Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
28/04/2024, 16:23
Static task
static1
Behavioral task
behavioral1
Sample
059875ede3bc85e3aee55fdfeb1c977d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
059875ede3bc85e3aee55fdfeb1c977d_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
059875ede3bc85e3aee55fdfeb1c977d_JaffaCakes118.html
-
Size
15KB
-
MD5
059875ede3bc85e3aee55fdfeb1c977d
-
SHA1
1dde598e4822588d92c22fb566ac23e0727da249
-
SHA256
fd1f7fa525226e485ab7793d97f64318f6d9a03730316c771cb3a82091ed21c1
-
SHA512
924f65b0587ce7799ae7dc0e83df48aa61c36e609560d061af5a28ea007e90460ba9e062c32fd86b9148cb44ddaab266b78f168a713211b3302660b9210c477a
-
SSDEEP
384:mY3g7Hpfnxrd8f3wQyV/ED2hAucephWBkhG8ETrrQ32wFzE+V1:Z4JfnhCwQyhED2hAbkhV732zA1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 924 msedge.exe 924 msedge.exe 1252 msedge.exe 1252 msedge.exe 2348 identity_helper.exe 2348 identity_helper.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1252 wrote to memory of 652 1252 msedge.exe 81 PID 1252 wrote to memory of 652 1252 msedge.exe 81 PID 1252 wrote to memory of 3792 1252 msedge.exe 82 PID 1252 wrote to memory of 3792 1252 msedge.exe 82 PID 1252 wrote to memory of 3792 1252 msedge.exe 82 PID 1252 wrote to memory of 3792 1252 msedge.exe 82 PID 1252 wrote to memory of 3792 1252 msedge.exe 82 PID 1252 wrote to memory of 3792 1252 msedge.exe 82 PID 1252 wrote to memory of 3792 1252 msedge.exe 82 PID 1252 wrote to memory of 3792 1252 msedge.exe 82 PID 1252 wrote to memory of 3792 1252 msedge.exe 82 PID 1252 wrote to memory of 3792 1252 msedge.exe 82 PID 1252 wrote to memory of 3792 1252 msedge.exe 82 PID 1252 wrote to memory of 3792 1252 msedge.exe 82 PID 1252 wrote to memory of 3792 1252 msedge.exe 82 PID 1252 wrote to memory of 3792 1252 msedge.exe 82 PID 1252 wrote to memory of 3792 1252 msedge.exe 82 PID 1252 wrote to memory of 3792 1252 msedge.exe 82 PID 1252 wrote to memory of 3792 1252 msedge.exe 82 PID 1252 wrote to memory of 3792 1252 msedge.exe 82 PID 1252 wrote to memory of 3792 1252 msedge.exe 82 PID 1252 wrote to memory of 3792 1252 msedge.exe 82 PID 1252 wrote to memory of 3792 1252 msedge.exe 82 PID 1252 wrote to memory of 3792 1252 msedge.exe 82 PID 1252 wrote to memory of 3792 1252 msedge.exe 82 PID 1252 wrote to memory of 3792 1252 msedge.exe 82 PID 1252 wrote to memory of 3792 1252 msedge.exe 82 PID 1252 wrote to memory of 3792 1252 msedge.exe 82 PID 1252 wrote to memory of 3792 1252 msedge.exe 82 PID 1252 wrote to memory of 3792 1252 msedge.exe 82 PID 1252 wrote to memory of 3792 1252 msedge.exe 82 PID 1252 wrote to memory of 3792 1252 msedge.exe 82 PID 1252 wrote to memory of 3792 1252 msedge.exe 82 PID 1252 wrote to memory of 3792 1252 msedge.exe 82 PID 1252 wrote to memory of 3792 1252 msedge.exe 82 PID 1252 wrote to memory of 3792 1252 msedge.exe 82 PID 1252 wrote to memory of 3792 1252 msedge.exe 82 PID 1252 wrote to memory of 3792 1252 msedge.exe 82 PID 1252 wrote to memory of 3792 1252 msedge.exe 82 PID 1252 wrote to memory of 3792 1252 msedge.exe 82 PID 1252 wrote to memory of 3792 1252 msedge.exe 82 PID 1252 wrote to memory of 3792 1252 msedge.exe 82 PID 1252 wrote to memory of 924 1252 msedge.exe 83 PID 1252 wrote to memory of 924 1252 msedge.exe 83 PID 1252 wrote to memory of 4216 1252 msedge.exe 84 PID 1252 wrote to memory of 4216 1252 msedge.exe 84 PID 1252 wrote to memory of 4216 1252 msedge.exe 84 PID 1252 wrote to memory of 4216 1252 msedge.exe 84 PID 1252 wrote to memory of 4216 1252 msedge.exe 84 PID 1252 wrote to memory of 4216 1252 msedge.exe 84 PID 1252 wrote to memory of 4216 1252 msedge.exe 84 PID 1252 wrote to memory of 4216 1252 