Analysis
-
max time kernel
145s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
27/04/2024, 01:13
Static task
static1
Behavioral task
behavioral1
Sample
02134062a5879ade2114047228052ba1_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
02134062a5879ade2114047228052ba1_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
02134062a5879ade2114047228052ba1_JaffaCakes118.html
-
Size
431KB
-
MD5
02134062a5879ade2114047228052ba1
-
SHA1
0f476fd21076b76914f01a9e5299d6629dac8f11
-
SHA256
3f8188f4d37893cb2b4d899d511a00ad096c399874fe73774e911fefa807ee35
-
SHA512
e7b5f34f51f7c1e98e72b4745f045435904e10766bc01dbff8d9b3434dfc2fc3d4eb1a67cd1ad052a025ba47e47a56ce38076e0b27f37f285dadb5a622d0ac04
-
SSDEEP
3072:f+Y2MYJ6rHfgaToXdYKOemiN6Bct6MrW6aZ9uDGsdibw/IoQIZBHL9MnZh/bStyZ:fBoaToXq3XMIHIZBr9sZhX
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3488 msedge.exe 3488 msedge.exe 4176 msedge.exe 4176 msedge.exe 2808 identity_helper.exe 2808 identity_helper.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4176 wrote to memory of 2160 4176 msedge.exe 84 PID 4176 wrote to memory of 2160 4176 msedge.exe 84 PID 4176 wrote to memory of 1036 4176 msedge.exe 85 PID 4176 wrote to memory of 1036 4176 msedge.exe 85 PID 4176 wrote to memory of 1036 4176 msedge.exe 85 PID 4176 wrote to memory of 1036 4176 msedge.exe 85 PID 4176 wrote to memory of 1036 4176 msedge.exe 85 PID 4176 wrote to memory of 1036 4176 msedge.exe 85 PID 4176 wrote to memory of 1036 4176 msedge.exe 85 PID 4176 wrote to memory of 1036 4176 msedge.exe 85 PID 4176 wrote to memory of 1036 4176 msedge.exe 85 PID 4176 wrote to memory of 1036 4176 msedge.exe 85 PID 4176 wrote to memory of 1036 4176 msedge.exe 85 PID 4176 wrote to memory of 1036 4176 msedge.exe 85 PID 4176 wrote to memory of 1036 4176 msedge.exe 85 PID 4176 wrote to memory of 1036 4176 msedge.exe 85 PID 4176 wrote to memory of 1036 4176 msedge.exe 85 PID 4176 wrote to memory of 1036 4176 msedge.exe 85 PID 4176 wrote to memory of 1036 4176 msedge.exe 85 PID 4176 wrote to memory of 1036 4176 msedge.exe 85 PID 4176 wrote to memory of 1036 4176 msedge.exe 85 PID 4176 wrote to memory of 1036 4176 msedge.exe 85 PID 4176 wrote to memory of 1036 4176 msedge.exe 85 PID 4176 wrote to memory of 1036 4176 msedge.exe 85 PID 4176 wrote to memory of 1036 4176 msedge.exe 85 PID 4176 wrote to memory of 1036 4176 msedge.exe 85 PID 4176 wrote to memory of 1036 4176 msedge.exe 85 PID 4176 wrote to memory of 1036 4176 msedge.exe 85 PID 4176 wrote to memory of 1036 4176 msedge.exe 85 PID 4176 wrote to memory of 1036 4176 msedge.exe 85 PID 4176 wrote to memory of 1036 4176 msedge.exe 85 PID 4176 wrote to memory of 1036 4176 msedge.exe 85 PID 4176 wrote to memory of 1036 4176 msedge.exe 85 PID 4176 wrote to memory of 1036 4176 msedge.exe 85 PID 4176 wrote to memory of 1036 4176 msedge.exe 85 PID 4176 wrote to memory of 1036 4176 msedge.exe 85 PID 4176 wrote to memory of 1036 4176 msedge.exe 85 PID 4176 wrote to memory of 1036 4176 msedge.exe 85 PID 4176 wrote to memory of 1036 4176 msedge.exe 85 PID 4176 wrote to memory of 1036 4176 msedge.exe 85 PID 4176 wrote to memory of 1036 4176 msedge.exe 85 PID 4176 wrote to memory of 1036 4176 msedge.exe 85 PID 4176 wrote to memory of 3488 4176 msedge.exe 86 PID 4176 wrote to memory of 3488 4176 msedge.exe 86 PID 4176 wrote to memory of 3924 4176 msedge.exe 87 PID 4176 wrote to memory of 3924 4176 msedge.exe 87 PID 4176 wrote to memory of 3924 4176 msedge.exe 87 PID 4176 wrote to memory of 3924 4176 msedge.exe 87 PID 4176 wrote to memory of 3924 4176 msedge.exe 87 PID 4176 wrote to memory of 3924 4176 msedge.exe 87 PID 4176 wrote to memory of 3924 4176 msedge.exe 87 PID 4176 wrote to memory of 3924 4176 msedge.exe 87 PID 4176 wrote to memory of 3924 4176 msedge.exe 87 PID 4176 wrote to memory of 3924 4176 msedge.exe 87 PID 4176 wrote to memory of 3924 4176 msedge.exe 87 PID 4176 wrote to memory of 3924 4176 msedge.exe 87 PID 4176 wrote to memory of 3924 4176 msedge.exe 87 PID 4176 wrote to memory of 