Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
05-06-2024 18:25
Static task
static1
Behavioral task
behavioral1
Sample
98e87d7349e2160f72c3dbf5d508590c_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
98e87d7349e2160f72c3dbf5d508590c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
98e87d7349e2160f72c3dbf5d508590c_JaffaCakes118.html
-
Size
36KB
-
MD5
98e87d7349e2160f72c3dbf5d508590c
-
SHA1
6c92d125a9522a57c6bc64afeb2e30c4d36bc886
-
SHA256
9a26a93d185777279e9c6f2ef8bc936a3c022a9a461c286abac3f16e8409aa45
-
SHA512
81a454601d2e23c8fa3a8b2a876ebf8c6835461e5369914531eaad0c4f5b373cbfc298e95dfb08959f8481ea422af4d17ed3dc7f22a4a5977b42e3a3d42bff4c
-
SSDEEP
768:zwx/MDTHM288hAReiZPXUjE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6ThZOg6f9U56lO:Q//bJxNVNufSM/P8hK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2536 msedge.exe 2536 msedge.exe 3416 msedge.exe 3416 msedge.exe 4668 identity_helper.exe 4668 identity_helper.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3416 wrote to memory of 3976 3416 msedge.exe 81 PID 3416 wrote to memory of 3976 3416 msedge.exe 81 PID 3416 wrote to memory of 2672 3416 msedge.exe 83 PID 3416 wrote to memory of 2672 3416 msedge.exe 83 PID 3416 wrote to memory of 2672 3416 msedge.exe 83 PID 3416 wrote to memory of 2672 3416 msedge.exe 83 PID 3416 wrote to memory of 2672 3416 msedge.exe 83 PID 3416 wrote to memory of 2672 3416 msedge.exe 83 PID 3416 wrote to memory of 2672 3416 msedge.exe 83 PID 3416 wrote to memory of 2672 3416 msedge.exe 83 PID 3416 wrote to memory of 2672 3416 msedge.exe 83 PID 3416 wrote to memory of 2672 3416 msedge.exe 83 PID 3416 wrote to memory of 2672 3416 msedge.exe 83 PID 3416 wrote to memory of 2672 3416 msedge.exe 83 PID 3416 wrote to memory of 2672 3416 msedge.exe 83 PID 3416 wrote to memory of 2672 3416 msedge.exe 83 PID 3416 wrote to memory of 2672 3416 msedge.exe 83 PID 3416 wrote to memory of 2672 3416 msedge.exe 83 PID 3416 wrote to memory of 2672 3416 msedge.exe 83 PID 3416 wrote to memory of 2672 3416 msedge.exe 83 PID 3416 wrote to memory of 2672 3416 msedge.exe 83 PID 3416 wrote to memory of 2672 3416 msedge.exe 83 PID 3416 wrote to memory of 2672 3416 msedge.exe 83 PID 3416 wrote to memory of 2672 3416 msedge.exe 83 PID 3416 wrote to memory of 2672 3416 msedge.exe 83 PID 3416 wrote to memory of 2672 3416 msedge.exe 83 PID 3416 wrote to memory of 2672 3416 msedge.exe 83 PID 3416 wrote to memory of 2672 3416 msedge.exe 83 PID 3416 wrote to memory of 2672 3416 msedge.exe 83 PID 3416 wrote to memory of 2672 3416 msedge.exe 83 PID 3416 wrote to memory of 2672 3416 msedge.exe 83 PID 3416 wrote to memory of 2672 3416 msedge.exe 83 PID 3416 wrote to memory of 2672 3416 msedge.exe 83 PID 3416 wrote to memory of 2672 3416 msedge.exe 83 PID 3416 wrote to memory of 2672 3416 msedge.exe 83 PID 3416 wrote to memory of 2672 3416 msedge.exe 83 PID 3416 wrote to memory of 2672 3416 msedge.exe 83 PID 3416 wrote to memory of 2672 3416 msedge.exe 83 PID 3416 wrote to memory of 2672 3416 msedge.exe 83 PID 3416 wrote to memory of 2672 3416 msedge.exe 83 PID 3416 wrote to memory of 2672 3416 msedge.exe 83 PID 3416 wrote to memory of 2672 3416 msedge.exe 83 PID 3416 wrote to memory of 2536 3416 msedge.exe 84 PID 3416 wrote to memory of 2536 3416 msedge.exe 84 PID 3416 wrote to memory of 1968 3416 msedge.exe 85 PID 3416 wrote to memory of 1968 3416 msedge.exe 85 PID 3416 wrote to memory of 1968 3416 msedge.exe 85 PID 3416 wrote to memory of 1968 3416 msedge.exe 85 PID 3416 wrote to memory of 1968 3416 msedge.exe 85 PID 3416 wrote to memory of 1968 3416 msedge.exe 85 PID 3416 wrote to memory of 1968 3416 msedge.exe 85 PID 3416 wrote to memory of 1968 3416 msedge.exe 85 PID 3416 wrote to