Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
28/04/2024, 07:58
Static task
static1
Behavioral task
behavioral1
Sample
04b9a602dcf291b263e7e31864dcfddc_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
04b9a602dcf291b263e7e31864dcfddc_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
04b9a602dcf291b263e7e31864dcfddc_JaffaCakes118.html
-
Size
175KB
-
MD5
04b9a602dcf291b263e7e31864dcfddc
-
SHA1
c20e6b58f3fb67f779dd59c269eb8c0fc9464ff9
-
SHA256
a67a0a1178bd4ff6935289106f3ba0fe89b8da611d6ae0a6cfd29cd5266bccf1
-
SHA512
a7fa0045f274be22c26473a9679faa351192ec4cf7694419b85b8df98f0a1791565c5715ea6cefb957a320a8276fd88699604e8fae9d8313ce39176338060131
-
SSDEEP
1536:Sqt58gd8Wu8pI8Cd8hd8dQgbH//WoS3vGNkFpeYfBCJiZK+aeTH+WK/Lf1/hpnV+:SHCT3v/F1BCJiJB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 60 msedge.exe 60 msedge.exe 592 msedge.exe 592 msedge.exe 4732 identity_helper.exe 4732 identity_helper.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 592 wrote to memory of 3756 592 msedge.exe 83 PID 592 wrote to memory of 3756 592 msedge.exe 83 PID 592 wrote to memory of 1240 592 msedge.exe 84 PID 592 wrote to memory of 1240 592 msedge.exe 84 PID 592 wrote to memory of 1240 592 msedge.exe 84 PID 592 wrote to memory of 1240 592 msedge.exe 84 PID 592 wrote to memory of 1240 592 msedge.exe 84 PID 592 wrote to memory of 1240 592 msedge.exe 84 PID 592 wrote to memory of 1240 592 msedge.exe 84 PID 592 wrote to memory of 1240 592 msedge.exe 84 PID 592 wrote to memory of 1240 592 msedge.exe 84 PID 592 wrote to memory of 1240 592 msedge.exe 84 PID 592 wrote to memory of 1240 592 msedge.exe 84 PID 592 wrote to memory of 1240 592 msedge.exe 84 PID 592 wrote to memory of 1240 592 msedge.exe 84 PID 592 wrote to memory of 1240 592 msedge.exe 84 PID 592 wrote to memory of 1240 592 msedge.exe 84 PID 592 wrote to memory of 1240 592 msedge.exe 84 PID 592 wrote to memory of 1240 592 msedge.exe 84 PID 592 wrote to memory of 1240 592 msedge.exe 84 PID 592 wrote to memory of 1240 592 msedge.exe 84 PID 592 wrote to memory of 1240 592 msedge.exe 84 PID 592 wrote to memory of 1240 592 msedge.exe 84 PID 592 wrote to memory of 1240 592 msedge.exe 84 PID 592 wrote to memory of 1240 592 msedge.exe 84 PID 592 wrote to memory of 1240 592 msedge.exe 84 PID 592 wrote to memory of 1240 592 msedge.exe 84 PID 592 wrote to memory of 1240 592 msedge.exe 84 PID 592 wrote to memory of 1240 592 msedge.exe 84 PID 592 wrote to memory of 1240 592 msedge.exe 84 PID 592 wrote to memory of 1240 592 msedge.exe 84 PID 592 wrote to memory of 1240 592 msedge.exe 84 PID 592 wrote to memory of 1240 592 msedge.exe 84 PID 592 wrote to memory of 1240 592 msedge.exe 84 PID 592 wrote to memory of 1240 592 msedge.exe 84 PID 592 wrote to memory of 1240 592 msedge.exe 84 PID 592 wrote to memory of 1240 592 msedge.exe 84 PID 592 wrote to memory of 1240 592 msedge.exe 84 PID 592 wrote to memory of 1240 592 msedge.exe 84 PID 592 wrote to memory of 1240 592 msedge.exe 84 PID 592 wrote to memory of 1240 592 msedge.exe 84 PID 592 wrote to memory of 1240 592 msedge.exe 84 PID 592 wrote to memory of 60 592 msedge.exe 85 PID 592 wrote to memory of 60 592 msedge.exe 85 PID 592 wrote to memory of 548 592 msedge.exe 86 PID 592 wrote to memory of 548 592 msedge.exe 86 PID 592 wrote to memory of 548 592 msedge.exe 86 PID 592 wrote to memory of 548 592 msedge.exe 86 PID 592 wrote to memory of 548 592 msedge.exe 86 PID 592 wrote to memory of 548 592 msedge.exe 86 PID 592 wrote to memory of 548 592 msedge.exe 86 PID 592 wrote to memory of 548 592 msedge.exe 86 PID 592 wrote to memory of 548 592 msedge.exe 86 PID 592 wrote to memory of 548 592 msedge.exe 86 PID 592 wrote to memory of 548 592 msedge.exe 86 PID 592 wrote to memory of 548 592 msedge.exe 86 PID 592 wrote to memory of 548 592 msedge.exe 86 PID 592 wrote to memory of 548 592 msedge.exe 86 PID 592 wrote to memory of 548 592 msedge.exe 86 PID 592 wrote to