Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-06-2024 00:35
Static task
static1
Behavioral task
behavioral1
Sample
101b9a659d1105e893b389477a69fd10_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
101b9a659d1105e893b389477a69fd10_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
101b9a659d1105e893b389477a69fd10_JaffaCakes118.html
-
Size
10KB
-
MD5
101b9a659d1105e893b389477a69fd10
-
SHA1
56835374d1a899d028bf231978c41065cf85b854
-
SHA256
42636861f11e307f20cc2d14958278996a84c86fb7633076fe687be74ce53f41
-
SHA512
4739e29e185879a2bc00286d1aedb8957b7b2955b2a14ea1c8fce657456a5acb4041e06b0aaf185763a0739482b3aed0b448738ffb89ee98c110242af01f5a1b
-
SSDEEP
192:db6+bJ+zIvDVjc1wALMeDsAPUA214u34wgW9546qHzDEQyg:db6+NQIbNChcA21l34Ry56Zyg
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4156 msedge.exe 4156 msedge.exe 3812 msedge.exe 3812 msedge.exe 1972 identity_helper.exe 1972 identity_helper.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3812 wrote to memory of 1968 3812 msedge.exe 81 PID 3812 wrote to memory of 1968 3812 msedge.exe 81 PID 3812 wrote to memory of 2052 3812 msedge.exe 82 PID 3812 wrote to memory of 2052 3812 msedge.exe 82 PID 3812 wrote to memory of 2052 3812 msedge.exe 82 PID 3812 wrote to memory of 2052 3812 msedge.exe 82 PID 3812 wrote to memory of 2052 3812 msedge.exe 82 PID 3812 wrote to memory of 2052 3812 msedge.exe 82 PID 3812 wrote to memory of 2052 3812 msedge.exe 82 PID 3812 wrote to memory of 2052 3812 msedge.exe 82 PID 3812 wrote to memory of 2052 3812 msedge.exe 82 PID 3812 wrote to memory of 2052 3812 msedge.exe 82 PID 3812 wrote to memory of 2052 3812 msedge.exe 82 PID 3812 wrote to memory of 2052 3812 msedge.exe 82 PID 3812 wrote to memory of 2052 3812 msedge.exe 82 PID 3812 wrote to memory of 2052 3812 msedge.exe 82 PID 3812 wrote to memory of 2052 3812 msedge.exe 82 PID 3812 wrote to memory of 2052 3812 msedge.exe 82 PID 3812 wrote to memory of 2052 3812 msedge.exe 82 PID 3812 wrote to memory of 2052 3812 msedge.exe 82 PID 3812 wrote to memory of 2052 3812 msedge.exe 82 PID 3812 wrote to memory of 2052 3812 msedge.exe 82 PID 3812 wrote to memory of 2052 3812 msedge.exe 82 PID 3812 wrote to memory of 2052 3812 msedge.exe 82 PID 3812 wrote to memory of 2052 3812 msedge.exe 82 PID 3812 wrote to memory of 2052 3812 msedge.exe 82 PID 3812 wrote to memory of 2052 3812 msedge.exe 82 PID 3812 wrote to memory of 2052 3812 msedge.exe 82 PID 3812 wrote to memory of 2052 3812 msedge.exe 82 PID 3812 wrote to memory of 2052 3812 msedge.exe 82 PID 3812 wrote to memory of 2052 3812 msedge.exe 82 PID 3812 wrote to memory of 2052 3812 msedge.exe 82 PID 3812 wrote to memory of 2052 3812 msedge.exe 82 PID 3812 wrote to memory of 2052 3812 msedge.exe 82 PID 3812 wrote to memory of 2052 3812 msedge.exe 82 PID 3812 wrote to memory of 2052 3812 msedge.exe 82 PID 3812 wrote to memory of 2052 3812 msedge.exe 82 PID 3812 wrote to memory of 2052 3812 msedge.exe 82 PID 3812 wrote to memory of 2052 3812 msedge.exe 82 PID 3812 wrote to memory of 2052 3812 msedge.exe 82 PID 3812 wrote to memory of 2052 3812 msedge.exe 82 PID 3812 wrote to memory of 2052 3812 msedge.exe 82 PID 3812 wrote to memory of 4156 3812 msedge.exe 83 PID 3812 wrote to memory of 4156 3812 msedge.exe 83 PID 3812 wrote to memory of 3980 3812 msedge.exe 84 PID 3812 wrote to memory of 3980 3812 msedge.exe 84 PID 3812 wrote to memory of 3980 3812 msedge.exe 84 PID 3812 wrote to memory of 3980 3812 msedge.exe 84 PID 3812 wrote to memory of 3980 3812 msedge.exe 84 PID 3812 wrote to memory of 3980 3812 msedge.exe 84 PID 3812 wrote to memory of 3980 3812 msedge.exe 84 PID 3812 wrote to memory of 3980 3812 msedge.exe 84 PID 3812 wrote to memory of 3980 3812 msedge.exe 84 PID 3812 wrote to memory of 3980 3812 msedge.exe 84 PID 3812 wrote to memory of 3980 3812 msedge.exe 84 PID 3812 wrote to memory of 3980 3812 msedge.exe 84 PID 3812 wrote to memory of 