Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11/06/2024, 20:07
Static task
static1
Behavioral task
behavioral1
Sample
9f624d0ff9bc0f466f17994f3ab16467_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9f624d0ff9bc0f466f17994f3ab16467_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9f624d0ff9bc0f466f17994f3ab16467_JaffaCakes118.html
-
Size
16KB
-
MD5
9f624d0ff9bc0f466f17994f3ab16467
-
SHA1
4145a9dbf2fe8ae776f376af80aab7e95cd3fcae
-
SHA256
76ceeb7d967148741ef96d0b14ac23e9d15d33ad6cfb204c245d7c9713c55078
-
SHA512
28675b8da78af262f6566ef3bd1d798160d0941a864052456b4e88fb6d449e7c7d99ef65a53b8504994fd3d8c33a83c72f83e7c04f5bd3131d45841f8de16082
-
SSDEEP
192:RdCHhx17FHlrlUHdWqllJvpDT/AatwORK4EP2iyslDMUYJBdZgQCsxh07JSIOMTi:8pUNNbqOE9PzyslDMUKPZpCHOMXNxk/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5080 msedge.exe 5080 msedge.exe 3500 msedge.exe 3500 msedge.exe 5020 identity_helper.exe 5020 identity_helper.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3500 wrote to memory of 4736 3500 msedge.exe 83 PID 3500 wrote to memory of 4736 3500 msedge.exe 83 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 1856 3500 msedge.exe 84 PID 3500 wrote to memory of 5080 3500 msedge.exe 85 PID 3500 wrote to memory of 5080 3500 msedge.exe 85 PID 3500 wrote to memory of 2784 3500 msedge.exe 86 PID 3500 wrote to memory of 2784 3500 msedge.exe 86 PID 3500 wrote to memory of 2784 3500 msedge.exe 86 PID 3500 wrote to memory of 2784 3500 msedge.exe 86 PID 3500 wrote to memory of 2784 3500 msedge.exe 86 PID 3500 wrote to memory of 2784 3500 msedge.exe 86 PID 3500 wrote to memory of 2784 3500 msedge.exe 86 PID 3500 wrote to memory of 2784 3500 msedge.exe 86 PID 3500 wrote to memory of 2784 3500 msedge.exe 86 PID 3500 wrote to memory of 2784 3500 msedge.exe 86 PID 3500 wrote to memory of 2784 3500 msedge.exe 86 PID 3500 wrote to memory of 2784 3500 msedge.exe 86 PID 3500 wrote to memory of 2784 3500 msedge.exe 86 PID 3500 wrote to memory of 2784 3500 msedge.exe 86 PID 3500 wrote to memory of 2784 3500 msedge.exe 86 PID 3500 wrote to memory of 2784 3500 msedge.exe 86 PID 3500 wrote to memory of 2784 3500 msedge.exe 86 PID 3500 wrote to memory of 2784 3500 msedge.exe 86 PID 3500 wrote to memory of 2784 3500 msedge.exe 86 PID 3500 wrote to memory of 2784 3500 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9f624d0ff9bc0f466f17994f3ab16467_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ffaf44a46f8,0x7ffaf44a4708,0x7ffaf44a47182⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,5052475821576633293,15476037934652561919,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,5052475821576633293,15476037934652561919,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,5052475821576633293,15476037934652561919,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:2784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,5052475821576633293,15476037934652561919,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,5052475821576633293,15476037934652561919,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,5052475821576633293,15476037934652561919,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4192 /prefetch:12⤵PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,5052475821576633293,15476037934652561919,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:1844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,5052475821576633293,15476037934652561919,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,5052475821576633293,15476037934652561919,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 /prefetch:82⤵PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,5052475821576633293,15476037934652561919,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,5052475821576633293,15476037934652561919,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4880 /prefetch:12⤵PID:2908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,5052475821576633293,15476037934652561919,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:12⤵PID:520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,5052475821576633293,15476037934652561919,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4184 /prefetch:12⤵PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,5052475821576633293,15476037934652561919,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,5052475821576633293,15476037934652561919,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3032 /prefetch:12⤵PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,5052475821576633293,15476037934652561919,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1048 /prefetch:12⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,5052475821576633293,15476037934652561919,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5864 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4556
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4748
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
6KB
MD525849fa351e0696a0b44a26d103f62f7
SHA1ff2061a5a14823ee635df7de4dbfc639523e90bf
SHA256e503d0ddff3072244c35c6edde9263ce78503767f4cb8eecd5a55eab1fef689d
SHA5126064c3c813e510ca36aedb100ca6d538614be3cf72c9aa916c7a7b56454dd29be40e3135976743afa3447c913d0bb390d4591cb8e9aa3b2d9035569716ce29a6
-
Filesize
6KB
MD5d38f4f8164d556ebbf01db7a9014e8dc
SHA15792614b525d0b815ee350c24b46aa129e700307
SHA25644fdc93c827cdc1fab89665dfddad6555612116d1a59c60f5faf0af39593ab8e
SHA512af1768a0536a070002885080b15509daf81f36f36c4b81e94ca9489e568b8221ce373e36c0e04a14998f79160d483952f7503267b08caabc6d46ad54d619991b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56b9c410911ed45d48ef5a4622341c5b8
SHA151b996f9cec6a82a68a83c1a319a3bf8b0697126
SHA25673ff5c058a3889a8813041eebbdc57888052b63271044d9e1c06d7029bbfc554
SHA512ea9694e615a0cf20cafea791f22683a7d836d9dd23ddf25d8158775d1c71175c06a9e8576c08bb13236cd34d74d4b80f462a97758a353b5ef1d93a20796fbbdb