Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14/07/2024, 02:52
Static task
static1
Behavioral task
behavioral1
Sample
43ffb5f076b1c74d18169317297d8f13_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
43ffb5f076b1c74d18169317297d8f13_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
43ffb5f076b1c74d18169317297d8f13_JaffaCakes118.html
-
Size
53KB
-
MD5
43ffb5f076b1c74d18169317297d8f13
-
SHA1
0b14baab24c0f44525c0094207797373e531e5c3
-
SHA256
444e0ac9da685ed9005bbfa1f5e8a939d6d3bc8643ad917c1d8694aaeb736135
-
SHA512
f4bfe5fbfe983a1876eaf231d4219925bdcd0c6cd269884229b8386d56c886857b37078691162df906de08db74238b7a553d153e01386878c9f665e57af73ffc
-
SSDEEP
1536:CkgUiIakTqGivi+PyUhrunlY963Nj+q5VyvR0w2AzTICbbCoe/t9M/dNwIUTDmDQ:CkgUiIakTqGivi+PyUhrunlY963Nj+qP
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2820 msedge.exe 2820 msedge.exe 3192 msedge.exe 3192 msedge.exe 3476 identity_helper.exe 3476 identity_helper.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3192 wrote to memory of 4520 3192 msedge.exe 83 PID 3192 wrote to memory of 4520 3192 msedge.exe 83 PID 3192 wrote to memory of 4052 3192 msedge.exe 84 PID 3192 wrote to memory of 4052 3192 msedge.exe 84 PID 3192 wrote to memory of 4052 3192 msedge.exe 84 PID 3192 wrote to memory of 4052 3192 msedge.exe 84 PID 3192 wrote to memory of 4052 3192 msedge.exe 84 PID 3192 wrote to memory of 4052 3192 msedge.exe 84 PID 3192 wrote to memory of 4052 3192 msedge.exe 84 PID 3192 wrote to memory of 4052 3192 msedge.exe 84 PID 3192 wrote to memory of 4052 3192 msedge.exe 84 PID 3192 wrote to memory of 4052 3192 msedge.exe 84 PID 3192 wrote to memory of 4052 3192 msedge.exe 84 PID 3192 wrote to memory of 4052 3192 msedge.exe 84 PID 3192 wrote to memory of 4052 3192 msedge.exe 84 PID 3192 wrote to memory of 4052 3192 msedge.exe 84 PID 3192 wrote to memory of 4052 3192 msedge.exe 84 PID 3192 wrote to memory of 4052 3192 msedge.exe 84 PID 3192 wrote to memory of 4052 3192 msedge.exe 84 PID 3192 wrote to memory of 4052 3192 msedge.exe 84 PID 3192 wrote to memory of 4052 3192 msedge.exe 84 PID 3192 wrote to memory of 4052 3192 msedge.exe 84 PID 3192 wrote to memory of 4052 3192 msedge.exe 84 PID 3192 wrote to memory of 4052 3192 msedge.exe 84 PID 3192 wrote to memory of 4052 3192 msedge.exe 84 PID 3192 wrote to memory of 4052 3192 msedge.exe 84 PID 3192 wrote to memory of 4052 3192 msedge.exe 84 PID 3192 wrote to memory of 4052 3192 msedge.exe 84 PID 3192 wrote to memory of 4052 3192 msedge.exe 84 PID 3192 wrote to memory of 4052 3192 msedge.exe 84 PID 3192 wrote to memory of 4052 3192 msedge.exe 84 PID 3192 wrote to memory of 4052 3192 msedge.exe 84 PID 3192 wrote to memory of 4052 3192 msedge.exe 84 PID 3192 wrote to memory of 4052 3192 msedge.exe 84 PID 3192 wrote to memory of 4052 3192 msedge.exe 84 PID 3192 wrote to memory of 4052 3192 msedge.exe 84 PID 3192 wrote to memory of 4052 3192 msedge.exe 84 PID 3192 wrote to memory of 4052 3192 msedge.exe 84 PID 3192 wrote to memory of 4052 3192 msedge.exe 84 PID 3192 wrote to memory of 4052 3192 msedge.exe 84 PID 3192 wrote to memory of 4052 3192 msedge.exe 84 PID 3192 wrote to memory of 4052 3192 msedge.exe 84 PID 3192 wrote to memory of 2820 3192 msedge.exe 85 PID 3192 wrote to memory of 2820 3192 msedge.exe 85 PID 3192 wrote to memory of 2016 3192 msedge.exe 86 PID 3192 wrote to memory of 2016 3192 msedge.exe 86 PID 3192 wrote to memory of 2016 3192 msedge.exe 86 PID 3192 wrote to memory of 2016 3192 msedge.exe 86 PID 3192 wrote to memory of 2016 3192 msedge.exe 86 PID 3192 wrote to memory of 2016 3192 msedge.exe 86 PID 3192 wrote to memory of 2016 3192 msedge.exe 86 PID 3192 wrote to memory of 2016 3192 msedge.exe 86 PID 3192 wrote to memory of 2016 3192 msedge.exe 86 PID 3192 wrote to memory of 2016 3192 msedge.exe 86 PID 3192 wrote to memory of 2016 3192 msedge.exe 86 PID 3192 wrote to memory of 2016 3192 msedge.exe 86 PID 3192 wrote to memory of 2016 3192 msedge.exe 86 PID 3192 wrote to memory of 2016 3192 msedge.exe 86 PID 3192 wrote