Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
28/04/2024, 02:08
Static task
static1
Behavioral task
behavioral1
Sample
04243115fb91c10b5d302c7a83d08ae0_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
04243115fb91c10b5d302c7a83d08ae0_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
04243115fb91c10b5d302c7a83d08ae0_JaffaCakes118.html
-
Size
118KB
-
MD5
04243115fb91c10b5d302c7a83d08ae0
-
SHA1
3338bb68ef52f904a359cf83a5549b7249e8ed55
-
SHA256
5b59eff5353860288f49e3e77709a1ba31c7a481f3159296f69233cd73ea793a
-
SHA512
e53b88bbb0a6b5eec113d4dc0fe88eecae1b9e35cd628602dcd9a30ade5bdd6079ca1ae6471885035af0f23d43fea5df8e866e9374ddf139b556cb5c26f168b7
-
SSDEEP
1536:SR/yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCsn:SR/yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3628 msedge.exe 3628 msedge.exe 4776 msedge.exe 4776 msedge.exe 4260 identity_helper.exe 4260 identity_helper.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4776 wrote to memory of 3660 4776 msedge.exe 84 PID 4776 wrote to memory of 3660 4776 msedge.exe 84 PID 4776 wrote to memory of 3652 4776 msedge.exe 85 PID 4776 wrote to memory of 3652 4776 msedge.exe 85 PID 4776 wrote to memory of 3652 4776 msedge.exe 85 PID 4776 wrote to memory of 3652 4776 msedge.exe 85 PID 4776 wrote to memory of 3652 4776 msedge.exe 85 PID 4776 wrote to memory of 3652 4776 msedge.exe 85 PID 4776 wrote to memory of 3652 4776 msedge.exe 85 PID 4776 wrote to memory of 3652 4776 msedge.exe 85 PID 4776 wrote to memory of 3652 4776 msedge.exe 85 PID 4776 wrote to memory of 3652 4776 msedge.exe 85 PID 4776 wrote to memory of 3652 4776 msedge.exe 85 PID 4776 wrote to memory of 3652 4776 msedge.exe 85 PID 4776 wrote to memory of 3652 4776 msedge.exe 85 PID 4776 wrote to memory of 3652 4776 msedge.exe 85 PID 4776 wrote to memory of 3652 4776 msedge.exe 85 PID 4776 wrote to memory of 3652 4776 msedge.exe 85 PID 4776 wrote to memory of 3652 4776 msedge.exe 85 PID 4776 wrote to memory of 3652 4776 msedge.exe 85 PID 4776 wrote to memory of 3652 4776 msedge.exe 85 PID 4776 wrote to memory of 3652 4776 msedge.exe 85 PID 4776 wrote to memory of 3652 4776 msedge.exe 85 PID 4776 wrote to memory of 3652 4776 msedge.exe 85 PID 4776 wrote to memory of 3652 4776 msedge.exe 85 PID 4776 wrote to memory of 3652 4776 msedge.exe 85 PID 4776 wrote to memory of 3652 4776 msedge.exe 85 PID 4776 wrote to memory of 3652 4776 msedge.exe 85 PID 4776 wrote to memory of 3652 4776 msedge.exe 85 PID 4776 wrote to memory of 3652 4776 msedge.exe 85 PID 4776 wrote to memory of 3652 4776 msedge.exe 85 PID 4776 wrote to memory of 3652 4776 msedge.exe 85 PID 4776 wrote to memory of 3652 4776 msedge.exe 85 PID 4776 wrote to memory of 3652 4776 msedge.exe 85 PID 4776 wrote to memory of 3652 4776 msedge.exe 85 PID 4776 wrote to memory of 3652 4776 msedge.exe 85 PID 4776 wrote to memory of 3652 4776 msedge.exe 85 PID 4776 wrote to memory of 3652 4776 msedge.exe 85 PID 4776 wrote to memory of 3652 4776 msedge.exe 85 PID 4776 wrote to memory of 3652 4776 msedge.exe 85 PID 4776 wrote to memory of 3652 4776 msedge.exe 85 PID 4776 wrote to memory of 3652 4776 msedge.exe 85 PID 4776 wrote to memory of 3628 4776 msedge.exe 86 PID 4776 wrote to memory of 3628 4776 msedge.exe 86 PID 4776 wrote to memory of 2836 4776 msedge.exe 87 PID 4776 wrote to memory of 2836 4776 msedge.exe 87 PID 4776 wrote to memory of 2836 4776 msedge.exe 87 PID 4776 wrote to memory of 2836 4776 msedge.exe 87 PID 4776 wrote to memory of 2836 4776 msedge.exe 87 PID 4776 wrote to memory of 2836 4776 msedge.exe 87 PID 4776 wrote to memory of 2836 