Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
05/06/2024, 15:27
Static task
static1
Behavioral task
behavioral1
Sample
987f0dd0deef8b879fe20afe8fe45796_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
987f0dd0deef8b879fe20afe8fe45796_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
987f0dd0deef8b879fe20afe8fe45796_JaffaCakes118.html
-
Size
68KB
-
MD5
987f0dd0deef8b879fe20afe8fe45796
-
SHA1
8419d628b9bac251bbb160dc3fb41ac306a29094
-
SHA256
fb0d98c80a7563ef529d8affc7efd03badffe14718ccb9f104cf632a2d04fa6b
-
SHA512
a296d603ebf926ba450794f0f0b3ad5f77e6f7a0eb2dfd459152cebf4792820b69ff73a62b2ffee4bf11f5880e3615487e77f01a0f01c22faa773d6135647fdc
-
SSDEEP
768:j1sIbGPOv+rYxrRxAHrRxAli+uw24OGYCVTYrL8gkOaD:j1sYGPOmrf+F2JCVTTg+D
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 4412 msedge.exe 4412 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 4940 identity_helper.exe 4940 identity_helper.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2868 1680 msedge.exe 84 PID 1680 wrote to memory of 2868 1680 msedge.exe 84 PID 1680 wrote to memory of 3028 1680 msedge.exe 85 PID 1680 wrote to memory of 3028 1680 msedge.exe 85 PID 1680 wrote to memory of 3028 1680 msedge.exe 85 PID 1680 wrote to memory of 3028 1680 msedge.exe 85 PID 1680 wrote to memory of 3028 1680 msedge.exe 85 PID 1680 wrote to memory of 3028 1680 msedge.exe 85 PID 1680 wrote to memory of 3028 1680 msedge.exe 85 PID 1680 wrote to memory of 3028 1680 msedge.exe 85 PID 1680 wrote to memory of 3028 1680 msedge.exe 85 PID 1680 wrote to memory of 3028 1680 msedge.exe 85 PID 1680 wrote to memory of 3028 1680 msedge.exe 85 PID 1680 wrote to memory of 3028 1680 msedge.exe 85 PID 1680 wrote to memory of 3028 1680 msedge.exe 85 PID 1680 wrote to memory of 3028 1680 msedge.exe 85 PID 1680 wrote to memory of 3028 1680 msedge.exe 85 PID 1680 wrote to memory of 3028 1680 msedge.exe 85 PID 1680 wrote to memory of 3028 1680 msedge.exe 85 PID 1680 wrote to memory of 3028 1680 msedge.exe 85 PID 1680 wrote to memory of 3028 1680 msedge.exe 85 PID 1680 wrote to memory of 3028 1680 msedge.exe 85 PID 1680 wrote to memory of 3028 1680 msedge.exe 85 PID 1680 wrote to memory of 3028 1680 msedge.exe 85 PID 1680 wrote to memory of 3028 1680 msedge.exe 85 PID 1680 wrote to memory of 3028 1680 msedge.exe 85 PID 1680 wrote to memory of 3028 1680 msedge.exe 85 PID 1680 wrote to memory of 3028 1680 msedge.exe 85 PID 1680 wrote to memory of 3028 1680 msedge.exe 85 PID 1680 wrote to memory of 3028 1680 msedge.exe 85 PID 1680 wrote to memory of 3028 1680 msedge.exe 85 PID 1680 wrote to memory of 3028 1680 msedge.exe 85 PID 1680 wrote to memory of 3028 1680 msedge.exe 85 PID 1680 wrote to memory of 3028 1680 msedge.exe 85 PID 1680 wrote to memory of 3028 1680 msedge.exe 85 PID 1680 wrote to memory of 3028 1680 msedge.exe 85 PID 1680 wrote to memory of 3028 1680 msedge.exe 85 PID 1680 wrote to memory of 3028 1680 msedge.exe 85 PID 1680 wrote to memory of 3028 1680 msedge.exe 85 PID 1680 wrote to memory of 3028 1680 msedge.exe 85 PID 1680 wrote to memory of 3028 1680 msedge.exe 85 PID 1680 wrote to memory of 3028 1680 msedge.exe 85 PID 1680 wrote to memory of 4412 1680 msedge.exe 86 PID 1680 wrote to memory of 4412 1680 msedge.exe 86 PID 1680 wrote to memory of 2656 1680 msedge.exe 87 PID 1680 wrote to memory of 2656 1680 msedge.exe 87 PID 1680 wrote to memory of 2656 1680 msedge.exe 87 PID 1680 wrote to memory of 2656 1680 msedge.exe 87 PID 1680 wrote to memory of 2656 1680 msedge.exe 87 PID 1680 wrote to memory of 2656 1680 msedge.exe 87 PID 1680 wrote to memory of 2656 1680 msedge.exe 87 PID 1680 wrote to memory of 2656 1680 msedge.exe 87 PID 1680 wrote to memory of 2656 1680 msedge.exe 87 PID 1680 wrote to memory of 2656 1680 msedge.exe 87 PID 1680 wrote to memory of 2656 1680 msedge.exe 87 PID 1680 wrote to memory of 2656 1680 msedge.exe 87 PID 1680 wrote to memory of 2656 1680 msedge.exe 87 PID 1680 wrote to memory of 2656 1680 msedge.exe 87 PID 1680 wrote to memory of 2656 1680 msedge.exe 87 PID 1680 wrote to memory of 2656 1680 msedge.exe 87 PID 1680 wrote to memory of 2656 1680 msedge.exe 87 PID 1680 wrote to memory of 2656 1680 msedge.exe 87 PID 1680 wrote to memory of 2656 1680 msedge.exe 87 PID 1680 wrote to memory of 2656 1680 