Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03-07-2024 06:37
Static task
static1
Behavioral task
behavioral1
Sample
2169722093c790a198ac891048710897_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2169722093c790a198ac891048710897_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2169722093c790a198ac891048710897_JaffaCakes118.html
-
Size
12KB
-
MD5
2169722093c790a198ac891048710897
-
SHA1
98955bc4103d74167ea769d1c1557f6754f52176
-
SHA256
d05e3e2eabba5045c1893200fd822a69a3e89e49b9847e8dd56012aea8f6723d
-
SHA512
3b71c31b38e95c5680625edccad6e13dae9d1a8a21c12918e2c63631c30855c64dad59b099026d336f46f7ee4452f14dfd981dc0e8d2bf711bd2a6f724c8ea62
-
SSDEEP
96:8qmpvpAaw7n8OEJ8RJBJMgaPoZHAsyyzvKSalZOf6b58NWtxYPgOZNBOrIPXgbH1:N28v/wokDSal/zYPf4I85eVgv1sToRBh
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2488 msedge.exe 2488 msedge.exe 4948 msedge.exe 4948 msedge.exe 2264 identity_helper.exe 2264 identity_helper.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4948 wrote to memory of 3464 4948 msedge.exe 80 PID 4948 wrote to memory of 3464 4948 msedge.exe 80 PID 4948 wrote to memory of 1668 4948 msedge.exe 81 PID 4948 wrote to memory of 1668 4948 msedge.exe 81 PID 4948 wrote to memory of 1668 4948 msedge.exe 81 PID 4948 wrote to memory of 1668 4948 msedge.exe 81 PID 4948 wrote to memory of 1668 4948 msedge.exe 81 PID 4948 wrote to memory of 1668 4948 msedge.exe 81 PID 4948 wrote to memory of 1668 4948 msedge.exe 81 PID 4948 wrote to memory of 1668 4948 msedge.exe 81 PID 4948 wrote to memory of 1668 4948 msedge.exe 81 PID 4948 wrote to memory of 1668 4948 msedge.exe 81 PID 4948 wrote to memory of 1668 4948 msedge.exe 81 PID 4948 wrote to memory of 1668 4948 msedge.exe 81 PID 4948 wrote to memory of 1668 4948 msedge.exe 81 PID 4948 wrote to memory of 1668 4948 msedge.exe 81 PID 4948 wrote to memory of 1668 4948 msedge.exe 81 PID 4948 wrote to memory of 1668 4948 msedge.exe 81 PID 4948 wrote to memory of 1668 4948 msedge.exe 81 PID 4948 wrote to memory of 1668 4948 msedge.exe 81 PID 4948 wrote to memory of 1668 4948 msedge.exe 81 PID 4948 wrote to memory of 1668 4948 msedge.exe 81 PID 4948 wrote to memory of 1668 4948 msedge.exe 81 PID 4948 wrote to memory of 1668 4948 msedge.exe 81 PID 4948 wrote to memory of 1668 4948 msedge.exe 81 PID 4948 wrote to memory of 1668 4948 msedge.exe 81 PID 4948 wrote to memory of 1668 4948 msedge.exe 81 PID 4948 wrote to memory of 1668 4948 msedge.exe 81 PID 4948 wrote to memory of 1668 4948 msedge.exe 81 PID 4948 wrote to memory of 1668 4948 msedge.exe 81 PID 4948 wrote to memory of 1668 4948 msedge.exe 81 PID 4948 wrote to memory of 1668 4948 msedge.exe 81 PID 4948 wrote to memory of 1668 4948 msedge.exe 81 PID 4948 wrote to memory of 1668 4948 msedge.exe 81 PID 4948 wrote to memory of 1668 4948 msedge.exe 81 PID 4948 wrote to memory of 1668 4948 msedge.exe 81 PID 4948 wrote to memory of 1668 4948 msedge.exe 81 PID 4948 wrote to memory of 1668 4948 msedge.exe 81 PID 4948 wrote to memory of 1668 4948 msedge.exe 81 PID 4948 wrote to memory of 1668 4948 msedge.exe 81 PID 4948 wrote to memory of 1668 4948 msedge.exe 81 PID 4948 wrote to memory of 1668 4948 msedge.exe 81 PID 4948 wrote to memory of 2488 4948 msedge.exe 82 PID 4948 wrote to memory of 2488 4948 msedge.exe 82 PID 4948 wrote to memory of 532 4948 msedge.exe 83 PID 4948 wrote to memory of 532 4948 msedge.exe 83 PID 4948 wrote to memory of 532 4948 msedge.exe 83 PID 4948 wrote to memory of 532 4948 msedge.exe 83 PID 4948 wrote to memory of 532 4948 msedge.exe 83 PID 4948 wrote to memory