Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
28-04-2024 02:30
Static task
static1
Behavioral task
behavioral1
Sample
042da62c628f7fcc37c38b14156d08ef_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
042da62c628f7fcc37c38b14156d08ef_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
042da62c628f7fcc37c38b14156d08ef_JaffaCakes118.html
-
Size
31KB
-
MD5
042da62c628f7fcc37c38b14156d08ef
-
SHA1
41532d98fb615f8adcc7ed98a9d597374a7c4aaf
-
SHA256
7d187e36ba09d1f3d62d1294c96a8ed7ece73ba3ef257f83b16c31743984ef26
-
SHA512
22dfc6c4329263fca25b8225254f2db57ef431fa624d971e68cfbdd8a5d9cdf50d004d4e1f1371aa71e61faf76a8a6a496d6f310a6e31ec182f5bd02c26b6ce0
-
SSDEEP
192:uwePVK9kfOm8Bb5nV3PVDrEeuoY3qqv7nQjxn5Q/3FnQierkNnjhWnQOkEnth5wv:2oQ/FkxfkasjSf0PQE3L
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1644 msedge.exe 1644 msedge.exe 224 msedge.exe 224 msedge.exe 3000 identity_helper.exe 3000 identity_helper.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 224 wrote to memory of 1052 224 msedge.exe 85 PID 224 wrote to memory of 1052 224 msedge.exe 85 PID 224 wrote to memory of 1224 224 msedge.exe 86 PID 224 wrote to memory of 1224 224 msedge.exe 86 PID 224 wrote to memory of 1224 224 msedge.exe 86 PID 224 wrote to memory of 1224 224 msedge.exe 86 PID 224 wrote to memory of 1224 224 msedge.exe 86 PID 224 wrote to memory of 1224 224 msedge.exe 86 PID 224 wrote to memory of 1224 224 msedge.exe 86 PID 224 wrote to memory of 1224 224 msedge.exe 86 PID 224 wrote to memory of 1224 224 msedge.exe 86 PID 224 wrote to memory of 1224 224 msedge.exe 86 PID 224 wrote to memory of 1224 224 msedge.exe 86 PID 224 wrote to memory of 1224 224 msedge.exe 86 PID 224 wrote to memory of 1224 224 msedge.exe 86 PID 224 wrote to memory of 1224 224 msedge.exe 86 PID 224 wrote to memory of 1224 224 msedge.exe 86 PID 224 wrote to memory of 1224 224 msedge.exe 86 PID 224 wrote to memory of 1224 224 msedge.exe 86 PID 224 wrote to memory of 1224 224 msedge.exe 86 PID 224 wrote to memory of 1224 224 msedge.exe 86 PID 224 wrote to memory of 1224 224 msedge.exe 86 PID 224 wrote to memory of 1224 224 msedge.exe 86 PID 224 wrote to memory of 1224 224 msedge.exe 86 PID 224 wrote to memory of 1224 224 msedge.exe 86 PID 224 wrote to memory of 1224 224 msedge.exe 86 PID 224 wrote to memory of 1224 224 msedge.exe 86 PID 224 wrote to memory of 1224 224 msedge.exe 86 PID 224 wrote to memory of 1224 224 msedge.exe 86 PID 224 wrote to memory of 1224 224 msedge.exe 86 PID 224 wrote to memory of 1224 224 msedge.exe 86 PID 224 wrote to memory of 1224 224 msedge.exe 86 PID 224 wrote to memory of 1224 224 msedge.exe 86 PID 224 wrote to memory of 1224 224 msedge.exe 86 PID 224 wrote to memory of 1224 224 msedge.exe 86 PID 224 wrote to memory of 1224 224 msedge.exe 86 PID 224 wrote to memory of 1224 224 msedge.exe 86 PID 224 wrote to memory of 1224 224 msedge.exe 86 PID 224 wrote to memory of 1224 224 msedge.exe 86 PID 224 wrote to memory of 1224 224 msedge.exe 86 PID 224 wrote to memory of 1224 224 msedge.exe 86 PID 224 wrote to memory of 1224 224 msedge.exe 86 PID 224 wrote to memory of 1644 224 msedge.exe 87 PID 224 wrote to memory of 1644 224 msedge.exe 87 PID 224 wrote to memory of 1232 224 msedge.exe 88 PID 224 wrote to memory of 1232 224 msedge.exe 88 PID 224 wrote to memory of 1232 224 msedge.exe 88 PID 224 wrote to memory of 1232 224 msedge.exe 88 PID 224 wrote to memory of 1232 224 msedge.exe 88 PID 224 wrote to memory of 1232 224 msedge.exe 88 PID 224 wrote to memory of 1232 224 msedge.exe 88 PID 224 wrote to memory of 1232 224 msedge.exe 88 PID 224 wrote to memory of 1232 224 msedge.exe 88 PID 224 wrote to memory of 1232 224 msedge.exe 88 PID 224 wrote to memory of 1232 224 msedge.exe 88 PID 224 wrote to memory of 1232 224 msedge.exe 88 PID 224 wrote to memory of 1232 224 msedge.exe 