Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2024, 03:34
Static task
static1
Behavioral task
behavioral1
Sample
20f1a8a9dc89e328f10b98716cf27f2d_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
20f1a8a9dc89e328f10b98716cf27f2d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
20f1a8a9dc89e328f10b98716cf27f2d_JaffaCakes118.html
-
Size
53KB
-
MD5
20f1a8a9dc89e328f10b98716cf27f2d
-
SHA1
fb0622b948a2b2f63c3821cb162966cc01f7e8d6
-
SHA256
c0a6df13f5864360a45b8a07ec1a5277404f17f0be8d77ddc6556f29aeeeb2a4
-
SHA512
194897d644e8ea1f29ef7bbdede59747ce39bc6ab0c43ae340404bae7ec0a4e22f82c4a1afb5ab401d03bd7b33c3455aa2678dc036ef3cf2af5858cbc6ef0514
-
SSDEEP
1536:CkgUiIakTqGivi+PyUWrunlY763Nj+q5VyvR0w2AzTICbb7og/t9M/dNwIUTDmDZ:CkgUiIakTqGivi+PyUWrunlY763Nj+qr
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 748 msedge.exe 748 msedge.exe 1368 msedge.exe 1368 msedge.exe 1116 identity_helper.exe 1116 identity_helper.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1368 wrote to memory of 4900 1368 msedge.exe 81 PID 1368 wrote to memory of 4900 1368 msedge.exe 81 PID 1368 wrote to memory of 1312 1368 msedge.exe 82 PID 1368 wrote to memory of 1312 1368 msedge.exe 82 PID 1368 wrote to memory of 1312 1368 msedge.exe 82 PID 1368 wrote to memory of 1312 1368 msedge.exe 82 PID 1368 wrote to memory of 1312 1368 msedge.exe 82 PID 1368 wrote to memory of 1312 1368 msedge.exe 82 PID 1368 wrote to memory of 1312 1368 msedge.exe 82 PID 1368 wrote to memory of 1312 1368 msedge.exe 82 PID 1368 wrote to memory of 1312 1368 msedge.exe 82 PID 1368 wrote to memory of 1312 1368 msedge.exe 82 PID 1368 wrote to memory of 1312 1368 msedge.exe 82 PID 1368 wrote to memory of 1312 1368 msedge.exe 82 PID 1368 wrote to memory of 1312 1368 msedge.exe 82 PID 1368 wrote to memory of 1312 1368 msedge.exe 82 PID 1368 wrote to memory of 1312 1368 msedge.exe 82 PID 1368 wrote to memory of 1312 1368 msedge.exe 82 PID 1368 wrote to memory of 1312 1368 msedge.exe 82 PID 1368 wrote to memory of 1312 1368 msedge.exe 82 PID 1368 wrote to memory of 1312 1368 msedge.exe 82 PID 1368 wrote to memory of 1312 1368 msedge.exe 82 PID 1368 wrote to memory of 1312 1368 msedge.exe 82 PID 1368 wrote to memory of 1312 1368 msedge.exe 82 PID 1368 wrote to memory of 1312 1368 msedge.exe 82 PID 1368 wrote to memory of 1312 1368 msedge.exe 82 PID 1368 wrote to memory of 1312 1368 msedge.exe 82 PID 1368 wrote to memory of 1312 1368 msedge.exe 82 PID 1368 wrote to memory of 1312 1368 msedge.exe 82 PID 1368 wrote to memory of 1312 1368 msedge.exe 82 PID 1368 wrote to memory of 1312 1368 msedge.exe 82 PID 1368 wrote to memory of 1312 1368 msedge.exe 82 PID 1368 wrote to memory of 1312 1368 msedge.exe 82 PID 1368 wrote to memory of 1312 1368 msedge.exe 82 PID 1368 wrote to memory of 1312 1368 msedge.exe 82 PID 1368 wrote to memory of 1312 1368 msedge.exe 82 PID 1368 wrote to memory of 1312 1368 msedge.exe 82 PID 1368 wrote to memory of 1312 1368 msedge.exe 82 PID 1368 wrote to memory of 1312 1368 msedge.exe 82 PID 1368 wrote to memory of 1312 1368 msedge.exe 82 PID 1368 wrote to memory of 1312 1368 msedge.exe 82 PID 1368 wrote to memory of 1312 1368 msedge.exe 82 PID 1368 wrote to memory of 748 1368 msedge.exe 83 PID 1368 wrote to memory of 748 1368 msedge.exe 83 PID 1368 wrote to memory of 3372 1368 msedge.exe 84 PID 1368 wrote to memory of 3372 1368 msedge.exe 84 PID 1368 wrote to memory of 3372 1368 msedge.exe 84 PID 1368 wrote to memory of 3372 1368 msedge.exe 84 PID 1368 wrote to memory of 3372 1368 msedge.exe 84 PID 1368 wrote to memory of 3372 1368 msedge.exe 84 PID 1368 