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\987f0dd0deef8b879fe20afe8fe45796_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaef7f46f8,0x7ffaef7f4708,0x7ffaef7f47182⤵PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,8910703118143397137,11901281848432799723,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,8910703118143397137,11901281848432799723,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,8910703118143397137,11901281848432799723,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2632 /prefetch:82⤵PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8910703118143397137,11901281848432799723,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8910703118143397137,11901281848432799723,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,8910703118143397137,11901281848432799723,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5276 /prefetch:82⤵PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,8910703118143397137,11901281848432799723,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5276 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8910703118143397137,11901281848432799723,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1704 /prefetch:12⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8910703118143397137,11901281848432799723,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8910703118143397137,11901281848432799723,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8910703118143397137,11901281848432799723,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,8910703118143397137,11901281848432799723,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4828 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:436
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3976
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4176
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
469B
MD51275706bfaa6137f763cb99856ba3cb6
SHA14fe5042509c4fa8bc4dd252cb86551502a75eaf8
SHA25614b2d3cd506ba56b026e9cfc72d44ae525e5b64e2de7c96bd89eaffd0c1226ad
SHA512cbca4cb4370d7b34cdfdaebee1cb3501fcdad06819b59d5bc947d91b2024c8c287ea41c7754aaa3c7bf39ad61dc24b9980df9b468b3ffd0329f23d6d1dc7db34
-
Filesize
6KB
MD5210b1a6a53d215e3533d416dfe457a22
SHA10f6f4a881438ff00e31305f982442ca23b0f8532
SHA256685bc322013435a38b723661732eb5b811122997a1a76663884905c175f45996
SHA512a57e56deab2a0980a08e3096e8287aeea2d0a79829a508785da29966c974133189fb0678fdb6b72d27530f1bca457ffa315461ea8359996321186ef6b2c1e8fa
-
Filesize
6KB
MD526f9dfe286c0292396c8d8daec8f80fc
SHA1f039b4e3da0fd48bc08e553a1489ddbef36cdd42
SHA256044524ad41a5d41f6facd834d5174a2fea0031aa79cd60f163e53d05d12756fd
SHA51283f9377df7e5eead85b5ea0beb0e353629b160511309100111bcec8ee89226356e7d31f74519e44afb95a49b59ee38a014f48affa6a2460f135f006eeff22836
-
Filesize
6KB
MD5c1ea648ca008235f398ec18c46c42afa
SHA1315e299a2a4357c91db5ddfc34dd3cfc6c72679a
SHA256c560d9fb63798e670c65c20946db239b5ba4f37493d1ad00e5c21f72368de81a
SHA5123ff5d2374f81ab2ab66b3b92b3add9e1a2eb0b5fe4971068af9c46b92304136c4b3fd78c0641aa10d3c7d8d00bea911e02f5472f5103ea159a5e095d7c848e1a
-
Filesize
372B
MD5ad8290f485c4ad5915cdc2f864fcd9c9
SHA14ec163c2e2c514edd9f179f6e215b54c875ed9cf
SHA2560fec0a69a2e198e9282d462c11d6436b33a88d761a6ea6e1be293a64a638b631
SHA512e94da511815ceb87a104623a9d862d9eb0278c0b7e15466f847d6f1eeaa1f9bc9f644d5342526eba2b256fd6ff7831db2ba63114535ae8fecc6a8c28a86e7977
-
Filesize
372B
MD52fa20aa98fefe4b6de7a2b0dfe2d91a3
SHA1d0c880d8f46abf0689e9fef5e3c18dd237b80f87
SHA2563d4211d194e3d41b049fb7040a504e429b903ffd56ddd2123d624a367575f9f2
SHA512461004180574bdb1d0bd3eca5e737fac607fdef714629e9d27beb8a57cae7c38e2d1e71d08294f75bf3b0f296679baae1bb7c1885b45f75db5edd6148c047267
-
Filesize
372B
MD561aecc4664041122d377c5648183d93a
SHA1b8f02ac693bbc7501941f3a4c306cda5bcdc4d61
SHA25697424bc61a275cd62a7043627994c674687bf387f389a7c34a20e35fbb654eb6
SHA512368423cc3221dcf05a09b4ff6d01572be3ab3d388c7217f2b3b5be638b863b6255fdcf0c5c33039c128b7704e40fa7ef2d0bd5c40404d99a5ce7c209186ff838
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD58d59bee47a38a78194e6793a479a9d83
SHA1eb44f1b5c046be40628c47bc0c94152f3871413d
SHA2564943271f46c7fdb2933bc7a45d94e747061f1646117842f7a4a424ab8b0975e2
SHA5127907e87fa670c6ee21c809abed2e498399b94c2b9244a867c8d57c97410472c0820683bba748b7660fcb439384d4b28c4f401e3f861dfcf5ec51aaf741e8d37b