Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10-06-2024 16:14
Static task
static1
Behavioral task
behavioral1
Sample
9b4520cf57584601c52eddbf5b2a3866_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9b4520cf57584601c52eddbf5b2a3866_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9b4520cf57584601c52eddbf5b2a3866_JaffaCakes118.html
-
Size
34KB
-
MD5
9b4520cf57584601c52eddbf5b2a3866
-
SHA1
2553a89035cac00434f03640eb4095e52dcd725b
-
SHA256
ba406946153198ee603d878bcbdcc66096e8d631731d6617838a0cbd2ff3a584
-
SHA512
cfd6efbedffde9b89ee5b1b412a5b63dfd3b9713fa111db1cfeb9faba0816135e13112f577e20a60edb4b891273e0b892a517f84f2cb216abc89b78231cf0c71
-
SSDEEP
768:cLFFkruKU4UHS1KEjpZCetcMClxvO/VHAa:AFFkruKUJS1KMpZCetnClxvO/VHAa
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4684 msedge.exe 4684 msedge.exe 2852 msedge.exe 2852 msedge.exe 2068 identity_helper.exe 2068 identity_helper.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2852 wrote to memory of 4448 2852 msedge.exe 81 PID 2852 wrote to memory of 4448 2852 msedge.exe 81 PID 2852 wrote to memory of 4228 2852 msedge.exe 82 PID 2852 wrote to memory of 4228 2852 msedge.exe 82 PID 2852 wrote to memory of 4228 2852 msedge.exe 82 PID 2852 wrote to memory of 4228 2852 msedge.exe 82 PID 2852 wrote to memory of 4228 2852 msedge.exe 82 PID 2852 wrote to memory of 4228 2852 msedge.exe 82 PID 2852 wrote to memory of 4228 2852 msedge.exe 82 PID 2852 wrote to memory of 4228 2852 msedge.exe 82 PID 2852 wrote to memory of 4228 2852 msedge.exe 82 PID 2852 wrote to memory of 4228 2852 msedge.exe 82 PID 2852 wrote to memory of 4228 2852 msedge.exe 82 PID 2852 wrote to memory of 4228 2852 msedge.exe 82 PID 2852 wrote to memory of 4228 2852 msedge.exe 82 PID 2852 wrote to memory of 4228 2852 msedge.exe 82 PID 2852 wrote to memory of 4228 2852 msedge.exe 82 PID 2852 wrote to memory of 4228 2852 msedge.exe 82 PID 2852 wrote to memory of 4228 2852 msedge.exe 82 PID 2852 wrote to memory of 4228 2852 msedge.exe 82 PID 2852 wrote to memory of 4228 2852 msedge.exe 82 PID 2852 wrote to memory of 4228 2852 msedge.exe 82 PID 2852 wrote to memory of 4228 2852 msedge.exe 82 PID 2852 wrote to memory of 4228 2852 msedge.exe 82 PID 2852 wrote to memory of 4228 2852 msedge.exe 82 PID 2852 wrote to memory of 4228 2852 msedge.exe 82 PID 2852 wrote to memory of 4228 2852 msedge.exe 82 PID 2852 wrote to memory of 4228 2852 msedge.exe 82 PID 2852 wrote to memory of 4228 2852 msedge.exe 82 PID 2852 wrote to memory of 4228 2852 msedge.exe 82 PID 2852 wrote to memory of 4228 2852 msedge.exe 82 PID 2852 wrote to memory of 4228 2852 msedge.exe 82 PID 2852 wrote to memory of 4228 2852 msedge.exe 82 PID 2852 wrote to memory of 4228 2852 msedge.exe 82 PID 2852 wrote to memory of 4228 2852 msedge.exe 82 PID 2852 wrote to memory of 4228 2852 msedge.exe 82 PID 2852 wrote to memory of 4228 2852 msedge.exe 82 PID 2852 wrote to memory of 4228 2852 msedge.exe 82 PID 2852 wrote to memory of 4228 2852 msedge.exe 82 PID 2852 wrote to memory of 4228 2852 msedge.exe 82 PID 2852 wrote to memory of 4228 2852 msedge.exe 82 PID 2852 wrote to memory of 4228 2852 msedge.exe 82 PID 2852 wrote to memory of 4684 2852 msedge.exe 83 PID 2852 wrote to memory of 4684 2852 msedge.exe 83 PID 2852 wrote to memory of 3168 2852 msedge.exe 84 PID 2852 wrote to memory of 3168 2852 msedge.exe 84 PID 2852 wrote to memory of 3168 2852 msedge.exe 84 PID 2852 wrote to memory of 3168 2852 msedge.exe 84 PID 2852 wrote to memory of 3168 2852 msedge.exe 84 PID 2852 wrote to memory of 3168 2852 msedge.exe 84 PID 2852 wrote to memory of 3168 2852 msedge.exe 84 PID 2852 wrote to memory of 3168 2852 msedge.exe 84 PID 2852 wrote to memory of 3168 2852 msedge.exe 84 PID 2852 wrote to memory of 3168 2852 