3924 4176 msedge.exe 87 PID 4176 wrote to memory of 3924 4176 msedge.exe 87 PID 4176 wrote to memory of 3924 4176 msedge.exe 87 PID 4176 wrote to memory of 3924 4176 msedge.exe 87 PID 4176 wrote to memory of 3924 4176 msedge.exe 87 PID 4176 wrote to memory of 3924 4176 msedge.exe 87 PID 4176 wrote to memory of 3924 4176 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\02134062a5879ade2114047228052ba1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe4e9246f8,0x7ffe4e924708,0x7ffe4e9247182⤵PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,14858926008854092783,3103494088371067971,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:22⤵PID:1036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,14858926008854092783,3103494088371067971,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2352 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,14858926008854092783,3103494088371067971,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,14858926008854092783,3103494088371067971,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,14858926008854092783,3103494088371067971,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,14858926008854092783,3103494088371067971,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,14858926008854092783,3103494088371067971,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 /prefetch:82⤵PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,14858926008854092783,3103494088371067971,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,14858926008854092783,3103494088371067971,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,14858926008854092783,3103494088371067971,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,14858926008854092783,3103494088371067971,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4540 /prefetch:12⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,14858926008854092783,3103494088371067971,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,14858926008854092783,3103494088371067971,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,14858926008854092783,3103494088371067971,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:2824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,14858926008854092783,3103494088371067971,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3360 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4276
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3192
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dbac49e66219979194c79f1cf1cb3dd1
SHA14ef87804a04d51ae1fac358f92382548b27f62f2
SHA256f24ed6c5bf4b734a9af4d64e14a80a160bea569f50849f70bf7b7277c4f48562
SHA512bb314d61f53cf7774f6dfb6b772c72f5daf386bc3d27d2bb7a14c65848ee86e6c48e9c5696693ded31846b69b9372a530175df48494e3d61a228e49d43401ad1
-
Filesize
152B
MD5a9e55f5864d6e2afd2fd84e25a3bc228
SHA1a5efcff9e3df6252c7fe8535d505235f82aab276
SHA2560f4df3120e4620555916be8e51c29be8d600d68ae5244efad6a0268aabc8c452
SHA51212f45fa73a6de6dfe17acc8b52b60f2d79008da130730b74cc138c1dcd73ccc99487165e3c8c90dc247359fde272f1ec6b3cf2c5fcb04e5093936144d0558b75
-
Filesize
7KB
MD57903b007fb8938b5411367e7ce429c44
SHA19491574e1694191d93eae31fae868c17e6f8a096
SHA256f3a2748b6277a61e4e7a4ef1f197a0535bd0f6f0f0a77eabeaecbd70a5afdf23
SHA5123d505fcac9c8f786bc104abc99ea2ebdc4f6022ac460e1777eae2460821fa353f59c81ce007bcb96f79e6529618e8f0f36ee4da11b1d2e2bc50994e287bcf5ef
-
Filesize
6KB
MD575cd18e2da4e2d9dc7a283ae8b58f64c
SHA199b0ae2dcc2ce735717459f2b13b338ab171a8cd
SHA2564c592a1cf9ca218d65dbd51fd918d4621c332b92be3e08e10c33ad0d9a0b84b2
SHA512458dd2fbfa3b7ca9083c6d168d43db3aff2e54e18c8c66868381fe57de2b0defdf733435ab845c9fa5a977ff16bba9caf269b950e62beca11309aa6929a952e0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5342d38baf6ab95271d6304457a77de37
SHA1b916832514f6f2d35e6a8e6f3b0309903de1dc95
SHA256d03155c191ed8d1cafc9abf9da963fab3cebe615f3e5df2e4f129c0ec3ca7cba
SHA5124d292b0c5d7c1ace45063c64a2886ab69df2eaaa05a7b91131a4c716e11b1b78a6e0c154d7863033e529a739c1af16b38b713fd42164b87a034327883642a837