Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
28/04/2024, 11:13
Static task
static1
Behavioral task
behavioral1
Sample
0510206a5fd076bd792719fd1408470a_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0510206a5fd076bd792719fd1408470a_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0510206a5fd076bd792719fd1408470a_JaffaCakes118.html
-
Size
15KB
-
MD5
0510206a5fd076bd792719fd1408470a
-
SHA1
1a0b1737c7c9b0ce044d003bb0988a27db2377ee
-
SHA256
1289acfae7bd375de748c093980d2e83606e9ddc01ee39e65cd75ecb8c23f7f3
-
SHA512
0e825d20eb826680b7fa6f54c42d9b85c0f4cd421777658a1c3f4f0e2aef355dd1c6de272eb1926b9cc4e8cc8464b8019bd674a5ed6ba2f37ad66c604160649d
-
SSDEEP
384:ozwAlodazHoI941qfkIHMQJmquvDTTnQwJc4zr9+:ozwclHoDwCrTcwJfzr9+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2768 msedge.exe 2768 msedge.exe 4040 msedge.exe 4040 msedge.exe 1268 identity_helper.exe 1268 identity_helper.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4040 wrote to memory of 740 4040 msedge.exe 85 PID 4040 wrote to memory of 740 4040 msedge.exe 85 PID 4040 wrote to memory of 4780 4040 msedge.exe 86 PID 4040 wrote to memory of 4780 4040 msedge.exe 86 PID 4040 wrote to memory of 4780 4040 msedge.exe 86 PID 4040 wrote to memory of 4780 4040 msedge.exe 86 PID 4040 wrote to memory of 4780 4040 msedge.exe 86 PID 4040 wrote to memory of 4780 4040 msedge.exe 86 PID 4040 wrote to memory of 4780 4040 msedge.exe 86 PID 4040 wrote to memory of 4780 4040 msedge.exe 86 PID 4040 wrote to memory of 4780 4040 msedge.exe 86 PID 4040 wrote to memory of 4780 4040 msedge.exe 86 PID 4040 wrote to memory of 4780 4040 msedge.exe 86 PID 4040 wrote to memory of 4780 4040 msedge.exe 86 PID 4040 wrote to memory of 4780 4040 msedge.exe 86 PID 4040 wrote to memory of 4780 4040 msedge.exe 86 PID 4040 wrote to memory of 4780 4040 msedge.exe 86 PID 4040 wrote to memory of 4780 4040 msedge.exe 86 PID 4040 wrote to memory of 4780 4040 msedge.exe 86 PID 4040 wrote to memory of 4780 4040 msedge.exe 86 PID 4040 wrote to memory of 4780 4040 msedge.exe 86 PID 4040 wrote to memory of 4780 4040 msedge.exe 86 PID 4040 wrote to memory of 4780 4040 msedge.exe 86 PID 4040 wrote to memory of 4780 4040 msedge.exe 86 PID 4040 wrote to memory of 4780 4040 msedge.exe 86 PID 4040 wrote to memory of 4780 4040 msedge.exe 86 PID 4040 wrote to memory of 4780 4040 msedge.exe 86 PID 4040 wrote to memory of 4780 4040 msedge.exe 86 PID 4040 wrote to memory of 4780 4040 msedge.exe 86 PID 4040 wrote to memory of 4780 4040 msedge.exe 86 PID 4040 wrote to memory of 4780 4040 msedge.exe 86 PID 4040 wrote to memory of 4780 4040 msedge.exe 86 PID 4040 wrote to memory of 4780 4040 msedge.exe 86 PID 4040 wrote to memory of 4780 4040 msedge.exe 86 PID 4040 wrote to memory of 4780 4040 msedge.exe 86 PID 4040 wrote to memory of 4780 4040 msedge.exe 86 PID 4040 wrote to memory of 4780 4040 msedge.exe 86 PID 4040 wrote to memory of 4780 4040 msedge.exe 86 PID 4040 wrote to memory of 4780 4040 msedge.exe 86 PID 4040 wrote to memory of 4780 4040 msedge.exe 86 PID 4040 wrote to memory of 4780 4040 msedge.exe 86 PID 4040 wrote to memory of 4780 4040 msedge.exe 86 PID 4040 wrote to memory of 2768 4040 msedge.exe 87 PID 4040 wrote to memory of 2768 4040 msedge.exe 87 PID 4040 wrote to memory of 4008 4040 msedge.exe 88 PID 4040 wrote to memory of 4008 4040 msedge.exe 88 PID 4040 wrote to memory of 4008 4040 msedge.exe 88 PID 4040 wrote to memory of 4008 4040 msedge.exe 88 PID 4040 wrote to memory of 4008 4040 msedge.exe 88 PID 4040 wrote to memory of 4008 4040 msedge.exe 88 PID 4040 wrote to memory of 4008 4040 msedge.exe 88 PID 4040 wrote to memory of 4008 4040 msedge.exe 88 PID 4040 wrote to memory of 4008 4040 msedge.exe 88 PID 4040 wrote to memory of 4008 4040 msedge.exe 88 PID 4040 wrote to memory of 4008 4040 msedge.exe 88 PID 4040 wrote to memory of 4008 4040 msedge.exe 88 PID 4040 wrote to memory of 