memory of 1968 3416 msedge.exe 85 PID 3416 wrote to memory of 1968 3416 msedge.exe 85 PID 3416 wrote to memory of 1968 3416 msedge.exe 85 PID 3416 wrote to memory of 1968 3416 msedge.exe 85 PID 3416 wrote to memory of 1968 3416 msedge.exe 85 PID 3416 wrote to memory of 1968 3416 msedge.exe 85 PID 3416 wrote to memory of 1968 3416 msedge.exe 85 PID 3416 wrote to memory of 1968 3416 msedge.exe 85 PID 3416 wrote to memory of 1968 3416 msedge.exe 85 PID 3416 wrote to memory of 1968 3416 msedge.exe 85 PID 3416 wrote to memory of 1968 3416 msedge.exe 85 PID 3416 wrote to memory of 1968 3416 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\98e87d7349e2160f72c3dbf5d508590c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x9c,0x108,0x7fffaf0346f8,0x7fffaf034708,0x7fffaf0347182⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,11109608347359127011,9250051941649989651,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:2672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2008,11109608347359127011,9250051941649989651,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2008,11109608347359127011,9250051941649989651,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2936 /prefetch:82⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,11109608347359127011,9250051941649989651,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2032 /prefetch:12⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,11109608347359127011,9250051941649989651,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,11109608347359127011,9250051941649989651,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 /prefetch:82⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,11109608347359127011,9250051941649989651,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,11109608347359127011,9250051941649989651,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:2816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,11109608347359127011,9250051941649989651,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:2540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,11109608347359127011,9250051941649989651,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,11109608347359127011,9250051941649989651,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,11109608347359127011,9250051941649989651,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4600
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4380
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
612B
MD58c84ae07828f61db19bc6377772972d1
SHA1632cfea3665a436fdd23b10c3c61be76c782cb21
SHA2561c7a0d36d1719c5b55ed0ad8e11268b5f55ef0896f9aa7f9de7570c08acd7873
SHA512dc0b161841edf281631a9a365c88a2a29f74cd29c9d6fc8862a535c988b9fd4a3534cade5339adf2238a1e2cf8a894b39bdba0ee11d0ccaad81650c58bdbf1b8
-
Filesize
5KB
MD5ae284a5158df4d16e53b0534a16aee59
SHA1dd2aa7b7d76b38bba1487121c25009d6efce47ba
SHA256cbd024156e26c0bf6ae4c2f844ba5a0e92da6dc8fd6075eaba20221f57d9750f
SHA51213d7f70828e52733172cb462cb053468dc2f639cc9f10c54e5a1746ae783f17212adb9b4ba1e233df9e28f804cd756be46d148cb4e9db89844218a1cbb7f7f6e
-
Filesize
6KB
MD5f4675ef09a674fa053edff6d4191b20b
SHA19355f7e99ff67835a735e2313228b0070dff870a
SHA256538dec183bb5f7133fca6aebaeb6233bd1531abd419d6633dab4cc0b63f47dcd
SHA51262f04343e113e5fa8a4bc5c5f9f598180e49c1d4f36bc5624a93bd5235641fc03b058fd36875e2859fd743ccae330da2e365b36e69c519eb1ead4b86ccce08b1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD598c824cc0339e6632620a9e049c59323
SHA1ca1ca3fed87af524c0426bca4939007c5980fc43
SHA256d3c61e0f9e72a1c2599e283081f1d86b718c0d2ff4b3a295278af09c09f84f4b
SHA512f6085c81759b37c0512a90e120b202413e839c309f319edb2b93fb463292b7ff89437c3651ce0c7447d1ed6a69ee06de516d1e53668a2a79af6e2ea521919f3e