Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2024, 02:56
Static task
static1
Behavioral task
behavioral1
Sample
f02369507d20f6855df26ab303238aec_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f02369507d20f6855df26ab303238aec_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f02369507d20f6855df26ab303238aec_JaffaCakes118.html
-
Size
53KB
-
MD5
f02369507d20f6855df26ab303238aec
-
SHA1
5670bf5755fe80baa39880e1fa36956d91408e12
-
SHA256
e3e63838299fec54b2535cabb42887764a6835631b58e8e33c30e612094500ec
-
SHA512
48ebe5df0f530f4549229f46031cc396af2c6aae3cfecd12c6344d90f19854c560bcc4c1d417b308f37a6596ca1f802722014c9acb85255a38d3ad1f34fe7749
-
SSDEEP
1536:CkgUiIakTqGivi+PyUYrunlYX63Nj+q5VyvR0w2AzTICbbeo8/t9M/dNwIUEDmDO:CkgUiIakTqGivi+PyUYrunlYX63Nj+qW
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1904 msedge.exe 1904 msedge.exe 3604 msedge.exe 3604 msedge.exe 448 identity_helper.exe 448 identity_helper.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3604 wrote to memory of 3168 3604 msedge.exe 87 PID 3604 wrote to memory of 3168 3604 msedge.exe 87 PID 3604 wrote to memory of 1984 3604 msedge.exe 88 PID 3604 wrote to memory of 1984 3604 msedge.exe 88 PID 3604 wrote to memory of 1984 3604 msedge.exe 88 PID 3604 wrote to memory of 1984 3604 msedge.exe 88 PID 3604 wrote to memory of 1984 3604 msedge.exe 88 PID 3604 wrote to memory of 1984 3604 msedge.exe 88 PID 3604 wrote to memory of 1984 3604 msedge.exe 88 PID 3604 wrote to memory of 1984 3604 msedge.exe 88 PID 3604 wrote to memory of 1984 3604 msedge.exe 88 PID 3604 wrote to memory of 1984 3604 msedge.exe 88 PID 3604 wrote to memory of 1984 3604 msedge.exe 88 PID 3604 wrote to memory of 1984 3604 msedge.exe 88 PID 3604 wrote to memory of 1984 3604 msedge.exe 88 PID 3604 wrote to memory of 1984 3604 msedge.exe 88 PID 3604 wrote to memory of 1984 3604 msedge.exe 88 PID 3604 wrote to memory of 1984 3604 msedge.exe 88 PID 3604 wrote to memory of 1984 3604 msedge.exe 88 PID 3604 wrote to memory of 1984 3604 msedge.exe 88 PID 3604 wrote to memory of 1984 3604 msedge.exe 88 PID 3604 wrote to memory of 1984 3604 msedge.exe 88 PID 3604 wrote to memory of 1984 3604 msedge.exe 88 PID 3604 wrote to memory of 1984 3604 msedge.exe 88 PID 3604 wrote to memory of 1984 3604 msedge.exe 88 PID 3604 wrote to memory of 1984 3604 msedge.exe 88 PID 3604 wrote to memory of 1984 3604 msedge.exe 88 PID 3604 wrote to memory of 1984 3604 msedge.exe 88 PID 3604 wrote to memory of 1984 3604 msedge.exe 88 PID 3604 wrote to memory of 1984 3604 msedge.exe 88 PID 3604 wrote to memory of 1984 3604 msedge.exe 88 PID 3604 wrote to memory of 1984 3604 msedge.exe 88 PID 3604 wrote to memory of 1984 3604 msedge.exe 88 PID 3604 wrote to memory of 1984 3604 msedge.exe 88 PID 3604 wrote to memory of 1984 3604 msedge.exe 88 PID 3604 wrote to memory of 1984 3604 msedge.exe 88 PID 3604 wrote to memory of 1984 3604 msedge.exe 88 PID 3604 wrote to memory of 1984 3604 msedge.exe 88 PID 3604 wrote to memory of 1984 3604 msedge.exe 88 PID 3604 wrote to memory of 1984 3604 msedge.exe 88 PID 3604 wrote to memory of 1984 3604 msedge.exe 88 PID 3604 wrote to memory of 1984 3604 msedge.exe 88 PID 3604 wrote to memory of 1904 3604 msedge.exe 89 PID 3604 wrote to memory of 1904 3604 msedge.exe 89 PID 3604 wrote to memory of 3428 3604 msedge.exe 90 PID 3604 wrote to memory of 3428 3604 msedge.exe 90 PID 3604 wrote to memory of 3428 3604 msedge.exe 90 PID 3604 wrote to memory of 3428 3604 msedge.exe 90 PID 3604 wrote to memory of 3428 3604 msedge.exe 90 PID 3604 wrote to memory of 3428 3604 msedge.exe 90 PID 3604 wrote to memory of 3428 3604 msedge.exe 90 PID 3604 wrote to memory of 3428 3604 msedge.exe 90 PID 3604 wrote to memory of 3428 3604 msedge.exe 90 PID 3604 wrote to memory of 3428 3604 msedge.exe 90 PID 3604 wrote to memory of 3428 3604 msedge.exe 90 PID 3604 wrote to memory of 3428 3604 msedge.exe 90 PID 3604 wrote to memory of 3428 3604 msedge.exe 90 PID 3604 wrote to memory of 3428 3604 msedge.exe 90 PID 3604 wrote to memory of 3428 3604 msedge.exe 90 PID 3604 wrote to memory of 3428 3604 msedge.exe 90 PID 3604 