Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-06-2024 23:57
Static task
static1
Behavioral task
behavioral1
Sample
9c5f374ecc26c0b7d445199e3c497ba5_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
9c5f374ecc26c0b7d445199e3c497ba5_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9c5f374ecc26c0b7d445199e3c497ba5_JaffaCakes118.html
-
Size
14KB
-
MD5
9c5f374ecc26c0b7d445199e3c497ba5
-
SHA1
d198b79d179e6df28bb9bee46e9c99ede35570df
-
SHA256
bdf4b33eaaf0dbd93438165ec864ad308ea5ce6c1af84a25cd382f082b4e261e
-
SHA512
5a148970edc62c025b0ed4af8bbe7e4116c80c03bae3362443dee96c8509e9fb4c89578c5184313ab802c4cf9061983cf432b285a458892367862000fe3ec26c
-
SSDEEP
192:YpRezDyQzqakcq/kW9OAk0K8Jhx/s3PXKgxO+TJWTp3TTTCTByrHATaVcM4Y:YpRezDy1Zcsk05JhNsygwI6d/sBO/n
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4328 msedge.exe 4328 msedge.exe 1868 msedge.exe 1868 msedge.exe 4688 identity_helper.exe 4688 identity_helper.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1868 wrote to memory of 1976 1868 msedge.exe 81 PID 1868 wrote to memory of 1976 1868 msedge.exe 81 PID 1868 wrote to memory of 3980 1868 msedge.exe 83 PID 1868 wrote to memory of 3980 1868 msedge.exe 83 PID 1868 wrote to memory of 3980 1868 msedge.exe 83 PID 1868 wrote to memory of 3980 1868 msedge.exe 83 PID 1868 wrote to memory of 3980 1868 msedge.exe 83 PID 1868 wrote to memory of 3980 1868 msedge.exe 83 PID 1868 wrote to memory of 3980 1868 msedge.exe 83 PID 1868 wrote to memory of 3980 1868 msedge.exe 83 PID 1868 wrote to memory of 3980 1868 msedge.exe 83 PID 1868 wrote to memory of 3980 1868 msedge.exe 83 PID 1868 wrote to memory of 3980 1868 msedge.exe 83 PID 1868 wrote to memory of 3980 1868 msedge.exe 83 PID 1868 wrote to memory of 3980 1868 msedge.exe 83 PID 1868 wrote to memory of 3980 1868 msedge.exe 83 PID 1868 wrote to memory of 3980 1868 msedge.exe 83 PID 1868 wrote to memory of 3980 1868 msedge.exe 83 PID 1868 wrote to memory of 3980 1868 msedge.exe 83 PID 1868 wrote to memory of 3980 1868 msedge.exe 83 PID 1868 wrote to memory of 3980 1868 msedge.exe 83 PID 1868 wrote to memory of 3980 1868 msedge.exe 83 PID 1868 wrote to memory of 3980 1868 msedge.exe 83 PID 1868 wrote to memory of 3980 1868 msedge.exe 83 PID 1868 wrote to memory of 3980 1868 msedge.exe 83 PID 1868 wrote to memory of 3980 1868 msedge.exe 83 PID 1868 wrote to memory of 3980 1868 msedge.exe 83 PID 1868 wrote to memory of 3980 1868 msedge.exe 83 PID 1868 wrote to memory of 3980 1868 msedge.exe 83 PID 1868 wrote to memory of 3980 1868 msedge.exe 83 PID 1868 wrote to memory of 3980 1868 msedge.exe 83 PID 1868 wrote to memory of 3980 1868 msedge.exe 83 PID 1868 wrote to memory of 3980 1868 msedge.exe 83 PID 1868 wrote to memory of 3980 1868 msedge.exe 83 PID 1868 wrote to memory of 3980 1868 msedge.exe 83 PID 1868 wrote to memory of 3980 1868 msedge.exe 83 PID 1868 wrote to memory of 3980 1868 msedge.exe 83 PID 1868 wrote to memory of 3980 1868 msedge.exe 83 PID 1868 wrote to memory of 3980 1868 msedge.exe 83 PID 1868 wrote to memory of 3980 1868 msedge.exe 83 PID 1868 wrote to memory of 3980 1868 msedge.exe 83 PID 1868 wrote to memory of 3980 1868 msedge.exe 83 PID 1868 wrote to memory of 4328 1868 msedge.exe 84 PID 1868 wrote to memory of 4328 1868 msedge.exe 84 PID 1868 wrote to memory of 336 1868 msedge.exe 85 PID 1868 wrote to memory of 336 1868 msedge.exe 85 PID 1868 wrote to memory of 336 1868 msedge.exe 85 PID 1868 wrote to memory of 336 1868 msedge.exe 85 PID 1868 wrote to memory of 336 1868 msedge.exe 85 PID 1868 wrote to memory of 336 