Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
26/04/2024, 06:46
Static task
static1
Behavioral task
behavioral1
Sample
00372068d9cdffb201356bfd9807886f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
00372068d9cdffb201356bfd9807886f_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
00372068d9cdffb201356bfd9807886f_JaffaCakes118.html
-
Size
478KB
-
MD5
00372068d9cdffb201356bfd9807886f
-
SHA1
c824de9e6ea47637de2e437f2d88f1c6c58fa084
-
SHA256
2965365d2e1aaa7b8def6d0f0e469905b12d05a8b485c8ae7c3dcb7059fa1b10
-
SHA512
b653364c1d12cdf19a836384cdd19fc496b6b897044356a45a4b3c5e34afb72ddc1c929deef7802bb3113e9f041dcd58e7dc08b4c0ef45d418543e0500093bad
-
SSDEEP
384:B56MfWnl9Fa5/TMg5SfF/T9wXYTH9r8Esyujx4R44DXQFTHZmR:SMWnl9F8m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2400 msedge.exe 2400 msedge.exe 4116 msedge.exe 4116 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 800 identity_helper.exe 800 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4116 wrote to memory of 3928 4116 msedge.exe 85 PID 4116 wrote to memory of 3928 4116 msedge.exe 85 PID 4116 wrote to memory of 3472 4116 msedge.exe 86 PID 4116 wrote to memory of 3472 4116 msedge.exe 86 PID 4116 wrote to memory of 3472 4116 msedge.exe 86 PID 4116 wrote to memory of 3472 4116 msedge.exe 86 PID 4116 wrote to memory of 3472 4116 msedge.exe 86 PID 4116 wrote to memory of 3472 4116 msedge.exe 86 PID 4116 wrote to memory of 3472 4116 msedge.exe 86 PID 4116 wrote to memory of 3472 4116 msedge.exe 86 PID 4116 wrote to memory of 3472 4116 msedge.exe 86 PID 4116 wrote to memory of 3472 4116 msedge.exe 86 PID 4116 wrote to memory of 3472 4116 msedge.exe 86 PID 4116 wrote to memory of 3472 4116 msedge.exe 86 PID 4116 wrote to memory of 3472 4116 msedge.exe 86 PID 4116 wrote to memory of 3472 4116 msedge.exe 86 PID 4116 wrote to memory of 3472 4116 msedge.exe 86 PID 4116 wrote to memory of 3472 4116 msedge.exe 86 PID 4116 wrote to memory of 3472 4116 msedge.exe 86 PID 4116 wrote to memory of 3472 4116 msedge.exe 86 PID 4116 wrote to memory of 3472 4116 msedge.exe 86 PID 4116 wrote to memory of 3472 4116 msedge.exe 86 PID 4116 wrote to memory of 3472 4116 msedge.exe 86 PID 4116 wrote to memory of 3472 4116 msedge.exe 86 PID 4116 wrote to memory of 3472 4116 msedge.exe 86 PID 4116 wrote to memory of 3472 4116 msedge.exe 86 PID 4116 wrote to memory of 3472 4116 msedge.exe 86 PID 4116 wrote to memory of 3472 4116 msedge.exe 86 PID 4116 wrote to memory of 3472 4116 msedge.exe 86 PID 4116 wrote to memory of 3472 4116 msedge.exe 86 PID 4116 wrote to memory of 3472 4116 msedge.exe 86 PID 4116 wrote to memory of 3472 4116 msedge.exe 86 PID 4116 wrote to memory of 3472 4116 msedge.exe 86 PID 4116 wrote to memory of 3472 4116 msedge.exe 86 PID 4116 wrote to memory of 3472 4116 msedge.exe 86 PID 4116 wrote to memory of 3472 4116 msedge.exe 86 PID 4116 wrote to memory of 3472 4116 msedge.exe 86 PID 4116 wrote to memory of 3472 4116 msedge.exe 86 PID 4116 wrote to memory of 3472 4116 msedge.exe 86 PID 4116 wrote to memory of 3472 4116 msedge.exe 86 PID 4116 wrote to memory of 3472 4116 msedge.exe 86 PID 4116 wrote to memory of 3472 4116 msedge.exe 86 PID 4116 wrote to memory of 2400 4116 msedge.exe 87 PID 4116 wrote to memory of 2400 4116 msedge.exe 87 PID 4116 wrote to memory of 1972 4116 msedge.exe 88 PID 4116 wrote to memory of 1972 4116 msedge.exe 88 PID 4116 wrote to memory of 1972 4116 msedge.exe 88 PID 4116 wrote to memory of 1972 4116 msedge.exe 88 PID 4116 wrote to memory of 1972 4116 msedge.exe 88 PID 4116 wrote to memory of 1972 4116 msedge.exe 88 PID 4116 wrote to memory of 1972 4116 msedge.exe 88 PID 4116 wrote to memory of 1972 4116 msedge.exe 88 PID 4116 wrote to memory of 1972 4116 msedge.exe 88 PID 4116 wrote to memory of 1972 4116 msedge.exe 88 PID 4116 wrote to memory of 1972 4116 msedge.exe 88 PID 4116 wrote to memory of 1972 4116 msedge.exe 88 PID 4116 wrote to memory of 1972 4116 msedge.exe 88 PID 4116 wrote to memory of 1972 4116 msedge.exe 88 PID 4116 