Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11-06-2024 04:40
Static task
static1
Behavioral task
behavioral1
Sample
9d0167601c2db343c45b5303fda83141_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9d0167601c2db343c45b5303fda83141_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9d0167601c2db343c45b5303fda83141_JaffaCakes118.html
-
Size
33KB
-
MD5
9d0167601c2db343c45b5303fda83141
-
SHA1
d924cd1890d00c273bc418dc1ae0f1cb5f1523d6
-
SHA256
447fc2b7326e234156d515505ea59f82fa3617a8e15b149448ca306e94da2e53
-
SHA512
15cc132c703fb227701e392e2606cf2beca4b0c6af58350a40dc8498503f0bc45b9ab5c06da0072ee4fc41b99c18dedbc8e444959c5c8527c322b9c53c740607
-
SSDEEP
768:i8EG5PbdgiuuWKplQDBqxb98575XgjjcN7sVdrajf6qkYzQSkLphgC:i8F5PbdgiuuWKpeDBqxb98575XgjjcNo
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1076 msedge.exe 1076 msedge.exe 1124 msedge.exe 1124 msedge.exe 1556 identity_helper.exe 1556 identity_helper.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1124 wrote to memory of 928 1124 msedge.exe 81 PID 1124 wrote to memory of 928 1124 msedge.exe 81 PID 1124 wrote to memory of 1344 1124 msedge.exe 82 PID 1124 wrote to memory of 1344 1124 msedge.exe 82 PID 1124 wrote to memory of 1344 1124 msedge.exe 82 PID 1124 wrote to memory of 1344 1124 msedge.exe 82 PID 1124 wrote to memory of 1344 1124 msedge.exe 82 PID 1124 wrote to memory of 1344 1124 msedge.exe 82 PID 1124 wrote to memory of 1344 1124 msedge.exe 82 PID 1124 wrote to memory of 1344 1124 msedge.exe 82 PID 1124 wrote to memory of 1344 1124 msedge.exe 82 PID 1124 wrote to memory of 1344 1124 msedge.exe 82 PID 1124 wrote to memory of 1344 1124 msedge.exe 82 PID 1124 wrote to memory of 1344 1124 msedge.exe 82 PID 1124 wrote to memory of 1344 1124 msedge.exe 82 PID 1124 wrote to memory of 1344 1124 msedge.exe 82 PID 1124 wrote to memory of 1344 1124 msedge.exe 82 PID 1124 wrote to memory of 1344 1124 msedge.exe 82 PID 1124 wrote to memory of 1344 1124 msedge.exe 82 PID 1124 wrote to memory of 1344 1124 msedge.exe 82 PID 1124 wrote to memory of 1344 1124 msedge.exe 82 PID 1124 wrote to memory of 1344 1124 msedge.exe 82 PID 1124 wrote to memory of 1344 1124 msedge.exe 82 PID 1124 wrote to memory of 1344 1124 msedge.exe 82 PID 1124 wrote to memory of 1344 1124 msedge.exe 82 PID 1124 wrote to memory of 1344 1124 msedge.exe 82 PID 1124 wrote to memory of 1344 1124 msedge.exe 82 PID 1124 wrote to memory of 1344 1124 msedge.exe 82 PID 1124 wrote to memory of 1344 1124 msedge.exe 82 PID 1124 wrote to memory of 1344 1124 msedge.exe 82 PID 1124 wrote to memory of 1344 1124 msedge.exe 82 PID 1124 wrote to memory of 1344 1124 msedge.exe 82 PID 1124 wrote to memory of 1344 1124 msedge.exe 82 PID 1124 wrote to memory of 1344 1124 msedge.exe 82 PID 1124 wrote to memory of 1344 1124 msedge.exe 82 PID 1124 wrote to memory of 1344 1124 msedge.exe 82 PID 1124 wrote to memory of 1344 1124 msedge.exe 82 PID 1124 wrote to memory of 1344 1124 msedge.exe 82 PID 1124 wrote to memory of 1344 1124 msedge.exe 82 PID 1124 wrote to memory of 1344 1124 msedge.exe 82 PID 1124 wrote to memory of 1344 1124 msedge.exe 82 PID 1124 wrote to memory of 1344 1124 msedge.exe 82 PID 1124 wrote to memory of 1076 1124 msedge.exe 83 PID 1124 wrote to memory of 1076 1124 msedge.exe 83 PID 1124 wrote to memory of 4060 1124 msedge.exe 84 PID 1124 wrote to memory of 4060 1124 msedge.exe 84 PID 1124 wrote to memory of 4060 1124 msedge.exe 84 PID 1124 wrote to memory of 4060 1124 msedge.exe 84 PID 1124 wrote to memory of 4060 1124 msedge.exe 84 PID 1124 wrote to memory of 4060 1124 msedge.exe 84 PID 1124 wrote to memory of 4060 1124 msedge.exe 84 PID 1124 wrote to memory of 4060 1124 msedge.exe 84 PID 1124 wrote to