Analysis
-
max time kernel
100s -
max time network
53s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
27/04/2024, 05:10
Static task
static1
Behavioral task
behavioral1
Sample
027ee74133f32f17eb15af61c542a476_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
027ee74133f32f17eb15af61c542a476_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
027ee74133f32f17eb15af61c542a476_JaffaCakes118.html
-
Size
25KB
-
MD5
027ee74133f32f17eb15af61c542a476
-
SHA1
8aa436e2038d9fbcf1246644b6f24e2ff26c4bf8
-
SHA256
0601709c032e42257aee0a03a204e6790efba43b16d02872f55361ac88b0b670
-
SHA512
c76ac1f614d373fe284b805b67b0a7a5d5a2dbb054d11f37f884fd2526c865c9876bd2df1eb02beb6392c9a6cccac4fb4c6b359de30bdd0c361ae2e02b1ca2ea
-
SSDEEP
384:BkKaOKue9Yqs45P7wqdBM8CzOudGampP9oBO16GyudGV7vJQi0QA:Bk/OKZZs45P7xdCpMCEPsV7mQA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 720 msedge.exe 720 msedge.exe 4028 msedge.exe 4028 msedge.exe 4756 identity_helper.exe 4756 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4028 wrote to memory of 1056 4028 msedge.exe 83 PID 4028 wrote to memory of 1056 4028 msedge.exe 83 PID 4028 wrote to memory of 4684 4028 msedge.exe 84 PID 4028 wrote to memory of 4684 4028 msedge.exe 84 PID 4028 wrote to memory of 4684 4028 msedge.exe 84 PID 4028 wrote to memory of 4684 4028 msedge.exe 84 PID 4028 wrote to memory of 4684 4028 msedge.exe 84 PID 4028 wrote to memory of 4684 4028 msedge.exe 84 PID 4028 wrote to memory of 4684 4028 msedge.exe 84 PID 4028 wrote to memory of 4684 4028 msedge.exe 84 PID 4028 wrote to memory of 4684 4028 msedge.exe 84 PID 4028 wrote to memory of 4684 4028 msedge.exe 84 PID 4028 wrote to memory of 4684 4028 msedge.exe 84 PID 4028 wrote to memory of 4684 4028 msedge.exe 84 PID 4028 wrote to memory of 4684 4028 msedge.exe 84 PID 4028 wrote to memory of 4684 4028 msedge.exe 84 PID 4028 wrote to memory of 4684 4028 msedge.exe 84 PID 4028 wrote to memory of 4684 4028 msedge.exe 84 PID 4028 wrote to memory of 4684 4028 msedge.exe 84 PID 4028 wrote to memory of 4684 4028 msedge.exe 84 PID 4028 wrote to memory of 4684 4028 msedge.exe 84 PID 4028 wrote to memory of 4684 4028 msedge.exe 84 PID 4028 wrote to memory of 4684 4028 msedge.exe 84 PID 4028 wrote to memory of 4684 4028 msedge.exe 84 PID 4028 wrote to memory of 4684 4028 msedge.exe 84 PID 4028 wrote to memory of 4684 4028 msedge.exe 84 PID 4028 wrote to memory of 4684 4028 msedge.exe 84 PID 4028 wrote to memory of 4684 4028 msedge.exe 84 PID 4028 wrote to memory of 4684 4028 msedge.exe 84 PID 4028 wrote to memory of 4684 4028 msedge.exe 84 PID 4028 wrote to memory of 4684 4028 msedge.exe 84 PID 4028 wrote to memory of 4684 4028 msedge.exe 84 PID 4028 wrote to memory of 4684 4028 msedge.exe 84 PID 4028 wrote to memory of 4684 4028 msedge.exe 84 PID 4028 wrote to memory of 4684 4028 msedge.exe 84 PID 4028 wrote to memory of 4684 4028 msedge.exe 84 PID 4028 wrote to memory of 4684 4028 msedge.exe 84 PID 4028 wrote to memory of 4684 4028 msedge.exe 84 PID 4028 wrote to memory of 4684 4028 msedge.exe 84 PID 4028 wrote to memory of 4684 4028 msedge.exe 84 PID 4028 wrote to memory of 4684 4028 msedge.exe 84 PID 4028 wrote to memory of 4684 4028 msedge.exe 84 PID 4028 wrote to memory of 720 4028 msedge.exe 85 PID 4028 wrote to memory of 720 4028 msedge.exe 85 PID 4028 wrote to memory of 1920 4028 msedge.exe 86 PID 4028 wrote to memory of 1920 4028 msedge.exe 86 PID 4028 wrote to memory of 1920 4028 msedge.exe 86 PID 4028 wrote to memory of 1920 4028 msedge.exe 86 PID 4028 wrote to memory of 1920 4028 msedge.exe 86 PID 4028 wrote to memory of 1920 4028 msedge.exe 86 PID 4028 wrote to memory of 1920 4028 msedge.exe 86 PID 4028 wrote to memory of 1920 4028 msedge.exe 86 PID 4028 wrote to memory of 1920 4028 msedge.exe 86 PID 4028 wrote to memory of 1920 4028 msedge.exe 86 PID 4028 wrote to memory of 1920 4028 msedge.exe 86 PID 4028 wrote to memory of 1920 4028 msedge.exe 86 PID 4028 wrote to memory of 1920 4028 msedge.exe 86 PID 4028 wrote to memory of 1920 4028 msedge.exe 86 PID 4028 wrote to memory of 1920 4028 msedge.exe 86 PID 4028 wrote to memory of 1920 4028 msedge.exe 86 PID 4028 wrote to memory of 1920 4028 msedge.exe 86 PID 4028 wrote to memory of 1920 4028 msedge.exe 86 PID 4028 