Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/06/2024, 14:27
Static task
static1
Behavioral task
behavioral1
Sample
9afb9683a254409cc04402fb16dc61c6_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9afb9683a254409cc04402fb16dc61c6_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9afb9683a254409cc04402fb16dc61c6_JaffaCakes118.html
-
Size
267KB
-
MD5
9afb9683a254409cc04402fb16dc61c6
-
SHA1
b90114882d356833f2e87e3e808c4069ea6032c5
-
SHA256
ebcf50440d59fa63f5c66ae9c7910d34ede277480d6a973b932b644ef58a42d3
-
SHA512
ad56587e0a509d6aa0b5fe2ea50c1775bdca7200dd5ce71d47b165cdb1f8701f92669494a64721efa817a8815fde43c30cc2b5fa82da203280b93fb6d09308e5
-
SSDEEP
3072:pctu+rXioBGlWBmFRgmLMEan1NnICpAK6iDPfH+QeZBb:0YlImFicMR1LpAK6iDPfeQub
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3680 msedge.exe 3680 msedge.exe 1940 msedge.exe 1940 msedge.exe 2052 identity_helper.exe 2052 identity_helper.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1940 wrote to memory of 2668 1940 msedge.exe 81 PID 1940 wrote to memory of 2668 1940 msedge.exe 81 PID 1940 wrote to memory of 5040 1940 msedge.exe 82 PID 1940 wrote to memory of 5040 1940 msedge.exe 82 PID 1940 wrote to memory of 5040 1940 msedge.exe 82 PID 1940 wrote to memory of 5040 1940 msedge.exe 82 PID 1940 wrote to memory of 5040 1940 msedge.exe 82 PID 1940 wrote to memory of 5040 1940 msedge.exe 82 PID 1940 wrote to memory of 5040 1940 msedge.exe 82 PID 1940 wrote to memory of 5040 1940 msedge.exe 82 PID 1940 wrote to memory of 5040 1940 msedge.exe 82 PID 1940 wrote to memory of 5040 1940 msedge.exe 82 PID 1940 wrote to memory of 5040 1940 msedge.exe 82 PID 1940 wrote to memory of 5040 1940 msedge.exe 82 PID 1940 wrote to memory of 5040 1940 msedge.exe 82 PID 1940 wrote to memory of 5040 1940 msedge.exe 82 PID 1940 wrote to memory of 5040 1940 msedge.exe 82 PID 1940 wrote to memory of 5040 1940 msedge.exe 82 PID 1940 wrote to memory of 5040 1940 msedge.exe 82 PID 1940 wrote to memory of 5040 1940 msedge.exe 82 PID 1940 wrote to memory of 5040 1940 msedge.exe 82 PID 1940 wrote to memory of 5040 1940 msedge.exe 82 PID 1940 wrote to memory of 5040 1940 msedge.exe 82 PID 1940 wrote to memory of 5040 1940 msedge.exe 82 PID 1940 wrote to memory of 5040 1940 msedge.exe 82 PID 1940 wrote to memory of 5040 1940 msedge.exe 82 PID 1940 wrote to memory of 5040 1940 msedge.exe 82 PID 1940 wrote to memory of 5040 1940 msedge.exe 82 PID 1940 wrote to memory of 5040 1940 msedge.exe 82 PID 1940 wrote to memory of 5040 1940 msedge.exe 82 PID 1940 wrote to memory of 5040 1940 msedge.exe 82 PID 1940 wrote to memory of 5040 1940 msedge.exe 82 PID 1940 wrote to memory of 5040 1940 msedge.exe 82 PID 1940 wrote to memory of 5040 1940 msedge.exe 82 PID 1940 wrote to memory of 5040 1940 msedge.exe 82 PID 1940 wrote to memory of 5040 1940 msedge.exe 82 PID 1940 wrote to memory of 5040 1940 msedge.exe 82 PID 1940 wrote to memory of 5040 1940 msedge.exe 82 PID 1940 wrote to memory of 5040 1940 msedge.exe 82 PID 1940 wrote to memory of 5040 1940 msedge.exe 82 PID 1940 wrote to memory of 5040 1940 msedge.exe 82 PID 1940 wrote to memory of 5040 1940 msedge.exe 82 PID 1940 wrote to memory of 3680 1940 msedge.exe 83 PID 1940 wrote to memory of 3680 1940 msedge.exe 83 PID 1940 wrote to memory of 1032 1940 msedge.exe 84 PID 1940 wrote to memory of 1032 1940 msedge.exe 84 PID 1940 wrote to memory of 1032 1940 msedge.exe 84 PID 1940 wrote to memory of 1032 1940 msedge.exe 84 PID 1940 wrote to memory of 1032 1940 msedge.exe 84 PID 1940 wrote to memory of 1032 1940 msedge.exe 84 PID 1940 wrote to memory of 1032 1940 msedge.exe 84 PID 1940 wrote to memory of 1032 1940 msedge.exe 84 PID 1940 wrote to memory of 1032 1940 msedge.exe 84 PID 1940 wrote to memory of 1032 1940 msedge.exe 84 PID 1940 wrote to memory of 1032 1940 msedge.exe 84 PID 1940 wrote to memory of 1032 1940 msedge.exe 84 PID 1940 wrote to memory of 1032 1940 msedge.exe 84 PID 1940 wrote to memory of 1032 1940 msedge.exe 84 PID 1940 wrote to memory of 1032 1940 msedge.exe 84 PID 1940 wrote to memory