Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
26/04/2024, 12:25
Static task
static1
Behavioral task
behavioral1
Sample
00c412af3f9e76ee5e18ac0820256424_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
00c412af3f9e76ee5e18ac0820256424_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
00c412af3f9e76ee5e18ac0820256424_JaffaCakes118.html
-
Size
139KB
-
MD5
00c412af3f9e76ee5e18ac0820256424
-
SHA1
bdb82297bcdd13849371ac1e4e0732cafd765ddd
-
SHA256
22a1170c8753110fab6fb4e9251a38985ee90d26489d5a153a394ed170e8c4e2
-
SHA512
a32dbbb022643b2729273904a710f5172e7d868eeeef8d804ba5ceedbcb461b1e095397f209a3462aa7c543983efb9eebd7d3002b3609612e1ace3042d8f3ead
-
SSDEEP
1536:SSbTygwrIl37WMGzyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3om:SSX7WMGzyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3008 msedge.exe 3008 msedge.exe 2160 msedge.exe 2160 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2160 wrote to memory of 4256 2160 msedge.exe 84 PID 2160 wrote to memory of 4256 2160 msedge.exe 84 PID 2160 wrote to memory of 2980 2160 msedge.exe 85 PID 2160 wrote to memory of 2980 2160 msedge.exe 85 PID 2160 wrote to memory of 2980 2160 msedge.exe 85 PID 2160 wrote to memory of 2980 2160 msedge.exe 85 PID 2160 wrote to memory of 2980 2160 msedge.exe 85 PID 2160 wrote to memory of 2980 2160 msedge.exe 85 PID 2160 wrote to memory of 2980 2160 msedge.exe 85 PID 2160 wrote to memory of 2980 2160 msedge.exe 85 PID 2160 wrote to memory of 2980 2160 msedge.exe 85 PID 2160 wrote to memory of 2980 2160 msedge.exe 85 PID 2160 wrote to memory of 2980 2160 msedge.exe 85 PID 2160 wrote to memory of 2980 2160 msedge.exe 85 PID 2160 wrote to memory of 2980 2160 msedge.exe 85 PID 2160 wrote to memory of 2980 2160 msedge.exe 85 PID 2160 wrote to memory of 2980 2160 msedge.exe 85 PID 2160 wrote to memory of 2980 2160 msedge.exe 85 PID 2160 wrote to memory of 2980 2160 msedge.exe 85 PID 2160 wrote to memory of 2980 2160 msedge.exe 85 PID 2160 wrote to memory of 2980 2160 msedge.exe 85 PID 2160 wrote to memory of 2980 2160 msedge.exe 85 PID 2160 wrote to memory of 2980 2160 msedge.exe 85 PID 2160 wrote to memory of 2980 2160 msedge.exe 85 PID 2160 wrote to memory of 2980 2160 msedge.exe 85 PID 2160 wrote to memory of 2980 2160 msedge.exe 85 PID 2160 wrote to memory of 2980 2160 msedge.exe 85 PID 2160 wrote to memory of 2980 2160 msedge.exe 85 PID 2160 wrote to memory of 2980 2160 msedge.exe 85 PID 2160 wrote to memory of 2980 2160 msedge.exe 85 PID 2160 wrote to memory of 2980 2160 msedge.exe 85 PID 2160 wrote to memory of 2980 2160 msedge.exe 85 PID 2160 wrote to memory of 2980 2160 msedge.exe 85 PID 2160 wrote to memory of 2980 2160 msedge.exe 85 PID 2160 wrote to memory of 2980 2160 msedge.exe 85 PID 2160 wrote to memory of 2980 2160 msedge.exe 85 PID 2160 wrote to memory of 2980 2160 msedge.exe 85 PID 2160 wrote to memory of 2980 2160 msedge.exe 85 PID 2160 wrote to memory of 2980 2160 msedge.exe 85 PID 2160 wrote to memory of 2980 2160 msedge.exe 85 PID 2160 wrote to memory of 2980 2160 msedge.exe 85 PID 2160 wrote to memory of 2980 2160 msedge.exe 85 PID 2160 wrote to memory of 3008 2160 msedge.exe 86 PID 2160 wrote to memory of 3008 2160 msedge.exe 86 PID 2160 wrote to memory of 1860 2160 msedge.exe 87 PID 2160 wrote to memory of 1860 2160 msedge.exe 87 PID 2160 wrote to memory of 1860 2160 msedge.exe 87 PID 2160 wrote to memory of 1860 2160 msedge.exe 87 PID 2160 wrote to memory of 1860 2160 msedge.exe 87 PID 2160 wrote to memory of 1860 2160 msedge.exe 87 PID 2160 wrote to memory of 1860 2160 msedge.exe 87 PID 2160 wrote to memory of 1860 2160 msedge.exe 87 PID 2160 wrote to memory of 1860 2160 msedge.exe 87 PID 2160 wrote to memory of 1860 2160 msedge.exe 87 PID 2160 wrote to memory of 1860 2160 msedge.exe 87 PID 2160 wrote to memory of 1860 2160 msedge.exe 87 PID 2160 wrote to memory