msedge.exe 84 PID 1252 wrote to memory of 4216 1252 msedge.exe 84 PID 1252 wrote to memory of 4216 1252 msedge.exe 84 PID 1252 wrote to memory of 4216 1252 msedge.exe 84 PID 1252 wrote to memory of 4216 1252 msedge.exe 84 PID 1252 wrote to memory of 4216 1252 msedge.exe 84 PID 1252 wrote to memory of 4216 1252 msedge.exe 84 PID 1252 wrote to memory of 4216 1252 msedge.exe 84 PID 1252 wrote to memory of 4216 1252 msedge.exe 84 PID 1252 wrote to memory of 4216 1252 msedge.exe 84 PID 1252 wrote to memory of 4216 1252 msedge.exe 84 PID 1252 wrote to memory of 4216 1252 msedge.exe 84 PID 1252 wrote to memory of 4216 1252 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\059875ede3bc85e3aee55fdfeb1c977d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9303d46f8,0x7ff9303d4708,0x7ff9303d47182⤵PID:652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,3056274689494328262,1498750331347511668,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:3792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2024,3056274689494328262,1498750331347511668,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2024,3056274689494328262,1498750331347511668,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,3056274689494328262,1498750331347511668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,3056274689494328262,1498750331347511668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,3056274689494328262,1498750331347511668,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 /prefetch:82⤵PID:832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,3056274689494328262,1498750331347511668,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,3056274689494328262,1498750331347511668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,3056274689494328262,1498750331347511668,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:12⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,3056274689494328262,1498750331347511668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,3056274689494328262,1498750331347511668,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,3056274689494328262,1498750331347511668,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4804 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:636
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3564
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4836
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
308B
MD56316829da297e673428905934dc4f3e0
SHA17019d05ae175fb2940f043b68933de9835217382
SHA2563e19cd4fdaf628db7625641bdb8d0e556bb20f9fd4809fba55d7b806ca6ab220
SHA5120b7c50eb435cbdd5b76baa34b61699b533ca3c9d62aa0c113128ba17b6ce692558324e5d9fdd902f447d7a7c0291c0184d27e8834536e928f13a599648552749
-
Filesize
6KB
MD5560cc0c8fe7b2ddc974652820731a3d4
SHA14d47295ca7493bbe17a8d3cfe4736a854a3b8000
SHA256afaa8aeb688ebcc6baf7cce8f14f66dc6c3b21935d073604fb18664b59a29b6e
SHA512ec97e5e775a456486dd9a3b23223411a054b949575160c845556f436f8ef806a9f2782b64aea118451bb1530f7517e46b92212319da89e80557dae0b6d35a665
-
Filesize
6KB
MD5d0d0a337923c063eeb9b56b28b744d29
SHA19e8ad4d8d4f2c74653359d92adfdedd9705ecd72
SHA256b1d52c9fd77d22c804f3416f6423b5cff2d3bc5c1f3dbd38412b98e361aabadf
SHA5127744762c4bbccc8cba669f0360f5a0fa7c5fa915bafdca918b74f10ff65c2cf29af2555da2d21b15aecfd7f993bbb95161683dece5d12858f84ecbd11b518bab
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54f7c35fa0618585500bb8916db535fcf
SHA1e497a2ba23050d60e8fb89e26bbd00f452d41c85
SHA2569d06d94847a1c154f04253f5b99c559905fc9f81100a1dc00f6d11a4a71b107e
SHA5124979e04a9df50985a9704326a9d7fe3fc99e1d9f9db1183d0f3b60ce9bacfc128dce64ae9bf33be55dd462742a6853ced410fe211178d3db705e1898e90124b9