Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10-06-2024 11:56
Static task
static1
Behavioral task
behavioral1
Sample
9a9478bb54fe4d451a9704a6ecad85e1_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9a9478bb54fe4d451a9704a6ecad85e1_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9a9478bb54fe4d451a9704a6ecad85e1_JaffaCakes118.html
-
Size
60KB
-
MD5
9a9478bb54fe4d451a9704a6ecad85e1
-
SHA1
a79880fd71a56384a8130363983cc8be1b60c79b
-
SHA256
f7d6cb2a7a2711bb0f927ab204269b1684f06323668ee056d4938f493f5d2bc4
-
SHA512
4e71ece2d034101ac7fd284be5ba7450f4023f6d7d37e6e900635062291c7edaef2b7c27cff8afe71807f0e1c46c087040c2b963d4b4a2ec3c4aacf535e04268
-
SSDEEP
1536:+FNECCgC2nkA6MQ0xWHcr0IPGNMxZPdJXxQJgxsntSy2+jxu6CzX7NL4cxNL4cU0:+fkA7/YHcr0uGNMxZPdJXxQJgxstSWj+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2600 msedge.exe 2600 msedge.exe 1364 msedge.exe 1364 msedge.exe 4880 identity_helper.exe 4880 identity_helper.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1364 wrote to memory of 2460 1364 msedge.exe 81 PID 1364 wrote to memory of 2460 1364 msedge.exe 81 PID 1364 wrote to memory of 5048 1364 msedge.exe 82 PID 1364 wrote to memory of 5048 1364 msedge.exe 82 PID 1364 wrote to memory of 5048 1364 msedge.exe 82 PID 1364 wrote to memory of 5048 1364 msedge.exe 82 PID 1364 wrote to memory of 5048 1364 msedge.exe 82 PID 1364 wrote to memory of 5048 1364 msedge.exe 82 PID 1364 wrote to memory of 5048 1364 msedge.exe 82 PID 1364 wrote to memory of 5048 1364 msedge.exe 82 PID 1364 wrote to memory of 5048 1364 msedge.exe 82 PID 1364 wrote to memory of 5048 1364 msedge.exe 82 PID 1364 wrote to memory of 5048 1364 msedge.exe 82 PID 1364 wrote to memory of 5048 1364 msedge.exe 82 PID 1364 wrote to memory of 5048 1364 msedge.exe 82 PID 1364 wrote to memory of 5048 1364 msedge.exe 82 PID 1364 wrote to memory of 5048 1364 msedge.exe 82 PID 1364 wrote to memory of 5048 1364 msedge.exe 82 PID 1364 wrote to memory of 5048 1364 msedge.exe 82 PID 1364 wrote to memory of 5048 1364 msedge.exe 82 PID 1364 wrote to memory of 5048 1364 msedge.exe 82 PID 1364 wrote to memory of 5048 1364 msedge.exe 82 PID 1364 wrote to memory of 5048 1364 msedge.exe 82 PID 1364 wrote to memory of 5048 1364 msedge.exe 82 PID 1364 wrote to memory of 5048 1364 msedge.exe 82 PID 1364 wrote to memory of 5048 1364 msedge.exe 82 PID 1364 wrote to memory of 5048 1364 msedge.exe 82 PID 1364 wrote to memory of 5048 1364 msedge.exe 82 PID 1364 wrote to memory of 5048 1364 msedge.exe 82 PID 1364 wrote to memory of 5048 1364 msedge.exe 82 PID 1364 wrote to memory of 5048 1364 msedge.exe 82 PID 1364 wrote to memory of 5048 1364 msedge.exe 82 PID 1364 wrote to memory of 5048 1364 msedge.exe 82 PID 1364 wrote to memory of 5048 1364 msedge.exe 82 PID 1364 wrote to memory of 5048 1364 msedge.exe 82 PID 1364 wrote to memory of 5048 1364 msedge.exe 82 PID 1364 wrote to memory of 5048 1364 msedge.exe 82 PID 1364 wrote to memory of 5048 1364 msedge.exe 82 PID 1364 wrote to memory of 5048 1364 msedge.exe 82 PID 1364 wrote to memory of 5048 1364 msedge.exe 82 PID 1364 wrote to memory of 5048 1364 msedge.exe 82 PID 1364 wrote to memory of 5048 1364 msedge.exe 82 PID 1364 wrote to memory of 2600 1364 msedge.exe 83 PID 1364 wrote to memory of 2600 1364 msedge.exe 83 PID 1364 wrote to memory of 4020 1364 msedge.exe 84 PID 1364 wrote to memory of 4020 1364 msedge.exe 84 PID 1364 wrote to memory of 4020 1364 msedge.exe 84 PID 1364 wrote to memory of 4020 1364 msedge.exe 84 PID 1364 wrote to memory of 4020 1364 msedge.exe 84 PID 1364 wrote to memory of 4020 1364 msedge.exe 84 PID 1364 wrote to memory of 4020 1364 msedge.exe 84 PID 1364 wrote to memory of 4020 1364 msedge.exe 84 PID 1364 wrote to memory of 4020 1364 msedge.exe 84 PID 1364 wrote to memory of 4020 1364 msedge.exe 84 PID 1364 wrote to memory of 4020 1364 msedge.exe 84 PID 1364 wrote to memory of 4020 1364 msedge.exe 84 PID 1364 wrote to memory of 4020 1364 msedge.exe 84 PID 1364 wrote to