Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2024, 23:54
Static task
static1
Behavioral task
behavioral1
Sample
23ea5c36474d99f273e6a5f296ff523f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
23ea5c36474d99f273e6a5f296ff523f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
23ea5c36474d99f273e6a5f296ff523f_JaffaCakes118.html
-
Size
4KB
-
MD5
23ea5c36474d99f273e6a5f296ff523f
-
SHA1
ad468f03ef0cbbddead87392d54a334d1b07fbbf
-
SHA256
57eaa96de187fa68bc88e9d1496343fc0e3b1e58e8c1b86c78d3a33ee0c5d4bc
-
SHA512
8a5cfc09970307bcba4ea2b25d940ed0f129908385a608dedb4f0e82e760aee33767d01d28b2972843546ed108677c9190bc12467dfa76761fa74339858e98fe
-
SSDEEP
96:AXAd5Tc1FJuogIHIwM6XPz+cUmH09AQuwxYddYdvYdwZLE/v:ARHp9ow7/z+ci99Y
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4516 msedge.exe 4516 msedge.exe 1712 msedge.exe 1712 msedge.exe 2952 identity_helper.exe 2952 identity_helper.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1712 wrote to memory of 1940 1712 msedge.exe 81 PID 1712 wrote to memory of 1940 1712 msedge.exe 81 PID 1712 wrote to memory of 4976 1712 msedge.exe 82 PID 1712 wrote to memory of 4976 1712 msedge.exe 82 PID 1712 wrote to memory of 4976 1712 msedge.exe 82 PID 1712 wrote to memory of 4976 1712 msedge.exe 82 PID 1712 wrote to memory of 4976 1712 msedge.exe 82 PID 1712 wrote to memory of 4976 1712 msedge.exe 82 PID 1712 wrote to memory of 4976 1712 msedge.exe 82 PID 1712 wrote to memory of 4976 1712 msedge.exe 82 PID 1712 wrote to memory of 4976 1712 msedge.exe 82 PID 1712 wrote to memory of 4976 1712 msedge.exe 82 PID 1712 wrote to memory of 4976 1712 msedge.exe 82 PID 1712 wrote to memory of 4976 1712 msedge.exe 82 PID 1712 wrote to memory of 4976 1712 msedge.exe 82 PID 1712 wrote to memory of 4976 1712 msedge.exe 82 PID 1712 wrote to memory of 4976 1712 msedge.exe 82 PID 1712 wrote to memory of 4976 1712 msedge.exe 82 PID 1712 wrote to memory of 4976 1712 msedge.exe 82 PID 1712 wrote to memory of 4976 1712 msedge.exe 82 PID 1712 wrote to memory of 4976 1712 msedge.exe 82 PID 1712 wrote to memory of 4976 1712 msedge.exe 82 PID 1712 wrote to memory of 4976 1712 msedge.exe 82 PID 1712 wrote to memory of 4976 1712 msedge.exe 82 PID 1712 wrote to memory of 4976 1712 msedge.exe 82 PID 1712 wrote to memory of 4976 1712 msedge.exe 82 PID 1712 wrote to memory of 4976 1712 msedge.exe 82 PID 1712 wrote to memory of 4976 1712 msedge.exe 82 PID 1712 wrote to memory of 4976 1712 msedge.exe 82 PID 1712 wrote to memory of 4976 1712 msedge.exe 82 PID 1712 wrote to memory of 4976 1712 msedge.exe 82 PID 1712 wrote to memory of 4976 1712 msedge.exe 82 PID 1712 wrote to memory of 4976 1712 msedge.exe 82 PID 1712 wrote to memory of 4976 1712 msedge.exe 82 PID 1712 wrote to memory of 4976 1712 msedge.exe 82 PID 1712 wrote to memory of 4976 1712 msedge.exe 82 PID 1712 wrote to memory of 4976 1712 msedge.exe 82 PID 1712 wrote to memory of 4976 1712 msedge.exe 82 PID 1712 wrote to memory of 4976 1712 msedge.exe 82 PID 1712 wrote to memory of 4976 1712 msedge.exe 82 PID 1712 wrote to memory of 4976 1712 msedge.exe 82 PID 1712 wrote to memory of 4976 1712 msedge.exe 82 PID 1712 wrote to memory of 4516 1712 msedge.exe 83 PID 1712 wrote to memory of 4516 1712 msedge.exe 83 PID 1712 wrote to memory of 1424 1712 msedge.exe 84 PID 1712 wrote to memory of 1424 1712 msedge.exe 84 PID 1712 wrote to memory of 1424 1712 msedge.exe 84 PID 1712 wrote to memory of 1424 1712 msedge.exe 84 PID 1712 wrote to memory of 1424 1712 msedge.exe 84 PID 1712 wrote to memory of 1424 1712 msedge.exe 84 PID 1712 wrote to