Analysis
-
max time kernel
145s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
05-06-2024 18:12
Static task
static1
Behavioral task
behavioral1
Sample
98e2158a08d60cd319d1d16595a42da2_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
98e2158a08d60cd319d1d16595a42da2_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
98e2158a08d60cd319d1d16595a42da2_JaffaCakes118.html
-
Size
27KB
-
MD5
98e2158a08d60cd319d1d16595a42da2
-
SHA1
39d0b30b303b1ed50975bd98a37d0b097eda78d6
-
SHA256
8b91ecbdcf898dce64205c6bd59162662bfc1bf6fa9bfc8302c5d155955073dd
-
SHA512
432a84666aa543ede17edf576f649e66619a7875252cbf1042dd81c15abf2614fdf93c7d51ea727fb04ac89fcc87ac9ea8b2fbd4795716eded2d7f4e7d5647bf
-
SSDEEP
192:uwfAb5nqenQjxn5Q/ZnQiecNnInQOkEntv/nQTbnZnQ9euUm6uBUCQl7MB8qnYnu:DQ/A/sYUVSmp2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4308 msedge.exe 4308 msedge.exe 3720 msedge.exe 3720 msedge.exe 1832 identity_helper.exe 1832 identity_helper.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3720 wrote to memory of 5112 3720 msedge.exe 82 PID 3720 wrote to memory of 5112 3720 msedge.exe 82 PID 3720 wrote to memory of 1604 3720 msedge.exe 83 PID 3720 wrote to memory of 1604 3720 msedge.exe 83 PID 3720 wrote to memory of 1604 3720 msedge.exe 83 PID 3720 wrote to memory of 1604 3720 msedge.exe 83 PID 3720 wrote to memory of 1604 3720 msedge.exe 83 PID 3720 wrote to memory of 1604 3720 msedge.exe 83 PID 3720 wrote to memory of 1604 3720 msedge.exe 83 PID 3720 wrote to memory of 1604 3720 msedge.exe 83 PID 3720 wrote to memory of 1604 3720 msedge.exe 83 PID 3720 wrote to memory of 1604 3720 msedge.exe 83 PID 3720 wrote to memory of 1604 3720 msedge.exe 83 PID 3720 wrote to memory of 1604 3720 msedge.exe 83 PID 3720 wrote to memory of 1604 3720 msedge.exe 83 PID 3720 wrote to memory of 1604 3720 msedge.exe 83 PID 3720 wrote to memory of 1604 3720 msedge.exe 83 PID 3720 wrote to memory of 1604 3720 msedge.exe 83 PID 3720 wrote to memory of 1604 3720 msedge.exe 83 PID 3720 wrote to memory of 1604 3720 msedge.exe 83 PID 3720 wrote to memory of 1604 3720 msedge.exe 83 PID 3720 wrote to memory of 1604 3720 msedge.exe 83 PID 3720 wrote to memory of 1604 3720 msedge.exe 83 PID 3720 wrote to memory of 1604 3720 msedge.exe 83 PID 3720 wrote to memory of 1604 3720 msedge.exe 83 PID 3720 wrote to memory of 1604 3720 msedge.exe 83 PID 3720 wrote to memory of 1604 3720 msedge.exe 83 PID 3720 wrote to memory of 1604 3720 msedge.exe 83 PID 3720 wrote to memory of 1604 3720 msedge.exe 83 PID 3720 wrote to memory of 1604 3720 msedge.exe 83 PID 3720 wrote to memory of 1604 3720 msedge.exe 83 PID 3720 wrote to memory of 1604 3720 msedge.exe 83 PID 3720 wrote to memory of 1604 3720 msedge.exe 83 PID 3720 wrote to memory of 1604 3720 msedge.exe 83 PID 3720 wrote to memory of 1604 3720 msedge.exe 83 PID 3720 wrote to memory of 1604 3720 msedge.exe 83 PID 3720 wrote to memory of 1604 3720 msedge.exe 83 PID 3720 wrote to memory of 1604 3720 msedge.exe 83 PID 3720 wrote to memory of 1604 3720 msedge.exe 83 PID 3720 wrote to memory of 1604 3720 msedge.exe 83 PID 3720 wrote to memory of 1604 3720 msedge.exe 83 PID 3720 wrote to memory of 1604 3720 msedge.exe 83 PID 3720 wrote to memory of 4308 3720 msedge.exe 84 PID 3720 wrote to memory of 4308 3720 msedge.exe 84 PID 3720 wrote to memory of 2420 3720 msedge.exe 85 PID 3720 wrote to memory of 2420 3720 msedge.exe 85 PID 3720 wrote to memory of 2420 3720 msedge.exe 85 PID 3720 wrote to memory of 2420 3720 msedge.exe 85 PID 3720 wrote to memory of 2420 3720 msedge.exe 85 PID 3720 wrote to memory of 2420 3720 msedge.exe 85 PID 3720 wrote to memory of 2420 3720 msedge.exe 85 PID 3720 wrote to memory of 2420 3720 msedge.exe 85 PID 3720 wrote to memory of 2420 3720 msedge.exe 85 PID 3720 wrote to memory of 2420 3720 msedge.exe 