Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/06/2024, 13:31
Static task
static1
Behavioral task
behavioral1
Sample
9ad219a7043d47308c4a13c4f268648e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9ad219a7043d47308c4a13c4f268648e_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9ad219a7043d47308c4a13c4f268648e_JaffaCakes118.html
-
Size
32KB
-
MD5
9ad219a7043d47308c4a13c4f268648e
-
SHA1
7eed20729021ea4565fe98b49341837306bbab7c
-
SHA256
914e11471501b9d369155b6cf09d5709bcb48323ec055bbc06c7a1badc20ae30
-
SHA512
f5404f7e1ee04f001a9e3586a2692546688df18e9fa4612d9048032c5261126a5e0e8d1057f8a51ccd0875f4279eb6b45cec6b1f6955cd3cf47d2254a2022d8a
-
SSDEEP
768:O7swWJYB4//4NqbBhBgY99vyu/bLspXyu/bLspzw3L3IszziCyWlLcWV:O7FWeB4//8yB0Yrvyu/bLspXyu/bLspq
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2888 msedge.exe 2888 msedge.exe 460 msedge.exe 460 msedge.exe 1488 identity_helper.exe 1488 identity_helper.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 460 wrote to memory of 3452 460 msedge.exe 80 PID 460 wrote to memory of 3452 460 msedge.exe 80 PID 460 wrote to memory of 1736 460 msedge.exe 81 PID 460 wrote to memory of 1736 460 msedge.exe 81 PID 460 wrote to memory of 1736 460 msedge.exe 81 PID 460 wrote to memory of 1736 460 msedge.exe 81 PID 460 wrote to memory of 1736 460 msedge.exe 81 PID 460 wrote to memory of 1736 460 msedge.exe 81 PID 460 wrote to memory of 1736 460 msedge.exe 81 PID 460 wrote to memory of 1736 460 msedge.exe 81 PID 460 wrote to memory of 1736 460 msedge.exe 81 PID 460 wrote to memory of 1736 460 msedge.exe 81 PID 460 wrote to memory of 1736 460 msedge.exe 81 PID 460 wrote to memory of 1736 460 msedge.exe 81 PID 460 wrote to memory of 1736 460 msedge.exe 81 PID 460 wrote to memory of 1736 460 msedge.exe 81 PID 460 wrote to memory of 1736 460 msedge.exe 81 PID 460 wrote to memory of 1736 460 msedge.exe 81 PID 460 wrote to memory of 1736 460 msedge.exe 81 PID 460 wrote to memory of 1736 460 msedge.exe 81 PID 460 wrote to memory of 1736 460 msedge.exe 81 PID 460 wrote to memory of 1736 460 msedge.exe 81 PID 460 wrote to memory of 1736 460 msedge.exe 81 PID 460 wrote to memory of 1736 460 msedge.exe 81 PID 460 wrote to memory of 1736 460 msedge.exe 81 PID 460 wrote to memory of 1736 460 msedge.exe 81 PID 460 wrote to memory of 1736 460 msedge.exe 81 PID 460 wrote to memory of 1736 460 msedge.exe 81 PID 460 wrote to memory of 1736 460 msedge.exe 81 PID 460 wrote to memory of 1736 460 msedge.exe 81 PID 460 wrote to memory of 1736 460 msedge.exe 81 PID 460 wrote to memory of 1736 460 msedge.exe 81 PID 460 wrote to memory of 1736 460 msedge.exe 81 PID 460 wrote to memory of 1736 460 msedge.exe 81 PID 460 wrote to memory of 1736 460 msedge.exe 81 PID 460 wrote to memory of 1736 460 msedge.exe 81 PID 460 wrote to memory of 1736 460 msedge.exe 81 PID 460 wrote to memory of 1736 460 msedge.exe 81 PID 460 wrote to memory of 1736 460 msedge.exe 81 PID 460 wrote to memory of 1736 460 msedge.exe 81 PID 460 wrote to memory of 1736 460 msedge.exe 81 PID 460 wrote to memory of 1736 460 msedge.exe 81 PID 460 wrote to memory of 2888 460 msedge.exe 82 PID 460 wrote to memory of 2888 460 msedge.exe 82 PID 460 wrote to memory of 4284 460 msedge.exe 83 PID 460 wrote to memory of 4284 460 msedge.exe 83 PID 460 wrote to memory of 4284 460 msedge.exe 83 PID 460 wrote to memory of 4284 460 msedge.exe 83 PID 460 wrote to memory of 4284 460 msedge.exe 83 PID 460 wrote to memory of 4284 460 msedge.exe 83 PID 460 wrote to memory of 4284 460 msedge.exe 83 PID 460 wrote to memory of 4284 460 msedge.exe 83 PID 460 wrote to memory of 4284 460 msedge.exe 83 PID 460 wrote to memory of 4284 460 msedge.exe 83 PID 460 wrote to memory of 4284 460 msedge.exe 83 PID 460 wrote to memory of 4284 460 msedge.exe 83 PID 460 wrote to memory of 4284 460 msedge.exe 83 PID 460 wrote to memory of 4284 460 msedge.exe 83 PID 460 wrote to memory of 4284 460 msedge.exe 83 PID 460 wrote to memory of 4284 460 msedge.exe 83 PID 460 wrote to memory of 4284 460 msedge.exe 83 PID 460 wrote to memory of 4284 460 msedge.exe 83 PID 460 wrote to memory of 4284 460 msedge.exe 