Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2024, 04:55
Static task
static1
Behavioral task
behavioral1
Sample
2123822a6a6f291c9f915711afa212b2_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2123822a6a6f291c9f915711afa212b2_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2123822a6a6f291c9f915711afa212b2_JaffaCakes118.html
-
Size
18KB
-
MD5
2123822a6a6f291c9f915711afa212b2
-
SHA1
0b4f5498d9267cfb7d8df930a1482ab8d7e02b16
-
SHA256
432798950051bb0d673c8504261efbf387a72b65f878c8ef31d5931fdd5ce39f
-
SHA512
0b8999af22188b32cecf9eeb0db24ca66e7526ba34bbf464b17c1eb288c1f1061d7662f4b41d26666817657c6eb11e98ba246bf33be4cf0b4e180ae12c2245ad
-
SSDEEP
384:s5lIcutQ84gTGTHoygryEaNQZR7Fxsws/YF18QThOqqglfq2ft/0MwnZg7/gYtBK:kqtygrxauZR7FxBOYF1lThOqq6fq2ft0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2452 msedge.exe 2452 msedge.exe 3300 msedge.exe 3300 msedge.exe 4356 identity_helper.exe 4356 identity_helper.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3300 wrote to memory of 4152 3300 msedge.exe 80 PID 3300 wrote to memory of 4152 3300 msedge.exe 80 PID 3300 wrote to memory of 4476 3300 msedge.exe 81 PID 3300 wrote to memory of 4476 3300 msedge.exe 81 PID 3300 wrote to memory of 4476 3300 msedge.exe 81 PID 3300 wrote to memory of 4476 3300 msedge.exe 81 PID 3300 wrote to memory of 4476 3300 msedge.exe 81 PID 3300 wrote to memory of 4476 3300 msedge.exe 81 PID 3300 wrote to memory of 4476 3300 msedge.exe 81 PID 3300 wrote to memory of 4476 3300 msedge.exe 81 PID 3300 wrote to memory of 4476 3300 msedge.exe 81 PID 3300 wrote to memory of 4476 3300 msedge.exe 81 PID 3300 wrote to memory of 4476 3300 msedge.exe 81 PID 3300 wrote to memory of 4476 3300 msedge.exe 81 PID 3300 wrote to memory of 4476 3300 msedge.exe 81 PID 3300 wrote to memory of 4476 3300 msedge.exe 81 PID 3300 wrote to memory of 4476 3300 msedge.exe 81 PID 3300 wrote to memory of 4476 3300 msedge.exe 81 PID 3300 wrote to memory of 4476 3300 msedge.exe 81 PID 3300 wrote to memory of 4476 3300 msedge.exe 81 PID 3300 wrote to memory of 4476 3300 msedge.exe 81 PID 3300 wrote to memory of 4476 3300 msedge.exe 81 PID 3300 wrote to memory of 4476 3300 msedge.exe 81 PID 3300 wrote to memory of 4476 3300 msedge.exe 81 PID 3300 wrote to memory of 4476 3300 msedge.exe 81 PID 3300 wrote to memory of 4476 3300 msedge.exe 81 PID 3300 wrote to memory of 4476 3300 msedge.exe 81 PID 3300 wrote to memory of 4476 3300 msedge.exe 81 PID 3300 wrote to memory of 4476 3300 msedge.exe 81 PID 3300 wrote to memory of 4476 3300 msedge.exe 81 PID 3300 wrote to memory of 4476 3300 msedge.exe 81 PID 3300 wrote to memory of 4476 3300 msedge.exe 81 PID 3300 wrote to memory of 4476 3300 msedge.exe 81 PID 3300 wrote to memory of 4476 3300 msedge.exe 81 PID 3300 wrote to memory of 4476 3300 msedge.exe 81 PID 3300 wrote to memory of 4476 3300 msedge.exe 81 PID 3300 wrote to memory of 4476 3300 msedge.exe 81 PID 3300 wrote to memory of 4476 3300 msedge.exe 81 PID 3300 wrote to memory of 4476 3300 msedge.exe 81 PID 3300 wrote to memory of 4476 3300 msedge.exe 81 PID 3300 wrote to memory of 4476 3300 msedge.exe 81 PID 3300 wrote to memory of 4476 3300 msedge.exe 81 PID 3300 wrote to memory of 2452 3300 msedge.exe 82 PID 3300 wrote to memory of 2452 3300 msedge.exe 82 PID 3300 wrote to memory of 1232 3300 msedge.exe 83 PID 3300 wrote to memory of 1232 3300 msedge.exe 83 PID 3300 wrote to memory of 1232 3300 msedge.exe 83 PID 3300 wrote to memory of 1232 3300 msedge.exe 83 PID 3300 wrote to memory of 1232 3300 msedge.exe 83 PID 3300 wrote to memory of 1232 3300 msedge.exe 83 PID 3300 wrote to memory