Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27/04/2024, 06:10
Static task
static1
Behavioral task
behavioral1
Sample
0299e6ca782c3da347bb9c7476bcd408_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0299e6ca782c3da347bb9c7476bcd408_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
0299e6ca782c3da347bb9c7476bcd408_JaffaCakes118.html
-
Size
61KB
-
MD5
0299e6ca782c3da347bb9c7476bcd408
-
SHA1
c79eda10eedd09b0c6bfa557add2175dc2b2b696
-
SHA256
cd8d58c3c62ecfb861b524ecb08d0859e1b3f3f095cc6e16bc15999a35f1d7c4
-
SHA512
2dd4618911b63cca321fe6e9bde17bbbdcf7027d2aaa76ff6a917fe8779dc708b0d432403951a67910c0461d98b74360389c44af14ba53f4e3fb29b6ed9e9291
-
SSDEEP
1536:KfPYzRIJQL1iF+Eewip75ZFCQLsodFh3JJg8vqrctFA6:TRInQwipPFhoodFh5Jg8vqrctFf
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4364 msedge.exe 4364 msedge.exe 4424 msedge.exe 4424 msedge.exe 1968 identity_helper.exe 1968 identity_helper.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4424 wrote to memory of 2936 4424 msedge.exe 80 PID 4424 wrote to memory of 2936 4424 msedge.exe 80 PID 4424 wrote to memory of 4928 4424 msedge.exe 82 PID 4424 wrote to memory of 4928 4424 msedge.exe 82 PID 4424 wrote to memory of 4928 4424 msedge.exe 82 PID 4424 wrote to memory of 4928 4424 msedge.exe 82 PID 4424 wrote to memory of 4928 4424 msedge.exe 82 PID 4424 wrote to memory of 4928 4424 msedge.exe 82 PID 4424 wrote to memory of 4928 4424 msedge.exe 82 PID 4424 wrote to memory of 4928 4424 msedge.exe 82 PID 4424 wrote to memory of 4928 4424 msedge.exe 82 PID 4424 wrote to memory of 4928 4424 msedge.exe 82 PID 4424 wrote to memory of 4928 4424 msedge.exe 82 PID 4424 wrote to memory of 4928 4424 msedge.exe 82 PID 4424 wrote to memory of 4928 4424 msedge.exe 82 PID 4424 wrote to memory of 4928 4424 msedge.exe 82 PID 4424 wrote to memory of 4928 4424 msedge.exe 82 PID 4424 wrote to memory of 4928 4424 msedge.exe 82 PID 4424 wrote to memory of 4928 4424 msedge.exe 82 PID 4424 wrote to memory of 4928 4424 msedge.exe 82 PID 4424 wrote to memory of 4928 4424 msedge.exe 82 PID 4424 wrote to memory of 4928 4424 msedge.exe 82 PID 4424 wrote to memory of 4928 4424 msedge.exe 82 PID 4424 wrote to memory of 4928 4424 msedge.exe 82 PID 4424 wrote to memory of 4928 4424 msedge.exe 82 PID 4424 wrote to memory of 4928 4424 msedge.exe 82 PID 4424 wrote to memory of 4928 4424 msedge.exe 82 PID 4424 wrote to memory of 4928 4424 msedge.exe 82 PID 4424 wrote to memory of 4928 4424 msedge.exe 82 PID 4424 wrote to memory of 4928 4424 msedge.exe 82 PID 4424 wrote to memory of 4928 4424 msedge.exe 82 PID 4424 wrote to memory of 4928 4424 msedge.exe 82 PID 4424 wrote to memory of 4928 4424 msedge.exe 82 PID 4424 wrote to memory of 4928 4424 msedge.exe 82 PID 4424 wrote to memory of 4928 4424 msedge.exe 82 PID 4424 wrote to memory of 4928 4424 msedge.exe 82 PID 4424 wrote to memory of 4928 4424 msedge.exe 82 PID 4424 wrote to memory of 4928 4424 msedge.exe 82 PID 4424 wrote to memory of 4928 4424 msedge.exe 82 PID 4424 wrote to memory of 4928 4424 msedge.exe 82 PID 4424 wrote to memory of 4928 4424 msedge.exe 82 PID 4424 wrote to memory of 4928 4424 msedge.exe 82 PID 4424 wrote to memory of 4364 4424 msedge.exe 83 PID 4424 wrote to memory of 4364 4424 msedge.exe 83 PID 4424 wrote to memory of 3128 4424 msedge.exe 84 PID 4424 wrote to memory of 3128 4424 msedge.exe 84 PID 4424 wrote to memory of 3128 4424 msedge.exe 84 PID 4424 wrote to memory of 3128 4424 msedge.exe 84 PID 4424 wrote to memory of 3128 4424 msedge.exe 84 PID 4424 wrote to memory of 3128 4424 msedge.exe 84 PID 4424 wrote to memory of 3128 4424 msedge.exe 84 PID 