wrote to memory of 1920 4028 msedge.exe 86 PID 4028 wrote to memory of 1920 4028 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\027ee74133f32f17eb15af61c542a476_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbc2a746f8,0x7ffbc2a74708,0x7ffbc2a747182⤵PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,15312742245296073436,1158894667327838667,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,15312742245296073436,1158894667327838667,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,15312742245296073436,1158894667327838667,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15312742245296073436,1158894667327838667,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15312742245296073436,1158894667327838667,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,15312742245296073436,1158894667327838667,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4936 /prefetch:82⤵PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,15312742245296073436,1158894667327838667,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4936 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15312742245296073436,1158894667327838667,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4528 /prefetch:12⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15312742245296073436,1158894667327838667,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4516 /prefetch:12⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15312742245296073436,1158894667327838667,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4608 /prefetch:12⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15312742245296073436,1158894667327838667,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15312742245296073436,1158894667327838667,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3632 /prefetch:12⤵PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15312742245296073436,1158894667327838667,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4352 /prefetch:12⤵PID:444
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1424
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dbac49e66219979194c79f1cf1cb3dd1
SHA14ef87804a04d51ae1fac358f92382548b27f62f2
SHA256f24ed6c5bf4b734a9af4d64e14a80a160bea569f50849f70bf7b7277c4f48562
SHA512bb314d61f53cf7774f6dfb6b772c72f5daf386bc3d27d2bb7a14c65848ee86e6c48e9c5696693ded31846b69b9372a530175df48494e3d61a228e49d43401ad1
-
Filesize
152B
MD5a9e55f5864d6e2afd2fd84e25a3bc228
SHA1a5efcff9e3df6252c7fe8535d505235f82aab276
SHA2560f4df3120e4620555916be8e51c29be8d600d68ae5244efad6a0268aabc8c452
SHA51212f45fa73a6de6dfe17acc8b52b60f2d79008da130730b74cc138c1dcd73ccc99487165e3c8c90dc247359fde272f1ec6b3cf2c5fcb04e5093936144d0558b75
-
Filesize
264KB
MD56ce90c9381e06e40c208b02d6acedeca
SHA1d169f778a60cc3e1521ce3683a79da279a8d2536
SHA256028f77d7bf6fcc4a49e5060605fb5d7a62d419aca6176beadd4a1096388cab76
SHA512a03cb57c93b9a27a7152dc314a79c5df5a6ce2ab801e37409004bff2bb991539519e7ad9bc0d04e206a65a499d27d428d5d58a2f857475c6a18704e2df6402c6
-
Filesize
6KB
MD5b1e4a0cab5dc2536079bef68bbb324da
SHA11cf203e3d0bc0c0e5f707b78356a15a97c37b95b
SHA25659f9065e13e0515e48d7d80e8ce89cec9f5dd0377744e3c3bef210240deb1fd3
SHA51276294de4ab66df6ccef0faf897ffd092ee4e061e998c6b61ac071157ced8856a82549dbf09e9b5f5e14f19678eb61fd4d1fd260681935fbcf4d1943c2de3e02b
-
Filesize
6KB
MD5594438bb12ba78dcc83112cddefabaa6
SHA1c92d90799e8c5d208c81b989802a2c7d0f095423
SHA256c43f2d59df3a726579f0d70acdd28f206407194d9be01bae8ca0b70fb0a64279
SHA512d4ba2cf66d3be15bc74808fb76124f6a8a0080e332e49dc177f402594e4a84b5de3c0107d441fee6ce286f1f1842c16d043875297308db8a32f00d2337bdc2df
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
9KB
MD58a067973f5f2d7e7e90142f44a23b4c6
SHA1843b19f5842b1862f0b8954ccabecc23db796659
SHA2561b6284e4b455033f55dc60cb4b80310afb5fb1b6550bac2e5d731e4a12ea726b
SHA51288de04e2e8520afc8dfae5164fc82c96e8da05c5ed695f78eb93574cb49469db2aeba36bca03584a612f7bb065198552ae9857cc263712960c637968ffb801bd
-
Filesize
8KB
MD56989b1b45b495f43730d4314e6911e90
SHA17ff30933aef39c6a385a1c368f5835f368e241bf
SHA256e2b5b75b1025fadc005170a9d751b93ee56943c837be70230786fef43c463363
SHA512406e054056e43b3bdef33d62e253cbf81e3af4e8f10030e144458108d2c044d42755818610f48a9f83d55c2aad32bbaaf667e0a442977ae68315411214dc1eb7