wrote to memory of 3372 1368 msedge.exe 84 PID 1368 wrote to memory of 3372 1368 msedge.exe 84 PID 1368 wrote to memory of 3372 1368 msedge.exe 84 PID 1368 wrote to memory of 3372 1368 msedge.exe 84 PID 1368 wrote to memory of 3372 1368 msedge.exe 84 PID 1368 wrote to memory of 3372 1368 msedge.exe 84 PID 1368 wrote to memory of 3372 1368 msedge.exe 84 PID 1368 wrote to memory of 3372 1368 msedge.exe 84 PID 1368 wrote to memory of 3372 1368 msedge.exe 84 PID 1368 wrote to memory of 3372 1368 msedge.exe 84 PID 1368 wrote to memory of 3372 1368 msedge.exe 84 PID 1368 wrote to memory of 3372 1368 msedge.exe 84 PID 1368 wrote to memory of 3372 1368 msedge.exe 84 PID 1368 wrote to memory of 3372 1368 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\20f1a8a9dc89e328f10b98716cf27f2d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc451246f8,0x7ffc45124708,0x7ffc451247182⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,307959339501724460,13918593649611042075,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:1312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,307959339501724460,13918593649611042075,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,307959339501724460,13918593649611042075,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2952 /prefetch:82⤵PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,307959339501724460,13918593649611042075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,307959339501724460,13918593649611042075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,307959339501724460,13918593649611042075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,307959339501724460,13918593649611042075,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5296 /prefetch:82⤵PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,307959339501724460,13918593649611042075,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5296 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,307959339501724460,13918593649611042075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,307959339501724460,13918593649611042075,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:1308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,307959339501724460,13918593649611042075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,307959339501724460,13918593649611042075,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,307959339501724460,13918593649611042075,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3176 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2140
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1864
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
5KB
MD51c118d64917ec0da1ca613324b1370cd
SHA11b264922979a6bb3af43ef6495be2f2c4832d9e4
SHA256df29de2cf1132c681fe8c5a3e4eb3168f8576a93458a2a85b9a6ab50abd67b91
SHA5125ac3c51ee2b19d5b8a187194f2fff77ecb34ef0d87cab09b9c5193d6da42539d3b74f93e52bab9235cb3aa0d6174a1869a5661f7c862c7088a25c1e586cc4d37
-
Filesize
6KB
MD5339d9dfb5c69eb56b2338cf60d8e4dc6
SHA1777c4c9a9009db9fb897156ca0b15359c165c79c
SHA256430ed3d585230e85cc0ef843e5a8e93bb9d6809b17196a08368bc9ec74c0733c
SHA512a7b97944cf2d1e907491bf7f6c157cc1873400c8e65662ed72ab0c46aed59869e8ce7c23b3731956ad80cf34a50be6077c538b7eefc5dce26e998d1fc92c27e5
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
8KB
MD5fe6724377c6a6742f3be04e8f0745eb5
SHA193ecdea6599396721f105a04e05672d20ee7f592
SHA2566ec04287ecce77ca1e200f9dafff75904ae03ab0b5e6b60f5704260ba321a484
SHA5121902a2a047c50841d2fe64121a131bbb4db3054ce70c57a4c93b5fcb3eca5cef5b8ba934f88f12ac7d1125dcda0064874cad5a2298bcd282267d67ce0220f8fc