4424 wrote to memory of 3128 4424 msedge.exe 84 PID 4424 wrote to memory of 3128 4424 msedge.exe 84 PID 4424 wrote to memory of 3128 4424 msedge.exe 84 PID 4424 wrote to memory of 3128 4424 msedge.exe 84 PID 4424 wrote to memory of 3128 4424 msedge.exe 84 PID 4424 wrote to memory of 3128 4424 msedge.exe 84 PID 4424 wrote to memory of 3128 4424 msedge.exe 84 PID 4424 wrote to memory of 3128 4424 msedge.exe 84 PID 4424 wrote to memory of 3128 4424 msedge.exe 84 PID 4424 wrote to memory of 3128 4424 msedge.exe 84 PID 4424 wrote to memory of 3128 4424 msedge.exe 84 PID 4424 wrote to memory of 3128 4424 msedge.exe 84 PID 4424 wrote to memory of 3128 4424 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0299e6ca782c3da347bb9c7476bcd408_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffce95446f8,0x7ffce9544708,0x7ffce95447182⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,1432170399837242330,1264507166718321295,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:22⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2216,1432170399837242330,1264507166718321295,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2216,1432170399837242330,1264507166718321295,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,1432170399837242330,1264507166718321295,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,1432170399837242330,1264507166718321295,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:2744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,1432170399837242330,1264507166718321295,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 /prefetch:82⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,1432170399837242330,1264507166718321295,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,1432170399837242330,1264507166718321295,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,1432170399837242330,1264507166718321295,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,1432170399837242330,1264507166718321295,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,1432170399837242330,1264507166718321295,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,1432170399837242330,1264507166718321295,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2304 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1324
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4996
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
1019B
MD5738d0c0bd2be2e6399730fbe71282524
SHA1836311819da263a4f82523c25e80f3c4c893f49b
SHA256ac87457dc251af16dec8552854386a02b4876e0a2fb5b3bf79b0b37951295f6d
SHA512daea91ae6c6a03114c3af37d249da30e238ca966cf4aaab2426be956e66116fc294845009617c412cad8cd51819f7d436718337eb26d9ec1db22a3964a839d2e
-
Filesize
6KB
MD592bc41fe2e6dbafc55806604ba8ac1a7
SHA144a3e9fbe6e10c148716a7b83326ec743f638072
SHA256fd95055c6eeecc0542c786af86d1730f9a022bb80362ff2a877e92931dd2352c
SHA51264f5e1dbfccf96f4b8232491aafe6bf31df15bd70ac0ddf3ef15905c4fb1667c735d205a0cd152f2037e1df1855c6de43d54dc18a79afd30c9304597d97c6aea
-
Filesize
6KB
MD593c7da9a4f6f6c667b18af99d880113f
SHA1d1eb7465ea134cb314cf101deb2806d7d66eedbe
SHA256685853a4e3a71e59a0a89efbeaaa4c0d3627e35066b39a0145f99fb5b3e6abe5
SHA51253f5c8fecbb86f4dfe579af7b8f1dbbc7ad6ef4c812288b66edac11f537c3c2c4e41a7f190bb2d30dd2a1004c7ef55700a4fe4ba9b9c31c951bd91bea2d0486b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5fca40c5154179b5fda864c04d0410e89
SHA1765120b992dea4d8e205089be2c759c10a8ed617
SHA2567bcb8a04f9ed3183052db5a703c5b824839f5701f2a014443a3243ecee89b563
SHA5124fb3062cabb79f9845375ccce220c837824d7ddf7d9a4c4637031da1ba50665bd06290ac139b1a4b9ae455d11d9767f52c0e623694ea6595869d7518a10404eb