of 1860 2160 msedge.exe 87 PID 2160 wrote to memory of 1860 2160 msedge.exe 87 PID 2160 wrote to memory of 1860 2160 msedge.exe 87 PID 2160 wrote to memory of 1860 2160 msedge.exe 87 PID 2160 wrote to memory of 1860 2160 msedge.exe 87 PID 2160 wrote to memory of 1860 2160 msedge.exe 87 PID 2160 wrote to memory of 1860 2160 msedge.exe 87 PID 2160 wrote to memory of 1860 2160 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\00c412af3f9e76ee5e18ac0820256424_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa44546f8,0x7ffaa4454708,0x7ffaa44547182⤵PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,14349730060661981825,9468167129069459710,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,14349730060661981825,9468167129069459710,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,14349730060661981825,9468167129069459710,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14349730060661981825,9468167129069459710,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14349730060661981825,9468167129069459710,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,14349730060661981825,9468167129069459710,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4360 /prefetch:82⤵PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,14349730060661981825,9468167129069459710,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4360 /prefetch:82⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14349730060661981825,9468167129069459710,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4392 /prefetch:12⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14349730060661981825,9468167129069459710,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4880 /prefetch:12⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14349730060661981825,9468167129069459710,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4032 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14349730060661981825,9468167129069459710,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:12⤵PID:1764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,14349730060661981825,9468167129069459710,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2592 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3424
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2272
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dbac49e66219979194c79f1cf1cb3dd1
SHA14ef87804a04d51ae1fac358f92382548b27f62f2
SHA256f24ed6c5bf4b734a9af4d64e14a80a160bea569f50849f70bf7b7277c4f48562
SHA512bb314d61f53cf7774f6dfb6b772c72f5daf386bc3d27d2bb7a14c65848ee86e6c48e9c5696693ded31846b69b9372a530175df48494e3d61a228e49d43401ad1
-
Filesize
152B
MD5a9e55f5864d6e2afd2fd84e25a3bc228
SHA1a5efcff9e3df6252c7fe8535d505235f82aab276
SHA2560f4df3120e4620555916be8e51c29be8d600d68ae5244efad6a0268aabc8c452
SHA51212f45fa73a6de6dfe17acc8b52b60f2d79008da130730b74cc138c1dcd73ccc99487165e3c8c90dc247359fde272f1ec6b3cf2c5fcb04e5093936144d0558b75
-
Filesize
6KB
MD53fad0811e5bbee3b5929d57d766eda80
SHA134f71dc7189bac7c2c9ca8854129dca8a2372e01
SHA256d93b165013a207a2266ccfb54d37e181f730c5763fed7a28742013ca0109684a
SHA5123313ec5488eddccc9cf8cd397829a6a3eff2ea2b055a1ac204f7cb25eea7c483751177463e84f4fc1b64775adeb33f7aeec183038a77bac6cbc414cec15c804a
-
Filesize
6KB
MD5325b7a6fc90a67c4e67766b0af92d29e
SHA195de91a8a31ca703f4226008e335bf6ed94aee94
SHA2560fa0b0202f33debea85d191bdd6124b75f7a56f30ddb82401d15c913662cb7c6
SHA512e87cac77a912be148c53c656892e015cf0934090f84ece2604f7b8b27c3fe366d2875082095427a9c1e9ceaea6810a66740406ee3d7b116a4500a5207522fc32
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5c019457fe6b57ddbca1c8aff88de6fe2
SHA16fe90dc42c68cf64d0a21a3e100de346d5ef539d
SHA2567b69923dc97920fb07d28749312524f94218af15be51e66bd908cb2e7f8b549b
SHA5121a07222f9ff90b204fc687870a4fba7c09ac986659dd2fdd79c1d053a9f3b72d371dc4cf256c82229b656a5c91449b815e46d080066fc3cff80a96739003d7bc