Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
28/04/2024, 18:13
Static task
static1
Behavioral task
behavioral1
Sample
05c90309bf397fe2949b6990144a8bbe_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
05c90309bf397fe2949b6990144a8bbe_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
05c90309bf397fe2949b6990144a8bbe_JaffaCakes118.html
-
Size
36KB
-
MD5
05c90309bf397fe2949b6990144a8bbe
-
SHA1
e12f8aa079a8fe8ce3e789ce966f07d804bf23ae
-
SHA256
917bb78cf18783f141c988457d4256b9a3b4e5d272085f2b483868c98a4e4dd2
-
SHA512
521d022dfa4e68f53cc0eec7a889e55f5bfa222d117b2950a62988515e64d52857135d85319ecbce1b911104e360009271e05f783b5ad5a1805878e5253ad72e
-
SSDEEP
768:zwx/MDTHT788hARfZPXOE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6TuZO/6cLu6OxJyp:Q/3bJxNVqu6Sl/u81K
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2292 msedge.exe 2292 msedge.exe 3876 msedge.exe 3876 msedge.exe 3680 identity_helper.exe 3680 identity_helper.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3876 wrote to memory of 2336 3876 msedge.exe 83 PID 3876 wrote to memory of 2336 3876 msedge.exe 83 PID 3876 wrote to memory of 1964 3876 msedge.exe 84 PID 3876 wrote to memory of 1964 3876 msedge.exe 84 PID 3876 wrote to memory of 1964 3876 msedge.exe 84 PID 3876 wrote to memory of 1964 3876 msedge.exe 84 PID 3876 wrote to memory of 1964 3876 msedge.exe 84 PID 3876 wrote to memory of 1964 3876 msedge.exe 84 PID 3876 wrote to memory of 1964 3876 msedge.exe 84 PID 3876 wrote to memory of 1964 3876 msedge.exe 84 PID 3876 wrote to memory of 1964 3876 msedge.exe 84 PID 3876 wrote to memory of 1964 3876 msedge.exe 84 PID 3876 wrote to memory of 1964 3876 msedge.exe 84 PID 3876 wrote to memory of 1964 3876 msedge.exe 84 PID 3876 wrote to memory of 1964 3876 msedge.exe 84 PID 3876 wrote to memory of 1964 3876 msedge.exe 84 PID 3876 wrote to memory of 1964 3876 msedge.exe 84 PID 3876 wrote to memory of 1964 3876 msedge.exe 84 PID 3876 wrote to memory of 1964 3876 msedge.exe 84 PID 3876 wrote to memory of 1964 3876 msedge.exe 84 PID 3876 wrote to memory of 1964 3876 msedge.exe 84 PID 3876 wrote to memory of 1964 3876 msedge.exe 84 PID 3876 wrote to memory of 1964 3876 msedge.exe 84 PID 3876 wrote to memory of 1964 3876 msedge.exe 84 PID 3876 wrote to memory of 1964 3876 msedge.exe 84 PID 3876 wrote to memory of 1964 3876 msedge.exe 84 PID 3876 wrote to memory of 1964 3876 msedge.exe 84 PID 3876 wrote to memory of 1964 3876 msedge.exe 84 PID 3876 wrote to memory of 1964 3876 msedge.exe 84 PID 3876 wrote to memory of 1964 3876 msedge.exe 84 PID 3876 wrote to memory of 1964 3876 msedge.exe 84 PID 3876 wrote to memory of 1964 3876 msedge.exe 84 PID 3876 wrote to memory of 1964 3876 msedge.exe 84 PID 3876 wrote to memory of 1964 3876 msedge.exe 84 PID 3876 wrote to memory of 1964 3876 msedge.exe 84 PID 3876 wrote to memory of 1964 3876 msedge.exe 84 PID 3876 wrote to memory of 1964 3876 msedge.exe 84 PID 3876 wrote to memory of 1964 3876 msedge.exe 84 PID 3876 wrote to memory of 1964 3876 msedge.exe 84 PID 3876 wrote to memory of 1964 3876 msedge.exe 84 PID 3876 wrote to memory of 1964 3876 msedge.exe 84 PID 3876 wrote to memory of 1964 3876 msedge.exe 84 PID 3876 wrote to memory of 2292 3876 msedge.exe 85 PID 3876 wrote to memory of 2292 3876 msedge.exe 85 PID 3876 wrote to memory of 624 3876 msedge.exe 86 PID 3876 wrote to memory of 624 3876 msedge.exe 86 PID 3876 wrote to memory of 624 3876 msedge.exe 86 PID 3876 wrote to memory of 624 3876 msedge.exe 86 PID 3876 wrote to memory of 624 3876 msedge.exe 86 PID 3876 wrote to memory of 624 3876 msedge.exe 86 PID 3876 wrote to memory of 624 3876 msedge.exe 86 PID 3876 wrote to memory of 624 3876 msedge.exe 86 PID 3876 wrote to memory of 624 3876 msedge.exe 86 PID 3876 wrote to memory of 624 3876 msedge.exe 86 PID 3876 wrote to memory of 624 3876 msedge.exe 86 PID 3876 wrote to memory of 624 