83 PID 460 wrote to memory of 4284 460 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9ad219a7043d47308c4a13c4f268648e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb55f646f8,0x7ffb55f64708,0x7ffb55f647182⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,7502249573065895353,6668356359788080767,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,7502249573065895353,6668356359788080767,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2452 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,7502249573065895353,6668356359788080767,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,7502249573065895353,6668356359788080767,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,7502249573065895353,6668356359788080767,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,7502249573065895353,6668356359788080767,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1760 /prefetch:12⤵PID:2076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,7502249573065895353,6668356359788080767,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1292 /prefetch:12⤵PID:3300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,7502249573065895353,6668356359788080767,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5664 /prefetch:82⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,7502249573065895353,6668356359788080767,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5664 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,7502249573065895353,6668356359788080767,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,7502249573065895353,6668356359788080767,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,7502249573065895353,6668356359788080767,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4924 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3896
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3104
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4500
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
455B
MD5aa1cd2f03f99c99cda75118a24d42e51
SHA113ccaf72506bd726367f641d2e7237b094966705
SHA256219cae45f576e06dfa2ae06cdbf62879b240de42376a2c17c1b60fe63fa04a08
SHA512f43aca9c80a6c03c43edd4e364530e7e573a54aa1152cfd5a5da808693179bcb79aec2b298897a1437c9d27597d723222895767dcc8799d8cf5543846e7eabd5
-
Filesize
5KB
MD5cb3eca9666b6efc40ec13c622be4ace1
SHA1f503d273af0ce1dfabb0729f7821e04e92cc4dea
SHA2566a371f427097500c0861b2be9f83c259ef977abfb03f7a48222f2939c5ea4470
SHA51242f0f7bb534dfba43415f29d3355d08b604483fbf422f549bc882353f45f912a204c1efc7639143f5504cf245a30b0d91ff14c6f5a77c9fc2360ff15044b1fe1
-
Filesize
6KB
MD5d1b2b4dec4986321c1c94fb212929fa3
SHA11637c39beabb9aec51328bd3116887c934154137
SHA2567bcfc39dbf805b7cef61205ac8e735386221e852f3261b1d8f4cefa078a524aa
SHA51204fb666cbe99fdafed12073511d42492b1db28f74a19efe7b10797f820955d171074d303bfe1b63be7fe7bced27e36301a0cc5b0e7d445aedb19fdaa7f695e23
-
Filesize
6KB
MD521d28c3386c5d68f9feb732b905767e4
SHA1cd1f2be0cc0e3f31de0f588aea24bc94e70c82a9
SHA256dae8fced140a64805d568d3ce518d4835c36723cd312c2297695091d3b18fe21
SHA5123c2b3d3ed9c780701ff60543ecdba9a572cb65097227b26a33405e047359ccc71dac7e0dffd65b4f87fd5e92aa6ef71996d2b0f6a9ca418b82c112b42645812b
-
Filesize
539B
MD56c5cdcf95dda6eab11310364f79b2384
SHA160e7207ed226fef3aea02707789342240dd9fa22
SHA25684c9ffa66368b611dc596804925a76196a9ddc163c5ce79c6cd7325842adde63
SHA512f140f354d26fa123ccf61ead37cdabc1f88dc0793a70ea78344874f631009b91aba59b2e284228aa1e1785143020c25ae7c43dbabe1926b52b6bdf60eff59599
-
Filesize
539B
MD5eb340c0a26a096b880b134928326cecd
SHA1aa1f190f5c730ba1c9f2efa372756f3c5f2d5f22
SHA2568b27a1d29c53f8e9892c6f9d41d3c1fd4ece95fc5168e0dc3732fabae784d2d6
SHA512111eb17512a53ba146017a8eea1eadf5093aaa27eb94072cf20526c9de2ed94daaf423a0c4817280db05b2584696b04943655de7f30e84bf0caa5a48bdaf4a91
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD54a7c6b42a4c11b3f85d956f2b57a1c3c
SHA1eb58d92307914df700021506c97ba37097435305
SHA25630a2912b50d50ce8cedf7235e5e7d03e79b494fb515e4b08f61779cd832c2400
SHA512832552c56aeb576e4ea72636f8034359a6717ff44846cf32c73d1d2fd39a131114b6679e22b1ffeb4ca0a5d6091ef7e2f7160a0da869af543acf0ed4188b1c20