Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
27/04/2024, 21:40
Static task
static1
Behavioral task
behavioral1
Sample
03afebb79b5a371941af8a8146035ed0_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
03afebb79b5a371941af8a8146035ed0_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
03afebb79b5a371941af8a8146035ed0_JaffaCakes118.html
-
Size
119KB
-
MD5
03afebb79b5a371941af8a8146035ed0
-
SHA1
45e4d1d35455cfd6710933d6ca43dba4c847aa28
-
SHA256
304e09b5688f2e317a0c2e79367314b80dae91918755e2e45cb373f75587e0da
-
SHA512
8e9c02ca0200cd1b2ba151684e661fcd54097c4287ff5907966ef4b31c9624c464ed5bcf87765063ba24873b4a923dfef80fbc7dd2a785361b8665385135f7a3
-
SSDEEP
1536:SI+5pyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGL:Sj5pyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3492 msedge.exe 3492 msedge.exe 2584 msedge.exe 2584 msedge.exe 4112 identity_helper.exe 4112 identity_helper.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2584 wrote to memory of 880 2584 msedge.exe 84 PID 2584 wrote to memory of 880 2584 msedge.exe 84 PID 2584 wrote to memory of 1240 2584 msedge.exe 85 PID 2584 wrote to memory of 1240 2584 msedge.exe 85 PID 2584 wrote to memory of 1240 2584 msedge.exe 85 PID 2584 wrote to memory of 1240 2584 msedge.exe 85 PID 2584 wrote to memory of 1240 2584 msedge.exe 85 PID 2584 wrote to memory of 1240 2584 msedge.exe 85 PID 2584 wrote to memory of 1240 2584 msedge.exe 85 PID 2584 wrote to memory of 1240 2584 msedge.exe 85 PID 2584 wrote to memory of 1240 2584 msedge.exe 85 PID 2584 wrote to memory of 1240 2584 msedge.exe 85 PID 2584 wrote to memory of 1240 2584 msedge.exe 85 PID 2584 wrote to memory of 1240 2584 msedge.exe 85 PID 2584 wrote to memory of 1240 2584 msedge.exe 85 PID 2584 wrote to memory of 1240 2584 msedge.exe 85 PID 2584 wrote to memory of 1240 2584 msedge.exe 85 PID 2584 wrote to memory of 1240 2584 msedge.exe 85 PID 2584 wrote to memory of 1240 2584 msedge.exe 85 PID 2584 wrote to memory of 1240 2584 msedge.exe 85 PID 2584 wrote to memory of 1240 2584 msedge.exe 85 PID 2584 wrote to memory of 1240 2584 msedge.exe 85 PID 2584 wrote to memory of 1240 2584 msedge.exe 85 PID 2584 wrote to memory of 1240 2584 msedge.exe 85 PID 2584 wrote to memory of 1240 2584 msedge.exe 85 PID 2584 wrote to memory of 1240 2584 msedge.exe 85 PID 2584 wrote to memory of 1240 2584 msedge.exe 85 PID 2584 wrote to memory of 1240 2584 msedge.exe 85 PID 2584 wrote to memory of 1240 2584 msedge.exe 85 PID 2584 wrote to memory of 1240 2584 msedge.exe 85 PID 2584 wrote to memory of 1240 2584 msedge.exe 85 PID 2584 wrote to memory of 1240 2584 msedge.exe 85 PID 2584 wrote to memory of 1240 2584 msedge.exe 85 PID 2584 wrote to memory of 1240 2584 msedge.exe 85 PID 2584 wrote to memory of 1240 2584 msedge.exe 85 PID 2584 wrote to memory of 1240 2584 msedge.exe 85 PID 2584 wrote to memory of 1240 2584 msedge.exe 85 PID 2584 wrote to memory of 1240 2584 msedge.exe 85 PID 2584 wrote to memory of 1240 2584 msedge.exe 85 PID 2584 wrote to memory of 1240 2584 msedge.exe 85 PID 2584 wrote to memory of 1240 2584 msedge.exe 85 PID 2584 wrote to memory of 1240 2584 msedge.exe 85 PID 2584 wrote to memory of 3492 2584 msedge.exe 86 PID 2584 wrote to memory of 3492 2584 msedge.exe 86 PID 2584 wrote to memory of 4940 2584 msedge.exe 87 PID 2584 wrote to memory of 4940 2584 msedge.exe 87 PID 2584 wrote to memory of 4940 2584 msedge.exe 87 PID 2584 wrote to memory of 4940 2584 msedge.exe 87 PID 2584 wrote to memory of 4940 2584 msedge.exe 87 PID 2584 wrote to memory of 4940 2584 msedge.exe 87 PID 2584 wrote to memory of 4940 2584 msedge.exe 87 PID 2584 wrote to memory of 4940 2584 msedge.exe 87 PID 2584 wrote to memory of 4940 2584 msedge.exe 87 PID 2584 wrote to memory of 4940 2584 msedge.exe 87 PID 2584 wrote to memory of 4940 2584 msedge.exe 87 PID 2584 wrote to memory of 4940 2584 msedge.exe 87 PID 