Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
28/04/2024, 12:49
Static task
static1
Behavioral task
behavioral1
Sample
053a8413bec8cb5e69a7397a86790a38_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
053a8413bec8cb5e69a7397a86790a38_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
053a8413bec8cb5e69a7397a86790a38_JaffaCakes118.html
-
Size
357KB
-
MD5
053a8413bec8cb5e69a7397a86790a38
-
SHA1
99c713ef6d3c779b1c335a9dfefc26d7a9777b3c
-
SHA256
274f31f1d1b2372565a86e74fb60fbe8d90739ea1cb5469953e36920bd8c354d
-
SHA512
f525ffc964ef82be2bb0ca0fedd740d559f10ee748038562f781dee1baebc3ddb075f9a0ec4032dd68afef80cfd929808eeaed42891d333e6bfd918034545674
-
SSDEEP
1536:sFlM9CeEV8ZE/PwRIfeFqtOk9KCkcSdccttUVNiLtBErW3Etddd7NLdt9cltdBFd:mlM9CeEV8ZE/PwRIfeGoQgO/LMt
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2360 msedge.exe 2360 msedge.exe 4944 msedge.exe 4944 msedge.exe 4992 identity_helper.exe 4992 identity_helper.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4944 wrote to memory of 3452 4944 msedge.exe 82 PID 4944 wrote to memory of 3452 4944 msedge.exe 82 PID 4944 wrote to memory of 1320 4944 msedge.exe 83 PID 4944 wrote to memory of 1320 4944 msedge.exe 83 PID 4944 wrote to memory of 1320 4944 msedge.exe 83 PID 4944 wrote to memory of 1320 4944 msedge.exe 83 PID 4944 wrote to memory of 1320 4944 msedge.exe 83 PID 4944 wrote to memory of 1320 4944 msedge.exe 83 PID 4944 wrote to memory of 1320 4944 msedge.exe 83 PID 4944 wrote to memory of 1320 4944 msedge.exe 83 PID 4944 wrote to memory of 1320 4944 msedge.exe 83 PID 4944 wrote to memory of 1320 4944 msedge.exe 83 PID 4944 wrote to memory of 1320 4944 msedge.exe 83 PID 4944 wrote to memory of 1320 4944 msedge.exe 83 PID 4944 wrote to memory of 1320 4944 msedge.exe 83 PID 4944 wrote to memory of 1320 4944 msedge.exe 83 PID 4944 wrote to memory of 1320 4944 msedge.exe 83 PID 4944 wrote to memory of 1320 4944 msedge.exe 83 PID 4944 wrote to memory of 1320 4944 msedge.exe 83 PID 4944 wrote to memory of 1320 4944 msedge.exe 83 PID 4944 wrote to memory of 1320 4944 msedge.exe 83 PID 4944 wrote to memory of 1320 4944 msedge.exe 83 PID 4944 wrote to memory of 1320 4944 msedge.exe 83 PID 4944 wrote to memory of 1320 4944 msedge.exe 83 PID 4944 wrote to memory of 1320 4944 msedge.exe 83 PID 4944 wrote to memory of 1320 4944 msedge.exe 83 PID 4944 wrote to memory of 1320 4944 msedge.exe 83 PID 4944 wrote to memory of 1320 4944 msedge.exe 83 PID 4944 wrote to memory of 1320 4944 msedge.exe 83 PID 4944 wrote to memory of 1320 4944 msedge.exe 83 PID 4944 wrote to memory of 1320 4944 msedge.exe 83 PID 4944 wrote to memory of 1320 4944 msedge.exe 83 PID 4944 wrote to memory of 1320 4944 msedge.exe 83 PID 4944 wrote to memory of 1320 4944 msedge.exe 83 PID 4944 wrote to memory of 1320 4944 msedge.exe 83 PID 4944 wrote to memory of 1320 4944 msedge.exe 83 PID 4944 wrote to memory of 1320 4944 msedge.exe 83 PID 4944 wrote to memory of 1320 4944 msedge.exe 83 PID 4944 wrote to memory of 1320 4944 msedge.exe 83 PID 4944 wrote to memory of 1320 4944 msedge.exe 83 PID 4944 wrote to memory of 1320 4944 msedge.exe 83 PID 4944 wrote to memory of 1320 4944 msedge.exe 83 PID 4944 wrote to memory of 2360 4944 msedge.exe 84 PID 4944 wrote to memory of 2360 4944 msedge.exe 84 PID 4944 wrote to memory of 4480 4944 msedge.exe 85 PID 4944 wrote to memory of 4480 4944 msedge.exe 85 PID 4944 wrote to memory of 4480 4944 msedge.exe 85 PID 4944 wrote to memory of 4480 4944 msedge.exe 85 PID 4944 wrote to memory of 4480 4944 msedge.exe 85 PID 4944 wrote to memory of 4480 4944 msedge.exe 85 PID 4944 wrote to memory of 4480 4944 msedge.exe 85 PID 4944 wrote to memory of 4480 4944 msedge.exe 85 PID 4944 wrote to memory of 4480 4944 msedge.exe 85 PID 4944 wrote to memory of 4480 4944 