88 PID 224 wrote to memory of 1232 224 msedge.exe 88 PID 224 wrote to memory of 1232 224 msedge.exe 88 PID 224 wrote to memory of 1232 224 msedge.exe 88 PID 224 wrote to memory of 1232 224 msedge.exe 88 PID 224 wrote to memory of 1232 224 msedge.exe 88 PID 224 wrote to memory of 1232 224 msedge.exe 88 PID 224 wrote to memory of 1232 224 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\042da62c628f7fcc37c38b14156d08ef_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff99d2246f8,0x7ff99d224708,0x7ff99d2247182⤵PID:1052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,14050472767899668311,11285739217537012899,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:1224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,14050472767899668311,11285739217537012899,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,14050472767899668311,11285739217537012899,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:82⤵PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14050472767899668311,11285739217537012899,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14050472767899668311,11285739217537012899,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,14050472767899668311,11285739217537012899,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4460 /prefetch:82⤵PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,14050472767899668311,11285739217537012899,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4460 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14050472767899668311,11285739217537012899,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14050472767899668311,11285739217537012899,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14050472767899668311,11285739217537012899,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4276 /prefetch:12⤵PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14050472767899668311,11285739217537012899,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4284 /prefetch:12⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,14050472767899668311,11285739217537012899,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4768 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2164
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3200
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52a70f1bd4da893a67660d6432970788d
SHA1ddf4047e0d468f56ea0c0d8ff078a86a0bb62873
SHA256c550af5ba51f68ac4d18747edc5dea1a655dd212d84bad1e6168ba7a97745561
SHA51226b9a365e77df032fc5c461d85d1ba313eafead38827190608c6537ec12b2dfdbed4e1705bfd1e61899034791ad6fa88ea7490c3a48cdaec4d04cd0577b11343
-
Filesize
152B
MD5fbe1ce4d182aaffb80de94263be1dd35
SHA1bc6c9827aa35a136a7d79be9e606ff359e2ac3ea
SHA2560021f72dbca789f179762b0e17c28fe0b93a12539b08294800e47469905aeb51
SHA5123fb0a3b38e7d4a30f5560594b1d14e6e58419e274255fb68dfe0ca897aa181f9ce8cb2048403f851fd36a17b0e34d272d03927769d41a500b2fe64806354902f
-
Filesize
6KB
MD55d9b447d07637f5cb69d530aa7853d5a
SHA1d4b642f4da1c0ff87bd09e337aa331f5084d3111
SHA256e1057a6701d7651e02113c9edd61612f9c8bdef335dc0b8e3b15615e8cad7a42
SHA5124f23754f605a060f6048124fca8f7f4d08ad3a47285750335c33184f43fd6b73ca352dabc3ee76e60df9db824636263a99e007d63df865fb75d820d4c33789bb
-
Filesize
6KB
MD50344e6a54e7f479a744672ed515bfc06
SHA163a9097535d5f9643324344610b25c49a0ca501d
SHA256f23a9040fbee9f3f54d210064d0677398511f1445a84d0449f9e741f118646ba
SHA5123ead05e10ab6006f0d8f944eba05430e71ff589e648999a7f2572c19d8d654a405c1a13c46b935e1a0c0f6e2762799b9d39a939fe76fc818eb3d4198fef60f47
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD52620fb3b221d55dfa156650330929859
SHA111e8168ce735a18724edc071b0539185abb7d4f3
SHA2561e5d111dc33ddc6e00c7ff6dc093b365b41f6ad9fbd807371348794285af747e
SHA512737ddbd115615a5f9392ede8e0fb163e7547a212273946942abb6601dafbd1df7ca064a4aeb5e7633d00a544a08e97f9764e517a9d894f0fb143325f47b6e238