3980 3812 msedge.exe 84 PID 3812 wrote to memory of 3980 3812 msedge.exe 84 PID 3812 wrote to memory of 3980 3812 msedge.exe 84 PID 3812 wrote to memory of 3980 3812 msedge.exe 84 PID 3812 wrote to memory of 3980 3812 msedge.exe 84 PID 3812 wrote to memory of 3980 3812 msedge.exe 84 PID 3812 wrote to memory of 3980 3812 msedge.exe 84 PID 3812 wrote to memory of 3980 3812 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\101b9a659d1105e893b389477a69fd10_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb884446f8,0x7ffb88444708,0x7ffb884447182⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,15647193211939629132,7702077486668276426,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,15647193211939629132,7702077486668276426,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,15647193211939629132,7702077486668276426,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,15647193211939629132,7702077486668276426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,15647193211939629132,7702077486668276426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,15647193211939629132,7702077486668276426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2320 /prefetch:12⤵PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,15647193211939629132,7702077486668276426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4232 /prefetch:12⤵PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,15647193211939629132,7702077486668276426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,15647193211939629132,7702077486668276426,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5420 /prefetch:82⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,15647193211939629132,7702077486668276426,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5420 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,15647193211939629132,7702077486668276426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4904 /prefetch:12⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,15647193211939629132,7702077486668276426,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4880 /prefetch:12⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,15647193211939629132,7702077486668276426,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,15647193211939629132,7702077486668276426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3024 /prefetch:12⤵PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,15647193211939629132,7702077486668276426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1388 /prefetch:12⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,15647193211939629132,7702077486668276426,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4728 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,15647193211939629132,7702077486668276426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1364 /prefetch:12⤵PID:2280
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3264
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
5KB
MD544f7277dac8f63a857d391071a40a732
SHA169a03a2a5947cbd1b60d5eea7b036feb40c27d95
SHA256d66ad682f858fafb474b6bf366b1fcf33b438cdec967abdc07c604f3459af06b
SHA512760e69b8fd9d111ace804205d886e10d64497f3448b9a0c983027755d2cf3d0d93fbfc28d00c198b82f6497bb53743dd5796b31fd7ffdc7be99ced8a9c908618
-
Filesize
6KB
MD5de00d5c5822606687fee11db8e5999fa
SHA168aeb30f987c5eaa1e596ba5d42bea3ad01f5da3
SHA256096fb09c4c0f1182a07deeff5ca085007e3611a0c4e023edee5e3e649c147a5d
SHA5128fd44705287c3e09dc4bb8ea21d11dbd9b06f3ab444067032a3e5e5f7267d5892bd78b86091c9889298c572da7b2656228db3802f64d6d3cae225275dfb909bf
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD513cab8d59f4b4de4378e29ad694d0295
SHA19b4503f939e790515dea4ee86ffd357cb9fc5506
SHA25681d16acbdc428307a5ec9b58e108fceefe70a6979ddbafeca2a511e6fc8fbf85
SHA512ad43cf541a36fadede19550559761ffa03eeab854d7457f145b916c21df5ed0483dbff88a44695e62f58ea4fa5dbc8b3d6c520a79bc4e8929a9529659fa2e72d