Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03-07-2024 11:29
Static task
static1
Behavioral task
behavioral1
Sample
22382c76ea513737a9999777b47aa8e3_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
22382c76ea513737a9999777b47aa8e3_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
22382c76ea513737a9999777b47aa8e3_JaffaCakes118.html
-
Size
458B
-
MD5
22382c76ea513737a9999777b47aa8e3
-
SHA1
f5af7a0cd842532421ebe5fecb08209bf959302f
-
SHA256
439238ed529844e63264f29c44e6f8f7df7a2a803daa0fed0b7a367b0d33814d
-
SHA512
14d62b46b246dae766584745d885c46b2946db21dcd2360ef269789e434a43f0dbff98751a4b4bc107b52a20323598dec31baf2d464e78709a7af2f260bf62d1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 3956 msedge.exe 3956 msedge.exe 3356 msedge.exe 3356 msedge.exe 4944 identity_helper.exe 4944 identity_helper.exe 4944 identity_helper.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3356 wrote to memory of 4344 3356 msedge.exe 81 PID 3356 wrote to memory of 4344 3356 msedge.exe 81 PID 3356 wrote to memory of 4680 3356 msedge.exe 82 PID 3356 wrote to memory of 4680 3356 msedge.exe 82 PID 3356 wrote to memory of 4680 3356 msedge.exe 82 PID 3356 wrote to memory of 4680 3356 msedge.exe 82 PID 3356 wrote to memory of 4680 3356 msedge.exe 82 PID 3356 wrote to memory of 4680 3356 msedge.exe 82 PID 3356 wrote to memory of 4680 3356 msedge.exe 82 PID 3356 wrote to memory of 4680 3356 msedge.exe 82 PID 3356 wrote to memory of 4680 3356 msedge.exe 82 PID 3356 wrote to memory of 4680 3356 msedge.exe 82 PID 3356 wrote to memory of 4680 3356 msedge.exe 82 PID 3356 wrote to memory of 4680 3356 msedge.exe 82 PID 3356 wrote to memory of 4680 3356 msedge.exe 82 PID 3356 wrote to memory of 4680 3356 msedge.exe 82 PID 3356 wrote to memory of 4680 3356 msedge.exe 82 PID 3356 wrote to memory of 4680 3356 msedge.exe 82 PID 3356 wrote to memory of 4680 3356 msedge.exe 82 PID 3356 wrote to memory of 4680 3356 msedge.exe 82 PID 3356 wrote to memory of 4680 3356 msedge.exe 82 PID 3356 wrote to memory of 4680 3356 msedge.exe 82 PID 3356 wrote to memory of 4680 3356 msedge.exe 82 PID 3356 wrote to memory of 4680 3356 msedge.exe 82 PID 3356 wrote to memory of 4680 3356 msedge.exe 82 PID 3356 wrote to memory of 4680 3356 msedge.exe 82 PID 3356 wrote to memory of 4680 3356 msedge.exe 82 PID 3356 wrote to memory of 4680 3356 msedge.exe 82 PID 3356 wrote to memory of 4680 3356 msedge.exe 82 PID 3356 wrote to memory of 4680 3356 msedge.exe 82 PID 3356 wrote to memory of 4680 3356 msedge.exe 82 PID 3356 wrote to memory of 4680 3356 msedge.exe 82 PID 3356 wrote to memory of 4680 3356 msedge.exe 82 PID 3356 wrote to memory of 4680 3356 msedge.exe 82 PID 3356 wrote to memory of 4680 3356 msedge.exe 82 PID 3356 wrote to memory of 4680 3356 msedge.exe 82 PID 3356 wrote to memory of 4680 3356 msedge.exe 82 PID 3356 wrote to memory of 4680 3356 msedge.exe 82 PID 3356 wrote to memory of 4680 3356 msedge.exe 82 PID 3356 wrote to memory of 4680 3356 msedge.exe 82 PID 3356 wrote to memory of 4680 3356 msedge.exe 82 PID 3356 wrote to memory of 4680 3356 msedge.exe 82 PID 3356 wrote to memory of 3956 3356 msedge.exe 83 PID 3356 wrote to memory of 3956 3356 msedge.exe 83 PID 3356 wrote to memory of 3844 3356 msedge.exe 84 PID 3356 wrote to memory of 3844 3356 msedge.exe 84 PID 3356 wrote to memory of 3844 3356 msedge.exe 84 PID 3356 wrote to memory of 3844 3356 msedge.exe 84 PID 3356 wrote to memory of 3844 3356 msedge.exe 84 PID 3356 wrote to memory of 3844 3356 msedge.exe 84 PID 3356 wrote to memory of 3844 3356 msedge.exe 84 PID 3356 wrote to memory of 3844 3356 msedge.exe 84 PID 3356 wrote to memory of 3844 3356 msedge.exe 84 PID 3356 wrote to memory of 3844 3356 msedge.exe 84 PID 3356 wrote to memory of 3844 3356 msedge.exe 84 PID 3356 wrote to memory of 3844 3356 msedge.exe 84 PID 3356 wrote to memory of 3844 3356 msedge.exe 84 PID 3356 wrote to memory of 3844 3356 msedge.exe 84 PID 3356 wrote to memory of 3844 3356 msedge.exe 84 PID 3356 wrote to memory of 3844 3356 msedge.exe 84 PID 3356 wrote to memory of 3844 3356 msedge.exe 84 PID 3356 wrote to memory of 3844 3356 msedge.exe 84 PID 3356 wrote to memory