2584 wrote to memory of 4940 2584 msedge.exe 87 PID 2584 wrote to memory of 4940 2584 msedge.exe 87 PID 2584 wrote to memory of 4940 2584 msedge.exe 87 PID 2584 wrote to memory of 4940 2584 msedge.exe 87 PID 2584 wrote to memory of 4940 2584 msedge.exe 87 PID 2584 wrote to memory of 4940 2584 msedge.exe 87 PID 2584 wrote to memory of 4940 2584 msedge.exe 87 PID 2584 wrote to memory of 4940 2584 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\03afebb79b5a371941af8a8146035ed0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc496046f8,0x7ffc49604708,0x7ffc496047182⤵PID:880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,12810903867505940429,12071712584575562590,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:1240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,12810903867505940429,12071712584575562590,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,12810903867505940429,12071712584575562590,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12810903867505940429,12071712584575562590,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12810903867505940429,12071712584575562590,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,12810903867505940429,12071712584575562590,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4436 /prefetch:82⤵PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,12810903867505940429,12071712584575562590,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4436 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12810903867505940429,12071712584575562590,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4248 /prefetch:12⤵PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12810903867505940429,12071712584575562590,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12810903867505940429,12071712584575562590,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4144 /prefetch:12⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12810903867505940429,12071712584575562590,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:12⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,12810903867505940429,12071712584575562590,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5016 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4764
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:988
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59dc60aef38e7832217e7fa02d6f0d9f6
SHA14f8539dc7d5739b36fe976a932338f459d066db6
SHA2568a0ee0b6fafabb256571b691c2faf77c7244945faa749c72124d5eb43a197a32
SHA51218371541811910992c2b84a8eae7e997e8627640bdb60b9e82751389e50931db9b3e206d31f4d9d2dc3ca25ea3a82c0be413ecb0ef3ac227a14e54f406eaa7e7
-
Filesize
152B
MD57ac03b15b68af2d5cb5c8063057cc83e
SHA19b2d4db737f57322ff5c4bbddd765b3177f930ab
SHA256b90d7596301470b389842eecb46bd3a8e614260b0d374d5c35a36afb9c71a700
SHA512a5e9f40dd9040803046b0218fab6b058d49e5e2a3ada315e161fe9fc80ebb8d6d4442ccc1c98d19e561fc7c61bcf43d662fe2231cacacb447876a2113c2e3732
-
Filesize
6KB
MD5747bbdeccc17cd4687330fe328bbdff3
SHA1cde87d838d9814ce650fa331a56cd74920bf2824
SHA2566b7299bb9f7e0b0bb82409f116a9b3e3bf656f2ee1f66b81c5b0a182f60d7ca8
SHA5125cab5c4d6534e4c91ed713745049fb07918230e19a98ecbecdb2860f9cbe1f53a1c3f3e67b45facde9096d3bc01d2ffe529370dc3f82b03c659ef54dd56fe314
-
Filesize
6KB
MD5af9967c69627f7f95a448f341550c9a2
SHA1af575e8142b77bd3cf095e065d61ee259d35c155
SHA256420a2c6bdfc485dfeff2d990e50571590014de897ae025a81cf83af712944b07
SHA51286f7dbd8540d2aef0740f886bd2a14fd8af9a2f7616b4f34f11f72d82c46820f6152fbe0fb572b1e795254bb08f199859c724c56a39bfec975bbc642a45f85c0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5475e49d3c6c791fa9776a3380bbb9b77
SHA1e2f9d172568087990205db38e50e7890573cca93
SHA25612b93d351b88eb609a9853bf75b34ce6a6b2214d5993dbff4e92a6dcb808d0ce
SHA512c474b32da6b3a8b2e139058d1258e82d0ffa732b1347f77f30cdd14407ec983a3af43ec28df31e27640aca8d9ac8b88ca746826ae985b2a956d749334c0ff256