memory of 4020 1364 msedge.exe 84 PID 1364 wrote to memory of 4020 1364 msedge.exe 84 PID 1364 wrote to memory of 4020 1364 msedge.exe 84 PID 1364 wrote to memory of 4020 1364 msedge.exe 84 PID 1364 wrote to memory of 4020 1364 msedge.exe 84 PID 1364 wrote to memory of 4020 1364 msedge.exe 84 PID 1364 wrote to memory of 4020 1364 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9a9478bb54fe4d451a9704a6ecad85e1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd8c1346f8,0x7ffd8c134708,0x7ffd8c1347182⤵PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,1374896994869066550,13699069852486456419,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2192,1374896994869066550,13699069852486456419,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2192,1374896994869066550,13699069852486456419,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:82⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,1374896994869066550,13699069852486456419,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,1374896994869066550,13699069852486456419,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,1374896994869066550,13699069852486456419,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6000 /prefetch:82⤵PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,1374896994869066550,13699069852486456419,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6000 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,1374896994869066550,13699069852486456419,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,1374896994869066550,13699069852486456419,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,1374896994869066550,13699069852486456419,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,1374896994869066550,13699069852486456419,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,1374896994869066550,13699069852486456419,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4816 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1724
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2760
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4800
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
791B
MD5834a64571a9f3a2c1a05dd97deb52ba6
SHA1f5014b7b48f7aa5a45e6c434624fe7db024b5bc2
SHA256730cdf059bf45c0ab8320182dd06775fa18a5454d5a6c500f74b850eb6ea6ff1
SHA512d51453f8e2c1f8046ae7c4b12d2548e02032a471380977266d6af926668801cfeda7e2f8593874b6507be28636fe457fc1afdc34245d420e64f29d841be3fb21
-
Filesize
5KB
MD5bb6607e155f02d2d8235b0a4849d7466
SHA12d406a571af97e9e0c9b399e69f6248f7a27e073
SHA256c978e0ebe83cbb8038ff53e2cd91968c030c4edebbecb082fe7a1d7fc98e7a0c
SHA5128985071634fb7f2ab7742e5216aeb6593533b178e15721a838f5106d434a9a6bc2d8aed157a049f83ce7c7586099703526009aa67c81e3b42399e74c7c2f139c
-
Filesize
6KB
MD5d3d2b11d2616282732a723d412772b30
SHA17b6fba3d4969dfd81d0f503f0d85f9933789ae38
SHA2569e7ce486b146f48df98e38fd5dd50004fb1a8fe8bc81faf4eba92fc2e8ea9ec9
SHA512b2a8298cbf62ecc156a80fbe74b4c71dc72a4c9d8e60e8352da45bcdd8f431e64647dd82b4d533909d0c807187563fc2cd0dfc7128aa543ef673854bc408e8a5
-
Filesize
6KB
MD5a78ec69ef335140575141d8e7f8622c9
SHA19dd1aa52d0b0adb3b80ec76ecd9e5c8a41f72cb9
SHA2560a8beeadaa12e1d1841cad469f6db6cd617abcc15c8a956d85c25840871ad846
SHA51201f4bc0030ab38fb24ee70ca30e1141fac7f52876a8cb491f2fcb8372fc07f14d29ed83dd8fe902a182ce48d6ae78ac06ab28abfcc7d5a1ef7a8153e97fce353
-
Filesize
6KB
MD5c7c04d3f9cff8aa4ca34c832deb9a046
SHA11e979f7e73375b366af010bf8e698fee0ae881c9
SHA256329f1f3fa836a93c97c941defed3ec8943dcd8c9d4a9b881f3b71f5a71508329
SHA51245c1997f34a12c9bd239ad5bd05200ef1942a175dbb898bb236ef1f6b6750e956f19858e4c133afe6aefbfd284d7ac6ccf78008b300c52e38e7ae5447b66094e
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD54c21a9eed912a305264204b7c3d6c564
SHA13091b168d8a39f78c4e16c295d7c7fdafe40818f
SHA2568abcf1dd942ea4b213eb2ca5c945dbbd2136c0cddc5c05a2c34cc0b3b4b179de
SHA5122e44a14482b2011a89a68f4e61d8e7038453022e8dbddb7666aded7d70ce783753ccdaec96a49f839ac260c59006bfbf67c05d49f20c1c76af20fe16bbba9e93