msedge.exe 85 PID 4944 wrote to memory of 4480 4944 msedge.exe 85 PID 4944 wrote to memory of 4480 4944 msedge.exe 85 PID 4944 wrote to memory of 4480 4944 msedge.exe 85 PID 4944 wrote to memory of 4480 4944 msedge.exe 85 PID 4944 wrote to memory of 4480 4944 msedge.exe 85 PID 4944 wrote to memory of 4480 4944 msedge.exe 85 PID 4944 wrote to memory of 4480 4944 msedge.exe 85 PID 4944 wrote to memory of 4480 4944 msedge.exe 85 PID 4944 wrote to memory of 4480 4944 msedge.exe 85 PID 4944 wrote to memory of 4480 4944 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\053a8413bec8cb5e69a7397a86790a38_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa328846f8,0x7ffa32884708,0x7ffa328847182⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1940,16770629776574617576,4801773279553017916,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1956 /prefetch:22⤵PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1940,16770629776574617576,4801773279553017916,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2512 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1940,16770629776574617576,4801773279553017916,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,16770629776574617576,4801773279553017916,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,16770629776574617576,4801773279553017916,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1940,16770629776574617576,4801773279553017916,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5344 /prefetch:82⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1940,16770629776574617576,4801773279553017916,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5344 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,16770629776574617576,4801773279553017916,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,16770629776574617576,4801773279553017916,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4100 /prefetch:12⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,16770629776574617576,4801773279553017916,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3504 /prefetch:12⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,16770629776574617576,4801773279553017916,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:1156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1940,16770629776574617576,4801773279553017916,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4640
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4160
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4304
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
264B
MD5dd41a9998cc47985f7cfc5ada16b6de0
SHA13396cbcd4584076912b9d5f581f3faf80015c0aa
SHA256f3d4fc05b4090ffaee76bca740feac9fd4d6c3e87cada7659100a42b00c8db7f
SHA512d4acf73b91b98e9946971fa0a43b4ba9c3e706b8b3cae71db0a8e0fae2f13636dc7019a8c8e14f2c959b3177fb01d41ee6ad313ce43b07da01ade2f6b4e5369f
-
Filesize
6KB
MD5e9250a40c8a6419857cc6fe7022f01ce
SHA13e2d03a2e6bada9cd8e37b0e98cc86a1a9aeac2d
SHA25627a1769c06a4f48ca4134ea7ff94504ea3a8804b6c5e8f983e538c1cdf1e73af
SHA512a58026dc489fd592dd8f8f556ad62b3dc2e8ceeed9aa6ace32855baf9360f42fd879acdf83066cf21fa9dc231c163a97eff96b9dee79e862e65f55bf43248166
-
Filesize
6KB
MD5e3463f4e746b17d1ab0e896621d802e7
SHA142752c78090d7bdc802d821e5dd72d9246e220ac
SHA256caf4617f995aed35e7b6e5b3dcacdc5533c644231fb59729cbf3fb40988020bd
SHA512afe3b052e12b690a5fd1b597c3832c5c4fd4d5e9d95c97df4436623635aae6ae76c49bd18cd98795a085644be36889e907d974cfa4cc3bb9e82ceced1a44d754
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f3aa4fabc7c4acfca8729fb8eeb3f8b8
SHA1d004f8afbe797e7ff8ece74ada205a4f35ed3096
SHA25662cee9fc7f2d1da10ae9a887a21c4e33f4a4de7ad1a4272b72f074e31b6824e2
SHA512be749a663c5249f45699e977a64a510bf34610637ce5cb5343b1dff1b5837725b4804b50c73592688688eacea3da0a2ef5037499611252f6c0319036750f4bc4