memory of 4060 1124 msedge.exe 84 PID 1124 wrote to memory of 4060 1124 msedge.exe 84 PID 1124 wrote to memory of 4060 1124 msedge.exe 84 PID 1124 wrote to memory of 4060 1124 msedge.exe 84 PID 1124 wrote to memory of 4060 1124 msedge.exe 84 PID 1124 wrote to memory of 4060 1124 msedge.exe 84 PID 1124 wrote to memory of 4060 1124 msedge.exe 84 PID 1124 wrote to memory of 4060 1124 msedge.exe 84 PID 1124 wrote to memory of 4060 1124 msedge.exe 84 PID 1124 wrote to memory of 4060 1124 msedge.exe 84 PID 1124 wrote to memory of 4060 1124 msedge.exe 84 PID 1124 wrote to memory of 4060 1124 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9d0167601c2db343c45b5303fda83141_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8791346f8,0x7ff879134708,0x7ff8791347182⤵PID:928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,16185236460940307958,13467889614030080916,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:1344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,16185236460940307958,13467889614030080916,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,16185236460940307958,13467889614030080916,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2644 /prefetch:82⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16185236460940307958,13467889614030080916,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16185236460940307958,13467889614030080916,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,16185236460940307958,13467889614030080916,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 /prefetch:82⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,16185236460940307958,13467889614030080916,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16185236460940307958,13467889614030080916,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16185236460940307958,13467889614030080916,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16185236460940307958,13467889614030080916,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:12⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16185236460940307958,13467889614030080916,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,16185236460940307958,13467889614030080916,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4900 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4528
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2280
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3972
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
184B
MD5c2fbf79509d5f91c481bd66570e76c95
SHA17067b6bda98bcb184aa972f9cc16af8cd671a51b
SHA25647b99fa8d1339e235abca57b40444ab48c2f4b61849c66a3616bac160d6d321b
SHA512df354bfe415649218cf558ac98859e3168b863ebf8307c673096ebac572af832eeaeedd37c06f4152d028e07d7b6053d9b5932efef9e764970e7e97c32fbfd4e
-
Filesize
5KB
MD548af14d9d73a2937689ac453bc860341
SHA1c1496b9fc421abec8f9364b2f8469d4d65af4f5c
SHA256acee2c141094390d64307107c87fecbf3fda7ea7ca788191563b50a13ea7a0f5
SHA512c3e3d5357390b8c6870dc2a44fc462140a235778596780416511a53340b3406b47739da036a34b82fb1607a15d559cb988c10cf8c49d9cc466a4a3d1eb067a80
-
Filesize
6KB
MD5ca5ac355027a74464e82671ab4e81319
SHA19c86237452058b1f0de16dcda25707692a21f193
SHA2563261112857d6c1b125071064c4103a08d16898469dfceb0c83a08443c3cc9600
SHA5129d88d5b202c7b6c2df11edcaa3b6801f2f8c2fdf72e20fc00dcd0083d23198604891a75ad74df16cf6a5268797512d2350ec233978d2c503bf901bc06cdcb6df
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD57f540fca42159999b8b07733f175dda9
SHA156ac333b602fcd848f3c39392911c7ab5b445e06
SHA256b149d2dcb9c0adabbbffe987a670926806b3d2746796bba56d2560b418cca5ef
SHA512045f4e56014159aee11f25223e6fb6d40262c08c1a103551bbd900d4d16f145695d6b8c658fd2aa04812479d14e367f06b764b9f491c0898322101ab3e978c41