe324a005317b1c0cb7319c46442d423ca3c757a
SHA512cd8d8ee01c34f5cc16140c29b8166d9710611cb03cabd8f96c0cd7298e7a449ddbaa90df7fefac08cd2935c713543cb494abb19891144c679f2bac3f9698d3ab
-
Filesize
204B
MD5944d5a8147379172bc637779c67b2c5b
SHA1b4fd7d77436d4c112c8aef6d0ad7be9c22c70ac7
SHA256baacbf1a0f9bea7bb56e17f3812fae6c256a922c7f7250fa2a85dd97abf6596e
SHA512fdab7ff3025dbdf2ca6a40d613e958cedbe9f92ee341ea86c75f2cad06d0020832d2c3bb9004f3cb0e5bdbf66200f6c00a067f09fc965ec31128a0cc0bd8fb95
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD52d07b95712a3f449a9eac45361654b65
SHA15e24cc16c8184bc23383f6e6b23261ac6e1626d3
SHA256fbdd95cff47ec204676a00d1f0260f04cfa13213b24514c8c77bd981236f6003
SHA512648b17aeb4f5377390a103edca692d56beee0ea2c22c328129c666890151721b7c1d6fb14969bb83e922767ae6a0ca669417a8299b906a0ec4b0d50d7cbe228e