of 532 4948 msedge.exe 83 PID 4948 wrote to memory of 532 4948 msedge.exe 83 PID 4948 wrote to memory of 532 4948 msedge.exe 83 PID 4948 wrote to memory of 532 4948 msedge.exe 83 PID 4948 wrote to memory of 532 4948 msedge.exe 83 PID 4948 wrote to memory of 532 4948 msedge.exe 83 PID 4948 wrote to memory of 532 4948 msedge.exe 83 PID 4948 wrote to memory of 532 4948 msedge.exe 83 PID 4948 wrote to memory of 532 4948 msedge.exe 83 PID 4948 wrote to memory of 532 4948 msedge.exe 83 PID 4948 wrote to memory of 532 4948 msedge.exe 83 PID 4948 wrote to memory of 532 4948 msedge.exe 83 PID 4948 wrote to memory of 532 4948 msedge.exe 83 PID 4948 wrote to memory of 532 4948 msedge.exe 83 PID 4948 wrote to memory of 532 4948 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2169722093c790a198ac891048710897_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaf08346f8,0x7ffaf0834708,0x7ffaf08347182⤵PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,3281529282389135070,6707687220360957175,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,3281529282389135070,6707687220360957175,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,3281529282389135070,6707687220360957175,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:82⤵PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3281529282389135070,6707687220360957175,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3281529282389135070,6707687220360957175,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3281529282389135070,6707687220360957175,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4652 /prefetch:12⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,3281529282389135070,6707687220360957175,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4976 /prefetch:82⤵PID:1768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,3281529282389135070,6707687220360957175,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4976 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3281529282389135070,6707687220360957175,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3281529282389135070,6707687220360957175,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3281529282389135070,6707687220360957175,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3281529282389135070,6707687220360957175,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,3281529282389135070,6707687220360957175,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1372 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2196
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2832
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
6KB
MD5ff520acb20b77decbc27f9ba13403f3a
SHA14f1666c591a29ea869118be5aa582524d63691c3
SHA256d63a065bc6cc06cbd50064047868c64de7ef04d2fe99f966dd9f4a5cf1620d4b
SHA5120a738606085d2c6988ca287ec21a65e45e63761e22be3ad3c6c6523578f9c8a0c83a731a0b5621e34e98c629ca020ada9647270db624a532cf8f8b2fff64e39c
-
Filesize
5KB
MD5de48a30dc8d83bb6fa208310980d3053
SHA143f7d90999ba952dd5d3dc7c04e22205a21460e5
SHA256e26ada8e7fc4e956970994ab1ab8ff27cef54fb88f972a03fe0133ba75eab457
SHA512667af3abddfb0f4e3a1c27d86ff35e1610e09e0fd44a3eeeec1971e610d89ac10eebc4361187aee352f070b6e487828c0580df7f02532907014c76aa2a259e01
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD552b890681aeedca0acf5f60901d257ad
SHA19292fcc4df7bc4507a9d01b566db20177d056aa5
SHA2560b95583b2022c99b4363c136582e71f3b45398fe55620330fffb8869015ec7f7
SHA5120549acfd6333ee399294ee425b237ac93fcf24a2ec8804b5459f93057daf93145125176786684312fc62b1d2013047932839dd0b63804adc3dd1359e42faf74b