Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2024, 11:00
Static task
static1
Behavioral task
behavioral1
Sample
2220e890d4139803a76195ceb2222231_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2220e890d4139803a76195ceb2222231_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
2220e890d4139803a76195ceb2222231_JaffaCakes118.html
-
Size
53KB
-
MD5
2220e890d4139803a76195ceb2222231
-
SHA1
48321f335b3f6d2e60495c5b02ad69ac876f7835
-
SHA256
1a8cf80bc22f561ed783485913195cdcb4738092b038f152c862c33c2e931ac1
-
SHA512
fd582a82f4457d78cb16d26d721fa61e47574e926ad9b50528d284db7a037ebaa084cd6804b10c2c5dae5e86c9710b21f5cdc7a3d41a35d9cffb98bb9947871e
-
SSDEEP
1536:CkgUiIakTqGivi+PyU6runlYR63Nj+q5VyvR0w2AzTICbb2ou/t9M/dNwIUEDmDE:CkgUiIakTqGivi+PyU6runlYR63Nj+qG
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1940 msedge.exe 1940 msedge.exe 804 msedge.exe 804 msedge.exe 2484 identity_helper.exe 2484 identity_helper.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 804 wrote to memory of 2140 804 msedge.exe 82 PID 804 wrote to memory of 2140 804 msedge.exe 82 PID 804 wrote to memory of 2588 804 msedge.exe 83 PID 804 wrote to memory of 2588 804 msedge.exe 83 PID 804 wrote to memory of 2588 804 msedge.exe 83 PID 804 wrote to memory of 2588 804 msedge.exe 83 PID 804 wrote to memory of 2588 804 msedge.exe 83 PID 804 wrote to memory of 2588 804 msedge.exe 83 PID 804 wrote to memory of 2588 804 msedge.exe 83 PID 804 wrote to memory of 2588 804 msedge.exe 83 PID 804 wrote to memory of 2588 804 msedge.exe 83 PID 804 wrote to memory of 2588 804 msedge.exe 83 PID 804 wrote to memory of 2588 804 msedge.exe 83 PID 804 wrote to memory of 2588 804 msedge.exe 83 PID 804 wrote to memory of 2588 804 msedge.exe 83 PID 804 wrote to memory of 2588 804 msedge.exe 83 PID 804 wrote to memory of 2588 804 msedge.exe 83 PID 804 wrote to memory of 2588 804 msedge.exe 83 PID 804 wrote to memory of 2588 804 msedge.exe 83 PID 804 wrote to memory of 2588 804 msedge.exe 83 PID 804 wrote to memory of 2588 804 msedge.exe 83 PID 804 wrote to memory of 2588 804 msedge.exe 83 PID 804 wrote to memory of 2588 804 msedge.exe 83 PID 804 wrote to memory of 2588 804 msedge.exe 83 PID 804 wrote to memory of 2588 804 msedge.exe 83 PID 804 wrote to memory of 2588 804 msedge.exe 83 PID 804 wrote to memory of 2588 804 msedge.exe 83 PID 804 wrote to memory of 2588 804 msedge.exe 83 PID 804 wrote to memory of 2588 804 msedge.exe 83 PID 804 wrote to memory of 2588 804 msedge.exe 83 PID 804 wrote to memory of 2588 804 msedge.exe 83 PID 804 wrote to memory of 2588 804 msedge.exe 83 PID 804 wrote to memory of 2588 804 msedge.exe 83 PID 804 wrote to memory of 2588 804 msedge.exe 83 PID 804 wrote to memory of 2588 804 msedge.exe 83 PID 804 wrote to memory of 2588 804 msedge.exe 83 PID 804 wrote to memory of 2588 804 msedge.exe 83 PID 804 wrote to memory of 2588 804 msedge.exe 83 PID 804 wrote to memory of 2588 804 msedge.exe 83 PID 804 wrote to memory of 2588 804 msedge.exe 83 PID 804 wrote to memory of 2588 804 msedge.exe 83 PID 804 wrote to memory of 2588 804 msedge.exe 83 PID 804 wrote to memory of 1940 804 msedge.exe 84 PID 804 wrote to memory of 1940 804 msedge.exe 84 PID 804 wrote to memory of 2284 804 msedge.exe 85 PID 804 wrote to memory of 2284 804 msedge.exe 85 PID 804 wrote to memory of 2284 804 msedge.exe 85 PID 804 wrote to memory of 2284 804 msedge.exe 85 PID 804 wrote to memory of 2284 804 msedge.exe 85 PID 804 wrote to memory of 2284 804 msedge.exe 85 PID 804 wrote to memory of 2284 804 msedge.exe 85 PID 804 wrote to memory of 2284 804 msedge.exe 85 PID 804 wrote to memory of 2284 804 msedge.exe 85 PID 804 wrote to memory of 2284 804 msedge.exe 85 PID 804 wrote to memory of 2284 804 msedge.exe 85 PID 804 wrote to memory of 2284 804 msedge.exe 85 PID 804 wrote to memory of 2284 804 msedge.exe 85 PID 804 wrote to memory of 2284 804 msedge.exe 85 PID 804 wrote to memory of 2284 804 msedge.exe 85 PID 804 wrote to memory of 2284 804 msedge.exe 85 