of 1232 3300 msedge.exe 83 PID 3300 wrote to memory of 1232 3300 msedge.exe 83 PID 3300 wrote to memory of 1232 3300 msedge.exe 83 PID 3300 wrote to memory of 1232 3300 msedge.exe 83 PID 3300 wrote to memory of 1232 3300 msedge.exe 83 PID 3300 wrote to memory of 1232 3300 msedge.exe 83 PID 3300 wrote to memory of 1232 3300 msedge.exe 83 PID 3300 wrote to memory of 1232 3300 msedge.exe 83 PID 3300 wrote to memory of 1232 3300 msedge.exe 83 PID 3300 wrote to memory of 1232 3300 msedge.exe 83 PID 3300 wrote to memory of 1232 3300 msedge.exe 83 PID 3300 wrote to memory of 1232 3300 msedge.exe 83 PID 3300 wrote to memory of 1232 3300 msedge.exe 83 PID 3300 wrote to memory of 1232 3300 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2123822a6a6f291c9f915711afa212b2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe986b46f8,0x7ffe986b4708,0x7ffe986b47182⤵PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,15500252975286972367,14443229407342292969,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,15500252975286972367,14443229407342292969,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,15500252975286972367,14443229407342292969,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15500252975286972367,14443229407342292969,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15500252975286972367,14443229407342292969,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15500252975286972367,14443229407342292969,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4248 /prefetch:12⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,15500252975286972367,14443229407342292969,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5312 /prefetch:82⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,15500252975286972367,14443229407342292969,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5312 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15500252975286972367,14443229407342292969,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15500252975286972367,14443229407342292969,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:2544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15500252975286972367,14443229407342292969,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4884 /prefetch:12⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15500252975286972367,14443229407342292969,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,15500252975286972367,14443229407342292969,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4640 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1356
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3124
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
5KB
MD58c746962e9cc98c69d83e04bb3f0859e
SHA186e13084821627477ea43d074b85515832440e60
SHA256c993d9bb289ec8740636f7c614d8c8528a309f901797cc94d4c7731eb582cfc6
SHA5124ba41d3b2fc1648575da71ae008cbd81564637dab1a37f296c2754c90d5ed425a75ec1fdf7ef76695d940d2ce492f29319cf8a8a2fc49e454fbd6a862a65367f
-
Filesize
5KB
MD52c4928128fdb8636c51eed979a56aa18
SHA118617be7e6b72a072f33add45b3f882c34d99d66
SHA25607159b0f432eb6971872f8bc8ea98407fc0bb0e07c4be964e2ab3749f9c9eab1
SHA5121342557418c5ffd83c6bb67a4733ae2669cf16e4a9293c3b1376a217561e3562757e303f198a0824ed1bdffef326dee82b5f359a9615c68bff5eb60586ba7be4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5759a9159b389e1b532b30024cc1f7995
SHA16cb2b2d15db3f6a1550108ef67bae9957515a91e
SHA256c61e7c1f264947e371a5f3d4c5b2898f3e20fec5f4588bd94df1c0f29a66e787
SHA51230039fd574d45b89adaf63b42547a10ce341f5d993a5325b62434cfe650a55b5ab8f2ce402d4fee1e0e0e0bf62a53865170303b0f44bb0c42adfaf7fe0812ff7