memory of 548 592 msedge.exe 86 PID 592 wrote to memory of 548 592 msedge.exe 86 PID 592 wrote to memory of 548 592 msedge.exe 86 PID 592 wrote to memory of 548 592 msedge.exe 86 PID 592 wrote to memory of 548 592 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\04b9a602dcf291b263e7e31864dcfddc_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc0db446f8,0x7ffc0db44708,0x7ffc0db447182⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,9127989423788185359,3580387573442014677,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:22⤵PID:1240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2012,9127989423788185359,3580387573442014677,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2492 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2012,9127989423788185359,3580387573442014677,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:82⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,9127989423788185359,3580387573442014677,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,9127989423788185359,3580387573442014677,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,9127989423788185359,3580387573442014677,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,9127989423788185359,3580387573442014677,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:12⤵PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,9127989423788185359,3580387573442014677,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5316 /prefetch:82⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,9127989423788185359,3580387573442014677,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5316 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,9127989423788185359,3580387573442014677,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4620 /prefetch:12⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,9127989423788185359,3580387573442014677,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,9127989423788185359,3580387573442014677,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,9127989423788185359,3580387573442014677,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,9127989423788185359,3580387573442014677,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3160 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:724
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2312
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dbac49e66219979194c79f1cf1cb3dd1
SHA14ef87804a04d51ae1fac358f92382548b27f62f2
SHA256f24ed6c5bf4b734a9af4d64e14a80a160bea569f50849f70bf7b7277c4f48562
SHA512bb314d61f53cf7774f6dfb6b772c72f5daf386bc3d27d2bb7a14c65848ee86e6c48e9c5696693ded31846b69b9372a530175df48494e3d61a228e49d43401ad1
-
Filesize
152B
MD5a9e55f5864d6e2afd2fd84e25a3bc228
SHA1a5efcff9e3df6252c7fe8535d505235f82aab276
SHA2560f4df3120e4620555916be8e51c29be8d600d68ae5244efad6a0268aabc8c452
SHA51212f45fa73a6de6dfe17acc8b52b60f2d79008da130730b74cc138c1dcd73ccc99487165e3c8c90dc247359fde272f1ec6b3cf2c5fcb04e5093936144d0558b75
-
Filesize
6KB
MD5edfeeb8a981dff12c9ac9bdf057c5df7
SHA15593ef7df19aa8085d8599051b6e9666f657f42c
SHA256969fd3589ef7890b381b8bec9e0763be5842c586902ad5d261a5a73af4d1ab39
SHA512b6a5b583a93aeb501baef78f5ceec9551e99095d1736039332b70c468faf7e0771cd6685926f2a5ed47633012a0bd50814aacd9028e78b6c7f7f5ba2c1feb871
-
Filesize
6KB
MD5197c83518a9be13c4f91aece932ee24a
SHA14b0c029d2cb7fa79fd8ab0d1d9185a4b5bc65c6e
SHA256c032ed189676c866166686edaac4bcd81602e0e52ef9e94c094f13ef225e2271
SHA512bfbab2a2db6e52bd3be97087868a61d8125ca75190bc632bb956ee80fba1348bf64a2b6c13be004ef88e835f629bcc2b1c5799d53bf7123fdabd0682254dd588
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD54286667770a4a70a98757fece87bcc07
SHA19b88c8b3dbdab0a432978db5cdc4f4d571579ed5
SHA256d336a8ca0099b0aeec8f84061cf58b141cff76149f4f2224082119c4ad5b0d2d
SHA512a98f38ff42c1c27490579fcea6fa03b0a62699beeffcef3f8e20cff1643e60e63fdc88fa1761480adc053e26a9ab7cac0a3b397d26799408e5c5168e3a69c3d5