4776 msedge.exe 87 PID 4776 wrote to memory of 2836 4776 msedge.exe 87 PID 4776 wrote to memory of 2836 4776 msedge.exe 87 PID 4776 wrote to memory of 2836 4776 msedge.exe 87 PID 4776 wrote to memory of 2836 4776 msedge.exe 87 PID 4776 wrote to memory of 2836 4776 msedge.exe 87 PID 4776 wrote to memory of 2836 4776 msedge.exe 87 PID 4776 wrote to memory of 2836 4776 msedge.exe 87 PID 4776 wrote to memory of 2836 4776 msedge.exe 87 PID 4776 wrote to memory of 2836 4776 msedge.exe 87 PID 4776 wrote to memory of 2836 4776 msedge.exe 87 PID 4776 wrote to memory of 2836 4776 msedge.exe 87 PID 4776 wrote to memory of 2836 4776 msedge.exe 87 PID 4776 wrote to memory of 2836 4776 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\04243115fb91c10b5d302c7a83d08ae0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffbfd346f8,0x7fffbfd34708,0x7fffbfd347182⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,7439554608883942178,14112774836761202874,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,7439554608883942178,14112774836761202874,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,7439554608883942178,14112774836761202874,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:82⤵PID:2836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7439554608883942178,14112774836761202874,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7439554608883942178,14112774836761202874,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,7439554608883942178,14112774836761202874,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4512 /prefetch:82⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,7439554608883942178,14112774836761202874,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4512 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7439554608883942178,14112774836761202874,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4508 /prefetch:12⤵PID:2580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7439554608883942178,14112774836761202874,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4556 /prefetch:12⤵PID:2648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7439554608883942178,14112774836761202874,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3868 /prefetch:12⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7439554608883942178,14112774836761202874,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,7439554608883942178,14112774836761202874,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4384 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4968
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3912
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
Filesize
6KB
MD519910df0c9d206a9769b8afd3b5d0bbd
SHA176c898c8e819ef0ce10d7f7a68bee1e595584a1d
SHA256facea8ce05d3a6c9cf1a74bf2e30e046f9e32b918c40b3d7a3e90c1335f2e03d
SHA51280a3280d53ddc83d932f5496a63b6925e45f4e5aca0c57d1063f1241e3c2446192923a035898c73e39efdeb35d70271084ff4a154bbe006dec53823243cdb869
-
Filesize
6KB
MD590d147313a49c9a9e5d71de8605d6c3d
SHA102004dfd510bcf5767f8a4bd57e5dc58ecf91474
SHA2560445d1228aa84aa7c864a9fc8168c72434a7297b90672dcac21176b9b04c8fcf
SHA512e4b80ca503297b61c1f0f5be730812fdc9c45a6487d8aaa6b2ae9fe29f803f0a0a74c390875bf572e106294cce5ebc780e9ce2abbb4f55caa0d2cbdda4f42898
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD544282a4ccdfaca19b56b5f5980a7313d
SHA1e638212b8390a9e4abc1b7dab58486b2350f109e
SHA25641fcae82c46bc86ea8bca2034f01a1934c5e8baa936ad345660d4cbfc055629c
SHA512db1383a6dc6b3682186bfb4e655248cc4e9bf7073aa61a3baaa4c6007453f8e1d1c8acb8241c928e76fb0ae33a37e2fcabcca0ad82f66c37f2f6f3bb8e3be5fb