memory of 1424 1712 msedge.exe 84 PID 1712 wrote to memory of 1424 1712 msedge.exe 84 PID 1712 wrote to memory of 1424 1712 msedge.exe 84 PID 1712 wrote to memory of 1424 1712 msedge.exe 84 PID 1712 wrote to memory of 1424 1712 msedge.exe 84 PID 1712 wrote to memory of 1424 1712 msedge.exe 84 PID 1712 wrote to memory of 1424 1712 msedge.exe 84 PID 1712 wrote to memory of 1424 1712 msedge.exe 84 PID 1712 wrote to memory of 1424 1712 msedge.exe 84 PID 1712 wrote to memory of 1424 1712 msedge.exe 84 PID 1712 wrote to memory of 1424 1712 msedge.exe 84 PID 1712 wrote to memory of 1424 1712 msedge.exe 84 PID 1712 wrote to memory of 1424 1712 msedge.exe 84 PID 1712 wrote to memory of 1424 1712 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\23ea5c36474d99f273e6a5f296ff523f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffba57446f8,0x7ffba5744708,0x7ffba57447182⤵PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,12144970847973659341,8677670366317301293,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:22⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2224,12144970847973659341,8677670366317301293,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2224,12144970847973659341,8677670366317301293,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,12144970847973659341,8677670366317301293,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,12144970847973659341,8677670366317301293,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,12144970847973659341,8677670366317301293,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5016 /prefetch:82⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,12144970847973659341,8677670366317301293,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5016 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,12144970847973659341,8677670366317301293,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,12144970847973659341,8677670366317301293,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,12144970847973659341,8677670366317301293,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5720 /prefetch:12⤵PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,12144970847973659341,8677670366317301293,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:12⤵PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,12144970847973659341,8677670366317301293,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3592 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2800
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1464
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:836
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
5KB
MD514686f6c1d72ca1ecb4af24bb82ded92
SHA162d1dfea3e940b0257bdd4c5d57d11cbae671055
SHA256588c94f338f6f98a1dc0898b7573c59676485378b7fa478e5aa881c0722719ed
SHA512c0b0a60a7405b821b9226bddfdb53ebfff28fb8c03c5ae310464992e28a8b9f661618960a9709181428f0af26b60fd3490a3b010ea1ad49b835f088aa238e1d3
-
Filesize
6KB
MD51674ca860136a3ec2dd352a1835c07c5
SHA1c429b67c5869a2bb4b8dfd08d1691fafb4c1316a
SHA2561c83b54557143c0c0b5c1a21ee89df9a54879368d48f61e56965a541d47a377f
SHA512c55eb55551b9c90a7ef10214367f35951300797cb3ca5cc4d78eedca8827e80b640e3aaf10cc6635d0eaaf06925c5c58b047c97f9d0cba3706dbd85dcac862f2
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD55595f2deb799eb98548b7121221c043e
SHA1d2ca0070ae22e4b2ec09638f4867a770e2f85e77
SHA256c6cb43b0e6bb745ed05b1728b3083246155186f45f2e3b74d53df43a16a40a82
SHA512b9c8e9e8070a3cc228569c3482eb066e3fc2537cdab65cb5411c12910d67263a3975d0a5f54016e7f3dbc29d17c85a6fc87b4d86378d9d086319e415a11fdadc