Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10-06-2024 20:17
Static task
static1
Behavioral task
behavioral1
Sample
9bce05ca87e2824bd86eafb45674e2fe_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
9bce05ca87e2824bd86eafb45674e2fe_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9bce05ca87e2824bd86eafb45674e2fe_JaffaCakes118.html
-
Size
4KB
-
MD5
9bce05ca87e2824bd86eafb45674e2fe
-
SHA1
00f1e9f2d97306cabfab1b37649c15284f99f8bb
-
SHA256
17a16a5da94630fb6f6001ab3d0b29f986358a71a23036b928b2bf743f35c3a4
-
SHA512
20e6914b883de967d542b3d7c05735bb8d5f74f7a7f34c84fa8e16d92e72a3d1de29445c72fca36df5dc1f536264b8fbeb2e3dfdd16a668db9789845b558707b
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8orKX9d:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDP
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5080 msedge.exe 5080 msedge.exe 3500 msedge.exe 3500 msedge.exe 2084 identity_helper.exe 2084 identity_helper.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3500 wrote to memory of 4736 3500 msedge.exe 83 PID 3500 wrote to memory of 4736 3500 msedge.exe 83 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 5080 3500 msedge.exe 85 PID 3500 wrote to memory of 5080 3500 msedge.exe 85 PID 3500 wrote to memory of 2148 3500 msedge.exe 86 PID 3500 wrote to memory of 2148 3500 msedge.exe 86 PID 3500 wrote to memory of 2148 3500 msedge.exe 86 PID 3500 wrote to memory of 2148 3500 msedge.exe 86 PID 3500 wrote to memory of 2148 3500 msedge.exe 86 PID 3500 wrote to memory of 2148 3500 msedge.exe 86 PID 3500 wrote to memory of 2148 3500 msedge.exe 86 PID 3500 wrote to memory of 2148 3500 msedge.exe 86 PID 3500 wrote to memory of 2148 3500 msedge.exe 86 PID 3500 wrote to memory of 2148 3500 msedge.exe 86 PID 3500 wrote to memory of 2148 3500 msedge.exe 86 PID 3500 wrote to memory of 2148 3500 msedge.exe 86 PID 3500 wrote to memory of 2148 3500 msedge.exe 86 PID 3500 wrote to memory of 2148 3500 msedge.exe 86 PID 3500 wrote to memory of 2148 3500 msedge.exe 86 PID 3500 wrote to memory of 2148 3500 msedge.exe 86 PID 3500 wrote to memory of 2148 3500 msedge.exe 86 PID 3500 wrote to memory of 2148 3500 msedge.exe 86 PID 3500 wrote to memory of 2148 3500 msedge.exe 86 PID 3500 wrote to memory of 2148 3500 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9bce05ca87e2824bd86eafb45674e2fe_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaf44a46f8,0x7ffaf44a4708,0x7ffaf44a47182⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,15899127018501672505,17613138698764921187,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,15899127018501672505,17613138698764921187,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,15899127018501672505,17613138698764921187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2932 /prefetch:82⤵PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15899127018501672505,17613138698764921187,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15899127018501672505,17613138698764921187,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,15899127018501672505,17613138698764921187,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:82⤵PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,15899127018501672505,17613138698764921187,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15899127018501672505,17613138698764921187,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:3396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15899127018501672505,17613138698764921187,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15899127018501672505,17613138698764921187,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4172 /prefetch:12⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15899127018501672505,17613138698764921187,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3880 /prefetch:12⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,15899127018501672505,17613138698764921187,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2960 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4936
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4968
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
292B
MD5ee9ae74f8959779d86a2ca4c31e610be
SHA1ce9e80c031969ba82c3bbf73b6a0fc46644330d5
SHA256819b0f5bd5ec2e75c24b6667152f93f34dd6a23fe96f16ee2f4ccac24a33aadc
SHA512b242a3559e8da8ca3b40243af3f7388a93c2ad5086abb6e96ab2c983669edae9770471807d27ad46cb3fde7eecf885cd0ad020609e6af9b5ebea4fbde994b055
-
Filesize
6KB
MD515b83ea49e811a4e3aaeb9007fa6c577
SHA1f45e6be681cc505a5e132396907d04d42841fc89
SHA2566ba2568fd0bf3c9866b57a9c2aba0e2f56ade14a31d84223f225565630da1349
SHA5128ddd0f484ab4f77c7bf518b4c2a34f7f82a344defcc1c6378481106a317634f012c955adbc4ebc04e5aa693108991f7007e38f93932a654276ec60e2a958cd1f
-
Filesize
6KB
MD528088f17f0b1be98c0359012409ea101
SHA17534095af415bc445ade2e01dbb2ffdc225f2c73
SHA2561fca1079466b51663add62263591aa6f3b22d66f6a36997c8181ae99fab6bbf0
SHA51256937c44c4f5625236359c3cf6627f7a52c07b969bf05d6cf9799f17de0b4ae7bea4874becc8ac5abaab825968559dacbd0fbb9a8b92ca495df27b95a4b20403
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD585a7d03680403016ef8fca9f8070ef67
SHA137435557783670a1d6bd0f4980bcbc7f33a04511
SHA256bd72a8669301b067a563fe7b44d3e27df52314b7ae523f6c24ca710c474fd67c
SHA512068f28765f1cabd4b54c686abcb5e1fad240677a48d8fad5cd7d49c699c5dd963f49dd1ee649d9acc8feff6d8ad8f86473bb4cc3bbe17c9e517c6ef84371564e