of 3844 3356 msedge.exe 84 PID 3356 wrote to memory of 3844 3356 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\22382c76ea513737a9999777b47aa8e3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff956ee46f8,0x7ff956ee4708,0x7ff956ee47182⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,18421313728869597877,8404676923866725566,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,18421313728869597877,8404676923866725566,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,18421313728869597877,8404676923866725566,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2548 /prefetch:82⤵PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,18421313728869597877,8404676923866725566,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,18421313728869597877,8404676923866725566,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,18421313728869597877,8404676923866725566,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:12⤵PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,18421313728869597877,8404676923866725566,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:3788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,18421313728869597877,8404676923866725566,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3936 /prefetch:12⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,18421313728869597877,8404676923866725566,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3472 /prefetch:82⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,18421313728869597877,8404676923866725566,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3472 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,18421313728869597877,8404676923866725566,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3480 /prefetch:12⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,18421313728869597877,8404676923866725566,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3624 /prefetch:12⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,18421313728869597877,8404676923866725566,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:12⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,18421313728869597877,8404676923866725566,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4044 /prefetch:12⤵PID:2516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,18421313728869597877,8404676923866725566,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4652 /prefetch:12⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,18421313728869597877,8404676923866725566,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5620 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,18421313728869597877,8404676923866725566,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4428 /prefetch:12⤵PID:3196
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4380
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3144
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
5KB
MD5ffb8506b87f7bd1c28e91bc1b33e963f
SHA1fc2090bab967d4cc50373984eb47ad30b9d37c44
SHA25684df8718eab76e2fd4a46f125eac23d33826acb7f541f17e92fc126bf32e4f12
SHA512b641ce1d60d805df2b3e1ff45a3fe43404451e3d3a1ef3336aa1757e3d64ffdfadbfb9d59334ae44c25954248fc80cee899c4d7ff0a5ea8e79a7d33cb0d9f1eb
-
Filesize
5KB
MD5a025debc50adb8ea9164e7af33f21cda
SHA1559ce8f0e97fd7aecdbb80a167d47d86da476bd1
SHA2560cfe8edc9c2237e8e546f9cad3bddeefaa5cc77b056dde862a659160eb6a8b1f
SHA5121222a20c693d386eb2bf0c0d90906f0740ab7289e5b6d7003eb9669681e0de5c4130b0c4b1169a62e333b2960700ac72cb426df23a45a9ae8d67d399e1e977be
-
Filesize
6KB
MD5053577c9d695f2838c555ae39e735576
SHA195d956955ffaa81c266f3b0bc152ee91ddf0c300
SHA2560fb4809a729b0253dfba18f39a9a1b5e22f11a3c1ca1bd823701716bce796326
SHA5129d0997ec5b7750bf60c704cf79e2846a56b6c4a5ad0479afb660badd17b195a6185b7c6ee1062a653452c7657c1828ed0faacc779b56b7d024103a176431569b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
8KB
MD5f563a720d9971756c41e73d2070094dc
SHA127003bf6bb0dd77501f938068d9856bd3474f58c
SHA256e0d4d0b5d3feaedeb1d769497746c5569bef14920968adf9b4bda1949cd9a06e
SHA5120a32a4b7b784906a2c8a50e6c4cc8d8d8e3373f0251bcc3531ef58fa28d6a966cebea520a367d67b40b34197392c7cde3d64af7355a0ae73c4c15caf0e3a4a8c