wrote to memory of 1972 4116 msedge.exe 88 PID 4116 wrote to memory of 1972 4116 msedge.exe 88 PID 4116 wrote to memory of 1972 4116 msedge.exe 88 PID 4116 wrote to memory of 1972 4116 msedge.exe 88 PID 4116 wrote to memory of 1972 4116 msedge.exe 88 PID 4116 wrote to memory of 1972 4116 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\00372068d9cdffb201356bfd9807886f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa000046f8,0x7ffa00004708,0x7ffa000047182⤵PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,3981151822249408296,12283690114715998028,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2028 /prefetch:22⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2012,3981151822249408296,12283690114715998028,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2012,3981151822249408296,12283690114715998028,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,3981151822249408296,12283690114715998028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,3981151822249408296,12283690114715998028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,3981151822249408296,12283690114715998028,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4808 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,3981151822249408296,12283690114715998028,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4740 /prefetch:82⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,3981151822249408296,12283690114715998028,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4740 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,3981151822249408296,12283690114715998028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:1088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,3981151822249408296,12283690114715998028,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4904 /prefetch:12⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,3981151822249408296,12283690114715998028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,3981151822249408296,12283690114715998028,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4300
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2320
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5cff358b013d6f9f633bc1587f6f54ffa
SHA16cb7852e096be24695ff1bc213abde42d35bb376
SHA25639205cdf989e3a86822b3f473c5fc223d7290b98c2a3fb7f75e366fc8e3ecbe9
SHA5128831c223a1f0cf5f71fa851cdd82f4a9f03e5f267513e05b936756c116997f749ffa563623b4724de921d049de34a8f277cc539f58997cda4d178ea205be2259
-
Filesize
152B
MD5dc629a750e345390344524fe0ea7dcd7
SHA15f9f00a358caaef0321707c4f6f38d52bd7e0399
SHA25638b634f3fedcf2a9dc3280aa76bd1ea93e192200b8a48904664fac5c9944636a
SHA5122a941fe90b748d0326e011258fa9b494dc2f47ac047767455ed16a41d523f04370f818316503a5bad0ff5c5699e92a0aaf3952748b09287c5328354bfa6cc902
-
Filesize
5KB
MD5179a0c81f527afe7485e7f2deefeddfc
SHA1204c2ed52934d08790587c24aef48cf3449bbc23
SHA25609c5804026d3f4841e93b4ee39fa123d063cf4309a6863f89160ad5d788d2b11
SHA51280e4908e14ac0386920c97a21224686690294aa7bc2b9f49a47086fdc1a78d4953682f35dd4620d09ea8aadc40e29998c3382b2a58cd0366180999b9de2e9d99
-
Filesize
6KB
MD50773560f13035e7d529ce4c8452f58a5
SHA1a1dce3e7ca20a003a14660cd9cfe6f32256e2072
SHA25666664605838f5a4f7c23eb1a3d9972876d844813ac01e01e858a99fa44ad1e93
SHA512dc188beb08176f862d4f72fd7609986f69d60034f20dc3bfb99bfb995b61dfbdd9915ebd7383fa97eb66cb019ce06197331200ce57a7e276b480d85b8639a9bc
-
Filesize
6KB
MD528e9bf4e0bc604db529759d485d4071c
SHA1efdcc751fab66fc8d4209f5ef9ec18d7b64c5d7e
SHA256365cb0c2209405559f498623e3c83a879278f3c4abb873f0cb8f6ae04c1e630b
SHA512b9b34f1050ccc27bf956257097fa6042fc9f4a556421db9240cabcc6dbc744987a0c28c009ac17771dbdeff5190e34fc68fa6940699827d04f753d865cbd7e42
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59605309880618dcf7dbb0dd57da89a1b
SHA1dc760cfbeab0227caf7ff29a0374826236bdad55
SHA256d96cf8cae8e81fe1850618ad09e2493ce7ec280d40607e431b8e72309da2408c
SHA512bac50c2bec945bb189520d4cef13ef5f68d97523542d26d089cac9718b72516f549e08c6c9860447d6754dd45ff29ca61975b01e0061a4f39fe8d3920e5e5407