PID 804 wrote to memory of 2284 804 msedge.exe 85 PID 804 wrote to memory of 2284 804 msedge.exe 85 PID 804 wrote to memory of 2284 804 msedge.exe 85 PID 804 wrote to memory of 2284 804 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2220e890d4139803a76195ceb2222231_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ffe706746f8,0x7ffe70674708,0x7ffe706747182⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,17432781731293211907,17774036913831228189,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:2588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,17432781731293211907,17774036913831228189,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,17432781731293211907,17774036913831228189,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17432781731293211907,17774036913831228189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17432781731293211907,17774036913831228189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17432781731293211907,17774036913831228189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:1288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17432781731293211907,17774036913831228189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4632 /prefetch:12⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17432781731293211907,17774036913831228189,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,17432781731293211907,17774036913831228189,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5612 /prefetch:82⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,17432781731293211907,17774036913831228189,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5612 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17432781731293211907,17774036913831228189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17432781731293211907,17774036913831228189,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,17432781731293211907,17774036913831228189,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4444
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3184
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3736
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD581e892ca5c5683efdf9135fe0f2adb15
SHA139159b30226d98a465ece1da28dc87088b20ecad
SHA256830f394548cff6eed3608476190a7ee7d65fe651adc638c5b27ce58639a91e17
SHA512c943f4cfe8615ac159cfac13c10b67e6c0c9093851dd3ac6dda3b82e195d3554e3c37962010a2d0ae5074828d376402624f0dda5499c9997e962e4cfd26444c0
-
Filesize
152B
MD556067634f68231081c4bd5bdbfcc202f
SHA15582776da6ffc75bb0973840fc3d15598bc09eb1
SHA2568c08b0cbceb301c8f960aa674c6e7f6dbf40b4a1c2684e6fb0456ec5ff0e56b4
SHA512c4657393e0b9ec682570d7e251644a858d33e056ccd0f3eebffd0fde25244b3a699b8d9244bcdac00d6f74b49833629b270e099c2b557f729a9066922583f784
-
Filesize
403B
MD56bdeac2ca5f47717b6b343ad13c8ac1d
SHA108b0783701a2c2d981c0c1d3ae71e4da58094c4f
SHA2562a5fff5769554ca692075f9d9245e9810f157c2faf6a5f40d2847856c6acd70e
SHA51200d239ad86010d9696c9b3b48898a0e4bec3a831101976a2758b1e7e322e860b1ab4563b40e19e9edaf7b510e6680d8119be4b9d7cd2cbeed6aa88d70cba602d
-
Filesize
5KB
MD5bede255f0fe93595f153a7cf9b8bfe2f
SHA1179657dd522e8377ae535f6cae86724e84b4ed66
SHA2561419d75c711970ee888bc1129c63a30cd8261042a1d431a0659dfc22c6b19adc
SHA512964e5b43f05bf0f592e678a85e9ff1b239a975ea8d1421c64a3da6506f57f020fb28fb4c8680d937a30060f2fa6727004ff52db41b22ea987f35f1729dc3b500
-
Filesize
6KB
MD55244e81a70e90cde1c5ce18ca0d6a70d
SHA1fab574e9cf0124af42089f4f4f88520b7e5c64e0
SHA25680aa39da79275aff81d71f210f25482a0203a7eea68625e64a2a9ec860ac7c17
SHA51250eab3ba823f5fd372b1628854807ff321f95a824a73db174ddf1fc46d99a869db0df9c55d4f2ebe040434f77266dc53b0d62068c56b62fd8ded7be5e1de747d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a21407e71c480de5e5afd77310a975b4
SHA1c3c23fa6b9857ed9c275272e32688e416d632d2e
SHA256587da23dbde3e7ed629b720cf1a923f42848e0c794a7c30b8492ad5bf4608aca
SHA51213a6377ee5c1b2da5c16866aeabcf93aceec6b5d36f89d92c62deaab5b29ce7697777b6ab4eb1c1ac388d7df3ae54014cdb8e75f8c4edf07b30379d224cf46d1