Analysis
-
max time kernel
145s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 22:41
Static task
static1
Behavioral task
behavioral1
Sample
152f20bc14e3bb05d8d12ecd77f0c210_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
152f20bc14e3bb05d8d12ecd77f0c210_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
152f20bc14e3bb05d8d12ecd77f0c210_JaffaCakes118.html
-
Size
934B
-
MD5
152f20bc14e3bb05d8d12ecd77f0c210
-
SHA1
4cd656447cb25c957cdb0043ca79cc480c89b83c
-
SHA256
9d588fce550073c0ea6b59ab6d21f97205f02ff085d5953a6cbf537ab3b0ad6d
-
SHA512
8e5ced8ace8325faa40078aedcb00419762c4eb9faa8868dd6875714d10c2ddce6dfaea6042723601e4c92df35aa8b5dbc2dd502bf0ebb155ec61c36b9dab4a3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1668 msedge.exe 1668 msedge.exe 2044 msedge.exe 2044 msedge.exe 1244 identity_helper.exe 1244 identity_helper.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2044 wrote to memory of 2012 2044 msedge.exe 82 PID 2044 wrote to memory of 2012 2044 msedge.exe 82 PID 2044 wrote to memory of 2432 2044 msedge.exe 83 PID 2044 wrote to memory of 2432 2044 msedge.exe 83 PID 2044 wrote to memory of 2432 2044 msedge.exe 83 PID 2044 wrote to memory of 2432 2044 msedge.exe 83 PID 2044 wrote to memory of 2432 2044 msedge.exe 83 PID 2044 wrote to memory of 2432 2044 msedge.exe 83 PID 2044 wrote to memory of 2432 2044 msedge.exe 83 PID 2044 wrote to memory of 2432 2044 msedge.exe 83 PID 2044 wrote to memory of 2432 2044 msedge.exe 83 PID 2044 wrote to memory of 2432 2044 msedge.exe 83 PID 2044 wrote to memory of 2432 2044 msedge.exe 83 PID 2044 wrote to memory of 2432 2044 msedge.exe 83 PID 2044 wrote to memory of 2432 2044 msedge.exe 83 PID 2044 wrote to memory of 2432 2044 msedge.exe 83 PID 2044 wrote to memory of 2432 2044 msedge.exe 83 PID 2044 wrote to memory of 2432 2044 msedge.exe 83 PID 2044 wrote to memory of 2432 2044 msedge.exe 83 PID 2044 wrote to memory of 2432 2044 msedge.exe 83 PID 2044 wrote to memory of 2432 2044 msedge.exe 83 PID 2044 wrote to memory of 2432 2044 msedge.exe 83 PID 2044 wrote to memory of 2432 2044 msedge.exe 83 PID 2044 wrote to memory of 2432 2044 msedge.exe 83 PID 2044 wrote to memory of 2432 2044 msedge.exe 83 PID 2044 wrote to memory of 2432 2044 msedge.exe 83 PID 2044 wrote to memory of 2432 2044 msedge.exe 83 PID 2044 wrote to memory of 2432 2044 msedge.exe 83 PID 2044 wrote to memory of 2432 2044 msedge.exe 83 PID 2044 wrote to memory of 2432 2044 msedge.exe 83 PID 2044 wrote to memory of 2432 2044 msedge.exe 83 PID 2044 wrote to memory of 2432 2044 msedge.exe 83 PID 2044 wrote to memory of 2432 2044 msedge.exe 83 PID 2044 wrote to memory of 2432 2044 msedge.exe 83 PID 2044 wrote to memory of 2432 2044 msedge.exe 83 PID 2044 wrote to memory of 2432 2044 msedge.exe 83 PID 2044 wrote to memory of 2432 2044 msedge.exe 83 PID 2044 wrote to memory of 2432 2044 msedge.exe 83 PID 2044 wrote to memory of 2432 2044 msedge.exe 83 PID 2044 wrote to memory of 2432 2044 msedge.exe 83 PID 2044 wrote to memory of 2432 2044 msedge.exe 83 PID 2044 wrote to memory of 2432 2044 msedge.exe 83 PID 2044 wrote to memory of 1668 2044 msedge.exe 84 PID 2044 wrote to memory of 1668 2044 msedge.exe 84 PID 2044 wrote to memory of 4248 2044 msedge.exe 85 PID 2044 wrote to memory of 4248 2044 msedge.exe 85 PID 2044 wrote to memory of 4248 2044 msedge.exe 85 PID 2044 wrote to memory of 4248 2044 msedge.exe 85 PID 2044 wrote to memory of 4248 2044 msedge.exe 85 PID 2044 wrote to memory of 4248 2044 msedge.exe 85 PID 2044 wrote to memory of 4248 2044 msedge.exe 85 PID 2044 wrote