msedge.exe 84 PID 2852 wrote to memory of 3168 2852 msedge.exe 84 PID 2852 wrote to memory of 3168 2852 msedge.exe 84 PID 2852 wrote to memory of 3168 2852 msedge.exe 84 PID 2852 wrote to memory of 3168 2852 msedge.exe 84 PID 2852 wrote to memory of 3168 2852 msedge.exe 84 PID 2852 wrote to memory of 3168 2852 msedge.exe 84 PID 2852 wrote to memory of 3168 2852 msedge.exe 84 PID 2852 wrote to memory of 3168 2852 msedge.exe 84 PID 2852 wrote to memory of 3168 2852 msedge.exe 84 PID 2852 wrote to memory of 3168 2852 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9b4520cf57584601c52eddbf5b2a3866_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd9eb546f8,0x7ffd9eb54708,0x7ffd9eb547182⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,12888088991700239325,5487167047841134275,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,12888088991700239325,5487167047841134275,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,12888088991700239325,5487167047841134275,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2648 /prefetch:82⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,12888088991700239325,5487167047841134275,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,12888088991700239325,5487167047841134275,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,12888088991700239325,5487167047841134275,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6076 /prefetch:82⤵PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,12888088991700239325,5487167047841134275,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6076 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,12888088991700239325,5487167047841134275,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:3304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,12888088991700239325,5487167047841134275,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:12⤵PID:1484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,12888088991700239325,5487167047841134275,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,12888088991700239325,5487167047841134275,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4076 /prefetch:12⤵PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,12888088991700239325,5487167047841134275,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4908 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3764
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1256
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2800
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
510B
MD5a04e11b74c459d10dfb5f8689a8786bb
SHA11e52d527c3f5697c7419c0c9cbcc0fa70731474d
SHA25675500587d021cabfae89337727061b74ec74b7d416b878285f02fdc4b2f92be0
SHA51283ab38a06a1ed6dee92a171e10df9363091a8bc43c9ac9a485035ec38d83d420c1ae110189f5b21708de3b076dc9cea5a36a1d9538c62fff61d89fa0044c63f2
-
Filesize
5KB
MD5529471f8dd83f0fe03d1a45e08b77955
SHA1192f72483e3c96d33b879c16e4b5ca793f29e9b1
SHA256113ab2983ad79281aeeb96720ff5bcdf005f3ebeac2fe26cc2a69a71af7ec31f
SHA512f3e8bb85209b19a94b88e42f73e753abe4890d93da3a9284e2a149eb1f0683066f988cc20cf36ad45e95f97357d9bc6b8cf9523e29d2a7b8aa47f1ef6839b99c
-
Filesize
6KB
MD5a04c9d2c99f225daa089607b64eb0746
SHA12ba8e7c2918f91c915353aff8df9cdae3b7e9027
SHA256183fa7fb2e392f6fadbdbf2f1946bc44be3facd8d830f984a44fbac8dec256ec
SHA512610bc541dac190635b8f9b1097a2dbaa432f2ed88e4df76f08a78a1048bd0baea017e1f0188568dc52b7a789f3d5f105eab9052b1bf8e6a99ee32bde613ef18f
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5f0e1a7cf4fbebb2ec43a93a934ddbbae
SHA19c8c5d2dcf7b98cf36f4d76bb6dcd9ce67985f23
SHA2563e92f64b52e49a3c34c4764d13a57588ad300d0c2737b843c6ab9ab918b899f4
SHA51260cc44837b6fd60befe542ec0fc06aa34f017c80f49da96574510797b5c209bedd94f645cf0c2fcc4ea677a5b797e0e235009cbf246b5d3a096e7e7e405687ca