3876 msedge.exe 86 PID 3876 wrote to memory of 624 3876 msedge.exe 86 PID 3876 wrote to memory of 624 3876 msedge.exe 86 PID 3876 wrote to memory of 624 3876 msedge.exe 86 PID 3876 wrote to memory of 624 3876 msedge.exe 86 PID 3876 wrote to memory of 624 3876 msedge.exe 86 PID 3876 wrote to memory of 624 3876 msedge.exe 86 PID 3876 wrote to memory of 624 3876 msedge.exe 86 PID 3876 wrote to memory of 624 3876 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\05c90309bf397fe2949b6990144a8bbe_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc325346f8,0x7ffc32534708,0x7ffc325347182⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,2812300780051463162,2060576629100998156,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,2812300780051463162,2060576629100998156,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,2812300780051463162,2060576629100998156,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:82⤵PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2812300780051463162,2060576629100998156,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2812300780051463162,2060576629100998156,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,2812300780051463162,2060576629100998156,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4368 /prefetch:82⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,2812300780051463162,2060576629100998156,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4368 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2812300780051463162,2060576629100998156,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4164 /prefetch:12⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2812300780051463162,2060576629100998156,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4352 /prefetch:12⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2812300780051463162,2060576629100998156,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4144 /prefetch:12⤵PID:1092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2812300780051463162,2060576629100998156,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,2812300780051463162,2060576629100998156,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4552 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4472
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2224
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58b2290ca03b4ca5fe52d82550c7e7d69
SHA120583a7851a906444204ce8ba4fa51153e6cd494
SHA256f9ff4871fc5317299de907489d466e630be63d698c8f7cb77cc81faddbecc6d2
SHA512704ec8122cc1c263dff67ddbb5c20ee0db8a438674d716bc3be5b266ee5629a219b0049d721f9eb2dd8f2d8fda0163659eaa4d3e1f0a6e9072a8ffb92bb2b25d
-
Filesize
152B
MD5919c29d42fb6034fee2f5de14d573c63
SHA124a2e1042347b3853344157239bde3ed699047a8
SHA25617cd6de97a0c020cb4935739cfef4ec4e074e8d127ac4c531b6dc496580c8141
SHA512bb7eadd087bbcec8b1b8a49b102b454333f2f9708d36b6ffc3c82fdc52e46873398d967238c3bfe9ac6caef45b017a5fe3938ebf5f3053e4ef9be7b2752b563d
-
Filesize
6KB
MD5d14c47f06489723fe4473e264cc534e4
SHA1a5569b197b5d75eaf6cb63516cb87b1f543e85af
SHA2564e8ab2756b4c025943751fe18c8a5a03a523552df96896648522670c9d1dc982
SHA5123f457c7348181338f4f9d0701b2867b2810e53f9d77794c5cfce810f9845f3e1fd4e39ea2114a5d367de96549c38abf9cdd45146e6173d28a8da6dc177a45205
-
Filesize
6KB
MD53706c6aba5627afd96050fabf52dc78d
SHA191887ed132007d82aa4fc2fb42e300b3fb4aac2e
SHA2567c9d1f497da77065a8be149123a7cbe54590fc203418b0cbcc3e16a12d8bca04
SHA512bbbd421186609987a7181aa45bf43453785a802b23d7656f48928e288b507bb4ace6c2374853fa1ff6080dc8a31fb0a7eb870da5409dc95b557d45bc9c83a477
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5be6a677f8e57593b0713223eb9671e6d
SHA18fed3d63cae0f42dab982b3260e54f88659f242e
SHA2568da7a696b67db245232a495ea4615c90b2fd93a36b58878e55c5e3463fca6366
SHA5121ef455403291b13066cc3e08070b30fe14bda5eb5a0a5efb1979116b43a83043c0ea00a57ba8aed9baad91771ec1ddf073358f492a800b9f812a4c9a76efc5b2