to memory of 4248 2044 msedge.exe 85 PID 2044 wrote to memory of 4248 2044 msedge.exe 85 PID 2044 wrote to memory of 4248 2044 msedge.exe 85 PID 2044 wrote to memory of 4248 2044 msedge.exe 85 PID 2044 wrote to memory of 4248 2044 msedge.exe 85 PID 2044 wrote to memory of 4248 2044 msedge.exe 85 PID 2044 wrote to memory of 4248 2044 msedge.exe 85 PID 2044 wrote to memory of 4248 2044 msedge.exe 85 PID 2044 wrote to memory of 4248 2044 msedge.exe 85 PID 2044 wrote to memory of 4248 2044 msedge.exe 85 PID 2044 wrote to memory of 4248 2044 msedge.exe 85 PID 2044 wrote to memory of 4248 2044 msedge.exe 85 PID 2044 wrote to memory of 4248 2044 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\152f20bc14e3bb05d8d12ecd77f0c210_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8cd7946f8,0x7ff8cd794708,0x7ff8cd7947182⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,8213094365070119646,7568852342397898082,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2016,8213094365070119646,7568852342397898082,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2016,8213094365070119646,7568852342397898082,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:82⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,8213094365070119646,7568852342397898082,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,8213094365070119646,7568852342397898082,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,8213094365070119646,7568852342397898082,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4112 /prefetch:12⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,8213094365070119646,7568852342397898082,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4876 /prefetch:82⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,8213094365070119646,7568852342397898082,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4876 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,8213094365070119646,7568852342397898082,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:12⤵PID:796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,8213094365070119646,7568852342397898082,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,8213094365070119646,7568852342397898082,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,8213094365070119646,7568852342397898082,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1892 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4968
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2344
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4828
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD59cc26cfd2e7555c7cb014457607ac1b4
SHA19813e25f484d725970cb5a127992679120b10acb
SHA256f5f584c3cc3c61d6a314ae6993aa29cdb5d8b50c147aa4c601cb2f6450f43764
SHA5122fd5f9848312686b69d8b7544542eb03d5d3cbd60f4ca9a3c06e32a7e00384f123d97e799901981024ec077d0852c1fbfd855303aa7ebfb75d396b07f3c7bc7f
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
5KB
MD5ac7c9933e37f07419edd12a0219c1e85
SHA1a1f6e72c5b65b4591ac4690ceb7f6210c5c569ce
SHA2564dad54cb86252770821a34d921a1bd235a7d98dc0aa7224518b4bcc6895b3579
SHA512822af4bfe5ab87f52cfd641a6abe5872f2ff17d18477edf450d0a7b1d3d1ed8c8804a78d8f63c60b27b59e10758f946ce99900639bbde9bac808232dc497a469
-
Filesize
6KB
MD55c9b39b3cd2f130cbd837db67987265d
SHA1e58569b283e256f188bf03435152cf44264fb1d2
SHA256f9c81a190966c04a5c8a591e9149f77c290f402728604047cb2379ec196f369b
SHA512b0a582cb3d2db503ed1a875bdb9a192a6b7caaf5382d8d2bd4ddcb152e0811c2b3dd5e85bc1983a1e72507e70343067095788134367c4224082d03094ab47790
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389