to memory of 2016 3192 msedge.exe 86 PID 3192 wrote to memory of 2016 3192 msedge.exe 86 PID 3192 wrote to memory of 2016 3192 msedge.exe 86 PID 3192 wrote to memory of 2016 3192 msedge.exe 86 PID 3192 wrote to memory of 2016 3192 msedge.exe 86 PID 3192 wrote to memory of 2016 3192 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\43ffb5f076b1c74d18169317297d8f13_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc362046f8,0x7ffc36204708,0x7ffc362047182⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,15053791766421543092,7774295082181179327,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,15053791766421543092,7774295082181179327,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,15053791766421543092,7774295082181179327,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2948 /prefetch:82⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,15053791766421543092,7774295082181179327,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,15053791766421543092,7774295082181179327,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,15053791766421543092,7774295082181179327,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,15053791766421543092,7774295082181179327,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 /prefetch:82⤵PID:324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,15053791766421543092,7774295082181179327,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,15053791766421543092,7774295082181179327,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:12⤵PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,15053791766421543092,7774295082181179327,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,15053791766421543092,7774295082181179327,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,15053791766421543092,7774295082181179327,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,15053791766421543092,7774295082181179327,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2988 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4960
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4336
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2288
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5584971c8ba88c824fd51a05dddb45a98
SHA1b7c9489b4427652a9cdd754d1c1b6ac4034be421
SHA256e2d8de6c2323bbb3863ec50843d9b58a22e911fd626d31430658b9ea942cd307
SHA5125dbf1a4631a04d1149d8fab2b8e0e43ccd97b7212de43b961b9128a8bf03329164fdeb480154a8ffea5835f28417a7d2b115b8bf8d578d00b13c3682aa5ca726
-
Filesize
152B
MD5b28ef7d9f6d74f055cc49876767c886c
SHA1d6b3267f36c340979f8fc3e012fdd02c468740bf
SHA256fa6804456884789f4bdf9c3f5a4a8f29e0ededde149c4384072f3d8cc85bcc37
SHA512491f893c8f765e5d629bce8dd5067cef4e2ebc558d43bfb05e358bca43e1a66ee1285519bc266fd0ff5b5e09769a56077b62ac55fa8797c1edf6205843356e75
-
Filesize
402B
MD59e3c112c36a2be82399f792830a7d064
SHA1b01b7b38df9c0c58dbc96662c47e594b9a6ab863
SHA2568738eabe251f5c2264929f964f673d9a95805ce8cfce0d16f95aa967a40a0ae6
SHA5120664695887e46566e91addde2c2e12a4bec479ee99edcbe8d0c38398d32ab4fbd433b4fb4d3a155f1b24ea0b08fa8ceb5d621621ff23e69fd512282a12c18e86
-
Filesize
6KB
MD548f17fd04204d79b41cdf3e1c84e3daf
SHA1127646e155989104fb1deb6c84b0b627a295a22a
SHA25648b5f234ac96bb63f176097afa0b6187300cac0976e1c317a22f026f7e5b7b79
SHA5126927f1bc6b3b9c924d535c568178289d86b853e7e7be67bde202027eb8bd1bce26520f640a22228db9fabce5bff1a60208655a2059de7ba124763a12b7ffd4c8
-
Filesize
6KB
MD54d940a8f9bc0099d22347a44a06f4eca
SHA1d79f48250bdc2b063ee731de81e8adb92e563ef6
SHA256814a50efde965de4375037fc9532c151c8b132c9fc1134e4e878f6537084c778
SHA51230e138b5c231263fe61b3c53320f32159eba6bc0586420c207d53ce11ce0f04e1d6c8c4296148d4b27ae3c3993483c64559fdfcc2b281585c6c8e34f71c611fb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57e97ca095349eaf1492672d41e85276c
SHA16723294f50e73d713a74a2718b5014c0f79a09e1
SHA25623245d6ad6a17e60d97dc1348981363f653df139ff7a3934648780d47ffd7dd4
SHA512ebe78628a493f85bea6bfb6240e01126d7498074660ac1db98d35808d700169ac9b45d328f8eba42bd488e8e8c39df5e86b9617a41f75366857ed87e5050fa0c