wrote to memory of 3428 3604 msedge.exe 90 PID 3604 wrote to memory of 3428 3604 msedge.exe 90 PID 3604 wrote to memory of 3428 3604 msedge.exe 90 PID 3604 wrote to memory of 3428 3604 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f02369507d20f6855df26ab303238aec_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff528a46f8,0x7fff528a4708,0x7fff528a47182⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,4649361675632196832,14273691330725606728,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,4649361675632196832,14273691330725606728,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,4649361675632196832,14273691330725606728,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,4649361675632196832,14273691330725606728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,4649361675632196832,14273691330725606728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:2088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,4649361675632196832,14273691330725606728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:12⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,4649361675632196832,14273691330725606728,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4136 /prefetch:82⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,4649361675632196832,14273691330725606728,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4136 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,4649361675632196832,14273691330725606728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,4649361675632196832,14273691330725606728,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4180 /prefetch:12⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,4649361675632196832,14273691330725606728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3980 /prefetch:12⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,4649361675632196832,14273691330725606728,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5880 /prefetch:12⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,4649361675632196832,14273691330725606728,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1968 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3960
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4220
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e36b219dcae7d32ec82cec3245512f80
SHA16b2bd46e4f6628d66f7ec4b5c399b8c9115a9466
SHA25616bc6f47bbfbd4e54c3163dafe784486b72d0b78e6ea3593122edb338448a27b
SHA512fc539c461d87141a180cf71bb6a636c75517e5e7226e76b71fd64e834dcacc88fcaaa92a9a00999bc0afc4fb93b7304b068000f14653c05ff03dd7baef3f225c
-
Filesize
152B
MD5559ff144c30d6a7102ec298fb7c261c4
SHA1badecb08f9a6c849ce5b30c348156b45ac9120b9
SHA2565444032cb994b90287c0262f2fba16f38e339073fd89aa3ab2592dfebc3e6f10
SHA5123a45661fc29e312aa643a12447bffdab83128fe5124077a870090081af6aaa4cf0bd021889ab1df5cd40f44adb055b1394b31313515c2929f714824c89fd0f04
-
Filesize
402B
MD5ae48abac62c550959b553f55ea3ec3d9
SHA1424a54fb95dab8a78d2a91b9cb1f562033c7cbaf
SHA256d2ca5b41324e7000b7b2f46e6bd06111660712afe4851c5cb163211dd1af8274
SHA512e3d05938ef2f3940d93bda7c6e97309ceb44045f53624e1e778d81cf0e82bc8b550b6064cfb9026da37ef3ad171f87a583f8ba9bb616670511e8ade4c9f4c792
-
Filesize
6KB
MD508bb03e7727092e0eb062f546e3b0922
SHA1cae55ac50a9130683a1c74ed242aafca39923380
SHA256a7f6141cf9375feae657f0c9fdcb43f7b82c9b6e051189d00425e581eec60963
SHA512fa244504afd963c8ee84a7bec49f52e7322cc0d3cb26ba79b9c834d9fe18dbbff91eda6ec148702aa01bb56cfa9e89f5ae3c7a6926b6c5ae6fbacc61f63fc788
-
Filesize
6KB
MD534cf7dbe877732abde88deb5d3442a3e
SHA18bd71241775b96430d1799f07f97900dc66f2848
SHA25694be0672ad710103c96197fe53040e40615c0ff72319a04f1ce4b370549ca713
SHA512d063498c358baf2d39d7a082a1c6bb57326f2a97f28a7706b14593f20fc93ecd1533a0c90e365bf3d5d60c2dcafb5fc8b063449f5190d30235e8145dfbdd391b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b4cd7f7f11bf2eca333e291982653eec
SHA12fa2a051dec03e6a0dd672821c2f41de5a502c89
SHA256bd88e5cd320958864aa66f587a17a98f67b42ad976bdfbcd563beb24b3a7f3c9
SHA51279e8006597bb77fa835d8e114602cd687a319d288cfcce4acf8d9b965c0ae2ac4ece251439fcda4f8476c4ef302e3bce76baabf0901a661530ccdc358abb2041