4008 4040 msedge.exe 88 PID 4040 wrote to memory of 4008 4040 msedge.exe 88 PID 4040 wrote to memory of 4008 4040 msedge.exe 88 PID 4040 wrote to memory of 4008 4040 msedge.exe 88 PID 4040 wrote to memory of 4008 4040 msedge.exe 88 PID 4040 wrote to memory of 4008 4040 msedge.exe 88 PID 4040 wrote to memory of 4008 4040 msedge.exe 88 PID 4040 wrote to memory of 4008 4040 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0510206a5fd076bd792719fd1408470a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc923546f8,0x7ffc92354708,0x7ffc923547182⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,15696615772253119701,4003416144620782704,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,15696615772253119701,4003416144620782704,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,15696615772253119701,4003416144620782704,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,15696615772253119701,4003416144620782704,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,15696615772253119701,4003416144620782704,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:1208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,15696615772253119701,4003416144620782704,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4912 /prefetch:82⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,15696615772253119701,4003416144620782704,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4912 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,15696615772253119701,4003416144620782704,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:12⤵PID:3264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,15696615772253119701,4003416144620782704,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:12⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,15696615772253119701,4003416144620782704,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4260 /prefetch:12⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,15696615772253119701,4003416144620782704,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:3080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,15696615772253119701,4003416144620782704,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3080 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3464
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3620
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52a70f1bd4da893a67660d6432970788d
SHA1ddf4047e0d468f56ea0c0d8ff078a86a0bb62873
SHA256c550af5ba51f68ac4d18747edc5dea1a655dd212d84bad1e6168ba7a97745561
SHA51226b9a365e77df032fc5c461d85d1ba313eafead38827190608c6537ec12b2dfdbed4e1705bfd1e61899034791ad6fa88ea7490c3a48cdaec4d04cd0577b11343
-
Filesize
152B
MD5fbe1ce4d182aaffb80de94263be1dd35
SHA1bc6c9827aa35a136a7d79be9e606ff359e2ac3ea
SHA2560021f72dbca789f179762b0e17c28fe0b93a12539b08294800e47469905aeb51
SHA5123fb0a3b38e7d4a30f5560594b1d14e6e58419e274255fb68dfe0ca897aa181f9ce8cb2048403f851fd36a17b0e34d272d03927769d41a500b2fe64806354902f
-
Filesize
6KB
MD572f7b90ab44ade3b337af8ec11c2c677
SHA1c54beb672aa45044a36a03295b892c41e21a18dc
SHA256fad33528be74e8c8fbf0e9f37851e6808f9f2f0d87b7dcb19a115f730742ebcb
SHA5124565b5684be0e7a83ecc5be30b485a0ed5c175ee92e91074163eb61ee244a2b91b176ac1f9496a46d8949e2d2b23827436fa39c2c3ddc82f6dd3163798b8d32e
-
Filesize
6KB
MD5188273b562df04e546190db8e343e8af
SHA17ebce9cd5b773076663b6666dca21b3c6d73a957
SHA256e2dd5a97ff35ab83b3696087d156bd18cf444298e672e55dafa53a0263cefe77
SHA512bba8b03a9eaf1b55c7943f2dadf13c49a2d345b5efc327bad79ed087bc8e7c32b5ee83cb3e2e73a084233bd61ae37dc3020c5e6364d3050f8cc3adff5f2910e5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5158643dadbecca858fdfe6f90668439c
SHA1802253e6add52a82a8a8cd758f0bc8c170455cc0
SHA256161f08be846c9933381aef23f4620a9684f2dc4734ab01739df06aea1cf57e3c
SHA512a3152b788e83cdc4fc4966433ffe0da479ddc1da04f3ca03b2d80b85981f4e8c22a6538363122c97e58d8eecbe572e0350dcd081a9d133cfbb0c70872d2f9cf3