Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2024, 15:02
Static task
static1
Behavioral task
behavioral1
Sample
22c59c1462d36635ab42583a955442c6_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
22c59c1462d36635ab42583a955442c6_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
22c59c1462d36635ab42583a955442c6_JaffaCakes118.html
-
Size
1KB
-
MD5
22c59c1462d36635ab42583a955442c6
-
SHA1
e6b2212a6a2bcdb2268e270601542d1a1f2908e4
-
SHA256
5042bf6a36ddec3fbde2c0ab82883774669263da3d21772e95a750a827a0c5e3
-
SHA512
6b44fa6ac591e73ec6d6082cb5f25c79aa87ca3b0f57a4acb047e0ecdf53868ca0b7daeee3e49b3d1ced2da041af19dc476ed299203922b33c6d285ffd2b7d5e
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1524 msedge.exe 1524 msedge.exe 5044 msedge.exe 5044 msedge.exe 3996 identity_helper.exe 3996 identity_helper.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5044 wrote to memory of 2384 5044 msedge.exe 82 PID 5044 wrote to memory of 2384 5044 msedge.exe 82 PID 5044 wrote to memory of 1756 5044 msedge.exe 83 PID 5044 wrote to memory of 1756 5044 msedge.exe 83 PID 5044 wrote to memory of 1756 5044 msedge.exe 83 PID 5044 wrote to memory of 1756 5044 msedge.exe 83 PID 5044 wrote to memory of 1756 5044 msedge.exe 83 PID 5044 wrote to memory of 1756 5044 msedge.exe 83 PID 5044 wrote to memory of 1756 5044 msedge.exe 83 PID 5044 wrote to memory of 1756 5044 msedge.exe 83 PID 5044 wrote to memory of 1756 5044 msedge.exe 83 PID 5044 wrote to memory of 1756 5044 msedge.exe 83 PID 5044 wrote to memory of 1756 5044 msedge.exe 83 PID 5044 wrote to memory of 1756 5044 msedge.exe 83 PID 5044 wrote to memory of 1756 5044 msedge.exe 83 PID 5044 wrote to memory of 1756 5044 msedge.exe 83 PID 5044 wrote to memory of 1756 5044 msedge.exe 83 PID 5044 wrote to memory of 1756 5044 msedge.exe 83 PID 5044 wrote to memory of 1756 5044 msedge.exe 83 PID 5044 wrote to memory of 1756 5044 msedge.exe 83 PID 5044 wrote to memory of 1756 5044 msedge.exe 83 PID 5044 wrote to memory of 1756 5044 msedge.exe 83 PID 5044 wrote to memory of 1756 5044 msedge.exe 83 PID 5044 wrote to memory of 1756 5044 msedge.exe 83 PID 5044 wrote to memory of 1756 5044 msedge.exe 83 PID 5044 wrote to memory of 1756 5044 msedge.exe 83 PID 5044 wrote to memory of 1756 5044 msedge.exe 83 PID 5044 wrote to memory of 1756 5044 msedge.exe 83 PID 5044 wrote to memory of 1756 5044 msedge.exe 83 PID 5044 wrote to memory of 1756 5044 msedge.exe 83 PID 5044 wrote to memory of 1756 5044 msedge.exe 83 PID 5044 wrote to memory of 1756 5044 msedge.exe 83 PID 5044 wrote to memory of 1756 5044 msedge.exe 83 PID 5044 wrote to memory of 1756 5044 msedge.exe 83 PID 5044 wrote to memory of 1756 5044 msedge.exe 83 PID 5044 wrote to memory of 1756 5044 msedge.exe 83 PID 5044 wrote to memory of 1756 5044 msedge.exe 83 PID 5044 wrote to memory of 1756 5044 msedge.exe 83 PID 5044 wrote to memory of 1756 5044 msedge.exe 83 PID 5044 wrote to memory of 1756 5044 msedge.exe 83 PID 5044 wrote to memory of 1756 5044 msedge.exe 83 PID 5044 wrote to memory of 1756 5044 msedge.exe 83 PID 5044 wrote to memory of 1524 5044 msedge.exe 84 PID 5044 wrote to memory of 1524 5044 msedge.exe 84 PID 5044 wrote to memory of 912 5044 msedge.exe 85 PID 5044 wrote to memory of 912 5044 msedge.exe 85 PID 5044 wrote to memory of 912 5044 msedge.exe 85 PID 5044 wrote to memory of 912 5044 msedge.exe 85 PID 5044 wrote to memory of 912 5044 msedge.exe 85 PID 5044 wrote to memory of 912 5044 msedge.exe 85 PID 5044 wrote to memory of 912 5044 msedge.exe 85 PID 5044 wrote to memory of 912 5044 msedge.exe 85 PID 5044 wrote to memory of 912 5044 msedge.exe 85 PID 5044 wrote to memory of 912 5044 msedge.exe 85 PID 5044 wrote to memory of 912 5044 msedge.exe 85 PID 5044 wrote to memory of 