1868 msedge.exe 85 PID 1868 wrote to memory of 336 1868 msedge.exe 85 PID 1868 wrote to memory of 336 1868 msedge.exe 85 PID 1868 wrote to memory of 336 1868 msedge.exe 85 PID 1868 wrote to memory of 336 1868 msedge.exe 85 PID 1868 wrote to memory of 336 1868 msedge.exe 85 PID 1868 wrote to memory of 336 1868 msedge.exe 85 PID 1868 wrote to memory of 336 1868 msedge.exe 85 PID 1868 wrote to memory of 336 1868 msedge.exe 85 PID 1868 wrote to memory of 336 1868 msedge.exe 85 PID 1868 wrote to memory of 336 1868 msedge.exe 85 PID 1868 wrote to memory of 336 1868 msedge.exe 85 PID 1868 wrote to memory of 336 1868 msedge.exe 85 PID 1868 wrote to memory of 336 1868 msedge.exe 85 PID 1868 wrote to memory of 336 1868 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9c5f374ecc26c0b7d445199e3c497ba5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa54c746f8,0x7ffa54c74708,0x7ffa54c747182⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,10059897534928501322,16868410367172002902,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,10059897534928501322,16868410367172002902,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,10059897534928501322,16868410367172002902,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2932 /prefetch:82⤵PID:336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10059897534928501322,16868410367172002902,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10059897534928501322,16868410367172002902,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,10059897534928501322,16868410367172002902,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4200 /prefetch:82⤵PID:2444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,10059897534928501322,16868410367172002902,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10059897534928501322,16868410367172002902,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10059897534928501322,16868410367172002902,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10059897534928501322,16868410367172002902,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4272 /prefetch:12⤵PID:2516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10059897534928501322,16868410367172002902,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:12⤵PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,10059897534928501322,16868410367172002902,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2316 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:676
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3120
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1148
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD5399d5298acd99e4db38431e92355263a
SHA1b4e89dcbaf12cc8e080ba495d13c5312861a8003
SHA256464e84f141431c1fe65d43311164df6ceb53719ffab4d9b9e9d032615d603198
SHA512132f708f479a5ddc58098f50aa7e4099d0ffc1d6d18dbcde56e1361de433752872b69e7b5583d7dff8793710ea1bd6cbd6685d448d6d33004f789b5a4e2dea5b
-
Filesize
6KB
MD5256d5d39d00d72b5be8ba1188bea234b
SHA12e612287ed9330f2d0987faf33ab83ad7db3cf5e
SHA2568f245c00092e9027bfce1dcc4bc55840934b44e0c826cceb11e07a204bad3b61
SHA5123b80a101d05b435172aa3013449ba6a4240ce935f63be4eddb4f9867303abca3708d01bff5c4fe98d42c8b9680fb8b4c077fa5d870b2801934eb0c2978a94963
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
8KB
MD515a0083ed940913b875c92fe6a998a06
SHA1644c107be15f3bae786646404e377ded0d5fbd6c
SHA2560e6989f2409bad320d8bce732ff6546aa11d1fb45fd3615b8fc9806de22068bf
SHA512bd22a421c018970ea0e1f9aa780fcb03632502235375a3ecfa9acba7015c6d83d40c01024878bfc2f09cc41fc6add589652efd0336ae91488b0a3f7da626b056