85 PID 3720 wrote to memory of 2420 3720 msedge.exe 85 PID 3720 wrote to memory of 2420 3720 msedge.exe 85 PID 3720 wrote to memory of 2420 3720 msedge.exe 85 PID 3720 wrote to memory of 2420 3720 msedge.exe 85 PID 3720 wrote to memory of 2420 3720 msedge.exe 85 PID 3720 wrote to memory of 2420 3720 msedge.exe 85 PID 3720 wrote to memory of 2420 3720 msedge.exe 85 PID 3720 wrote to memory of 2420 3720 msedge.exe 85 PID 3720 wrote to memory of 2420 3720 msedge.exe 85 PID 3720 wrote to memory of 2420 3720 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\98e2158a08d60cd319d1d16595a42da2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc63f746f8,0x7ffc63f74708,0x7ffc63f747182⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,5772792930463365363,2986913201698171702,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2008,5772792930463365363,2986913201698171702,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2008,5772792930463365363,2986913201698171702,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,5772792930463365363,2986913201698171702,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:1992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,5772792930463365363,2986913201698171702,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,5772792930463365363,2986913201698171702,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1296 /prefetch:82⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,5772792930463365363,2986913201698171702,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1296 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,5772792930463365363,2986913201698171702,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:12⤵PID:3828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,5772792930463365363,2986913201698171702,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3956 /prefetch:12⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,5772792930463365363,2986913201698171702,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1828 /prefetch:12⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,5772792930463365363,2986913201698171702,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:12⤵PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,5772792930463365363,2986913201698171702,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2000 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4060
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1332
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4280
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
5KB
MD52246f98b282c8faf22cac3bc6f4fed28
SHA1f79ba98d50a94913ec86fbcbb4efbb49e889cea8
SHA256a917a7849a373fed6a58fa9dbd7f191988ff638d7e3ce0bef7a8cefa82d51857
SHA512f84766835a5cc2d404ce97f7d552334048247f9cffa1f5a13de60fdd34e7f1c99ad3aaa58f6baca4d93905683948e4a86c45f08cd52e5906e1215bddddaf3e26
-
Filesize
6KB
MD5c719a5f3700af9182c54eb6572c6d5d3
SHA1a86eec421dc251df8446885c2e277fa721a76fae
SHA256b6359146b169215e6cf5cd4f24c6bc8efdf9af4d882cd9d08579224193867a93
SHA512108f45796a80569eef51f7e01f7affed1763069f99526678d1f8076f5cac9c4973046209b850292ee080620b17692ebb96b6f1c9abb331dd1a723409657c5837
-
Filesize
6KB
MD52b72d1bbff2ad1c29eb35d92f2d90593
SHA14cdfdce80ee696f9f798ed9822af6911920599d2
SHA256fa9e5f55685ffb5f9cb497c3be79c5c9f9bc43652f871c7e5640dd4c59dcacb7
SHA512a30627dfc571e4093c53d1ad587feea99353a4ed88ac1e608617ebf637a05406f246fbd725304c8916d06a50b0c88f82ffa1f354031d41c60990021c8d162ca0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5698d46241a1de798060e6eb85f3196bd
SHA11a8400c674eadf0b7668414d0ebfe5665d1f6952
SHA25693ea4b7ee0fb3b944f3cbf8054e200ef43d5ca94e4c6c360c9216a0b0735f4b5
SHA5127fb142c739c304ee436c3d13fe4a24ce23bbf0290e6b7ddd7c618182d013f78d0a93bf8d3fbb0e46e8a58b77304c1eb26b177e88addd77042960c1cd48351895