of 1032 1940 msedge.exe 84 PID 1940 wrote to memory of 1032 1940 msedge.exe 84 PID 1940 wrote to memory of 1032 1940 msedge.exe 84 PID 1940 wrote to memory of 1032 1940 msedge.exe 84 PID 1940 wrote to memory of 1032 1940 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9afb9683a254409cc04402fb16dc61c6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ffe344246f8,0x7ffe34424708,0x7ffe344247182⤵PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,18124123123822615559,17751849487262112706,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,18124123123822615559,17751849487262112706,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,18124123123822615559,17751849487262112706,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,18124123123822615559,17751849487262112706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,18124123123822615559,17751849487262112706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,18124123123822615559,17751849487262112706,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3868 /prefetch:82⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,18124123123822615559,17751849487262112706,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3868 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,18124123123822615559,17751849487262112706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,18124123123822615559,17751849487262112706,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,18124123123822615559,17751849487262112706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6072 /prefetch:12⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,18124123123822615559,17751849487262112706,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2404 /prefetch:12⤵PID:924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,18124123123822615559,17751849487262112706,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4888 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4068
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3984
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:8
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
893B
MD5d4ae187b4574036c2d76b6df8a8c1a30
SHA1b06f409fa14bab33cbaf4a37811b8740b624d9e5
SHA256a2ce3a0fa7d2a833d1801e01ec48e35b70d84f3467cc9f8fab370386e13879c7
SHA5121f44a360e8bb8ada22bc5bfe001f1babb4e72005a46bc2a94c33c4bd149ff256cce6f35d65ca4f7fc2a5b9e15494155449830d2809c8cf218d0b9196ec646b0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
Filesize252B
MD50af2d83cd5bf98a0f722f21126f22086
SHA1a8fe72b7a696716396f8bb8cefd8ecc36b3cda2d
SHA25650dd2d972ad94b62131d2205da343c25a54923ad15b1b830a999a23ed1d27981
SHA512dbee0b8840a5aab9a86e6aa360e9f6b6a463973966a734ea7113d4de444818f4a4061209defbfdee40d401eb2cdb1b9b19cf921237b506bb581e7fd8dcc7c851
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
819B
MD5d93a473fd37c23ae7dae87c2182ad41e
SHA16cb53b3ef498b70b15c7641ff8919949807f7615
SHA2569bbdc266e87e825b4b87c32dc2b6c60e27ba51b047b91ee33ab2ff9d2774e046
SHA5122329465dcf2e554a85de4a09bd4ef44fed4d9d670b101467d9579b25c9205bbe49820254d2d445b03598b4fc0e1b44e719ebeee1249b6d4953a1a94f34025964
-
Filesize
7KB
MD5540a9f351c6053b156d7b0d102fbbc84
SHA1626672438e2f6fad5eb9b8d0abd13e688dfb9d93
SHA2567c0c086b12b2edd4437afcdbea0843038dca835030e3e5760451aeb7f30cf898
SHA5127439c97fca5343e4813e60d68ea905704e15368b82d262cb2d3cd6e18e1f44814738bba537e4d95b182a89baec941aa220db99b790f9397b21f400de0c60341c
-
Filesize
5KB
MD52fca78e56c07f0350674a2e48a9d458b
SHA1107fcfc57f78dc13906b4e8507c9a2afb96418b9
SHA256efa5851807cac470cb258b7cf4cbc629f2eb0399bd3a3cba37335064c3ae046c
SHA5127139e30902bb24801fbe6503568a5313b0c40ef32caf1126baffde694d2df64136cea77642413345e70e456f0a8af63deb0b5bff453bc2fc629143f8930634a0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5a286f17e4751705556dbee34473b457b
SHA1a26e3d193e55aec567ddb0ea9effe2eb6caf5f0f
SHA256f4a82aced39286261662f38d652be5c0b19f849c30ef3e31483ade32dcc0e2f5
SHA5126bce9d634c14bec9fa08ac6bbbfa1012e2e0e5a61c1eda367de817e15e03e0eea2f9bd9432deedbb1c0a9ec3cf67362006372d3f5689eb914143d689144faf5f