912 5044 msedge.exe 85 PID 5044 wrote to memory of 912 5044 msedge.exe 85 PID 5044 wrote to memory of 912 5044 msedge.exe 85 PID 5044 wrote to memory of 912 5044 msedge.exe 85 PID 5044 wrote to memory of 912 5044 msedge.exe 85 PID 5044 wrote to memory of 912 5044 msedge.exe 85 PID 5044 wrote to memory of 912 5044 msedge.exe 85 PID 5044 wrote to memory of 912 5044 msedge.exe 85 PID 5044 wrote to memory of 912 5044 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\22c59c1462d36635ab42583a955442c6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdabb846f8,0x7ffdabb84708,0x7ffdabb847182⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,390182286114725108,7903748481011576815,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,390182286114725108,7903748481011576815,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,390182286114725108,7903748481011576815,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,390182286114725108,7903748481011576815,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,390182286114725108,7903748481011576815,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,390182286114725108,7903748481011576815,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,390182286114725108,7903748481011576815,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5464 /prefetch:82⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,390182286114725108,7903748481011576815,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5464 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,390182286114725108,7903748481011576815,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,390182286114725108,7903748481011576815,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:12⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,390182286114725108,7903748481011576815,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,390182286114725108,7903748481011576815,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,390182286114725108,7903748481011576815,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5092 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4360
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1256
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5477462b6ad8eaaf8d38f5e3a4daf17b0
SHA186174e670c44767c08a39cc2a53c09c318326201
SHA256e6bbd4933b9baa1df4bb633319174de07db176ec215e71c8568d27c5c577184d
SHA512a0acc2ef7fd0fcf413572eeb94d1e38aa6a682195cc03d6eaaaa0bc9e5f4b2c0033da0b835f4617aebc52069d0a10b52fc31ed53c2fe7943a480b55b7481dd4e
-
Filesize
152B
MD5b704c9ca0493bd4548ac9c69dc4a4f27
SHA1a3e5e54e630dabe55ca18a798d9f5681e0620ba7
SHA2562ebd5229b9dc642afba36a27c7ac12d90196b1c50985c37e94f4c17474e15411
SHA51269c8116fb542b344a8c55e2658078bd3e0d3564b1e4c889b072dbc99d2b070dacbc4394dedbc22a4968a8cf9448e71f69ec71ded018c1bacc0e195b3b3072d32
-
Filesize
5KB
MD50e63a7633367e16b128fdb3cb9f8063a
SHA1c3b3f2b6a84382c3fc7adf01db65bafafdeb77bd
SHA256371cb895556f21c87496e20066cf6c0e942b45f2f1a3cdc37cf6cfdc17f95c54
SHA51246a2e892fb9ec9398e79d01260c470e5eddda413b38afd8abe29e2bc7e83d9d4fd26c5af60724833b30c418f0642eea2226340d7a7cd2da4b8f334a936fdac16
-
Filesize
6KB
MD5d142b0e4b2c6835861b35f6cffa22354
SHA1409b7a3dcb3712ffab4edd27b9416a96ce4543a6
SHA256f321c2c27143e6d442b1147c30d28d67be2f218473c351e9619937908bfc80da
SHA512b2853efc24afd53529b7cc4f913895c891226f4aecc6fffc36d1ff4cd00e1a8e3284bea63dea7461cf2cf6f08f8bc4898f7cd1199fb4a78f1df70b560dda45df
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD539ff6268587c2b0365da519305d3c815
SHA1f37d917fc14a260139f4ad5af1445f05c95b9f92
SHA2569d8d0a4be0c608eb8eff99fa3d6fe0ae700c986bbff4d01bc69900812161552f
SHA51277fecdd38ef75ad8ca24627e95825310cb9cd8fd21e27be7d34a0b3742d077bb4860c64426016dceb651fd0ba153a6fc57676cb75196e72b48e1fea173e605a9