Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
29-04-2024 10:19
Static task
static1
Behavioral task
behavioral1
Sample
076cf8976098359fe9a7cd5df9f7641c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
076cf8976098359fe9a7cd5df9f7641c_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
076cf8976098359fe9a7cd5df9f7641c_JaffaCakes118.html
-
Size
18KB
-
MD5
076cf8976098359fe9a7cd5df9f7641c
-
SHA1
baf3bce1d0b7f23a345176b20e75d49254301438
-
SHA256
cff0d98c6b481ef78378b06fedc40ef2a66bbe11ad5aa69c6666ae60cf45fb8a
-
SHA512
1d753eff7e96008ed4082451f27f47a13a0e117ba0517693503c7942c2ff97985a02c2e2c8b8f3c41cf28122430b20bd9b6c811d1278b860c2d82046f3c3bd58
-
SSDEEP
384:nXfvjcxWVVolTCA9lw2PJdgWPbZWR+VfFlc+aq43:nXfvjJVoZCA9OR+LW+aq43
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 5 raw.githubusercontent.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2808 msedge.exe 2808 msedge.exe 2156 msedge.exe 2156 msedge.exe 956 identity_helper.exe 956 identity_helper.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2156 wrote to memory of 3408 2156 msedge.exe 83 PID 2156 wrote to memory of 3408 2156 msedge.exe 83 PID 2156 wrote to memory of 1728 2156 msedge.exe 84 PID 2156 wrote to memory of 1728 2156 msedge.exe 84 PID 2156 wrote to memory of 1728 2156 msedge.exe 84 PID 2156 wrote to memory of 1728 2156 msedge.exe 84 PID 2156 wrote to memory of 1728 2156 msedge.exe 84 PID 2156 wrote to memory of 1728 2156 msedge.exe 84 PID 2156 wrote to memory of 1728 2156 msedge.exe 84 PID 2156 wrote to memory of 1728 2156 msedge.exe 84 PID 2156 wrote to memory of 1728 2156 msedge.exe 84 PID 2156 wrote to memory of 1728 2156 msedge.exe 84 PID 2156 wrote to memory of 1728 2156 msedge.exe 84 PID 2156 wrote to memory of 1728 2156 msedge.exe 84 PID 2156 wrote to memory of 1728 2156 msedge.exe 84 PID 2156 wrote to memory of 1728 2156 msedge.exe 84 PID 2156 wrote to memory of 1728 2156 msedge.exe 84 PID 2156 wrote to memory of 1728 2156 msedge.exe 84 PID 2156 wrote to memory of 1728 2156 msedge.exe 84 PID 2156 wrote to memory of 1728 2156 msedge.exe 84 PID 2156 wrote to memory of 1728 2156 msedge.exe 84 PID 2156 wrote to memory of 1728 2156 msedge.exe 84 PID 2156 wrote to memory of 1728 2156 msedge.exe 84 PID 2156 wrote to memory of 1728 2156 msedge.exe 84 PID 2156 wrote to memory of 1728 2156 msedge.exe 84 PID 2156 wrote to memory of 1728 2156 msedge.exe 84 PID 2156 wrote to memory of 1728 2156 msedge.exe 84 PID 2156 wrote to memory of 1728 2156 msedge.exe 84 PID 2156 wrote to memory of 1728 2156 msedge.exe 84 PID 2156 wrote to memory of 1728 2156 msedge.exe 84 PID 2156 wrote to memory of 1728 2156 msedge.exe 84 PID 2156 wrote to memory of 1728 2156 msedge.exe 84 PID 2156 wrote to memory of 1728 2156 msedge.exe 84 PID 2156 wrote to memory of 1728 2156 msedge.exe 84 PID 2156 wrote to memory of 1728 2156 msedge.exe 84 PID 2156 wrote to memory of 1728 2156 msedge.exe 84 PID 2156 wrote to memory of 1728 2156 msedge.exe 84 PID 2156 wrote to memory of 1728 2156 msedge.exe 84 PID 2156 wrote to memory of 1728 2156 msedge.exe 84 PID 2156 wrote to memory of 1728 2156 msedge.exe 84 PID 2156 wrote to memory of 1728 2156 msedge.exe 84 PID 2156 wrote to memory of 1728 2156 msedge.exe 84 PID 2156 wrote to memory of 2808 2156 msedge.exe 85 PID 2156 wrote to memory of 2808 2156 msedge.exe 85 PID 2156 wrote to memory of 1628 2156 msedge.exe 86 PID 2156 wrote to memory of 1628 2156 msedge.exe 86 PID 2156 wrote to memory of 1628 2156 msedge.exe 86 PID 2156 wrote to memory of 1628 2156 msedge.exe 86 PID 2156 wrote to memory of 1628 2156 msedge.exe 86 PID 2156 wrote to memory of 1628 2156 msedge.exe 86 PID 2156 wrote to memory of 1628 2156 msedge.exe 86 PID 2156 wrote to memory of 1628 2156 msedge.exe 86 PID 2156 wrote to memory of 1628 2156 msedge.exe 86 PID 2156 wrote to memory of 1628 2156 msedge.exe 86 PID 2156 wrote to memory of 1628 2156 msedge.exe 86 PID 2156 wrote to memory of 1628 2156 msedge.exe 86 PID 2156 wrote to memory of 1628 2156 msedge.exe 86 PID 2156 wrote to memory of 1628 2156 msedge.exe 86 PID 2156 wrote to memory of 1628 2156 msedge.exe 86 PID 2156 wrote to memory of 1628 2156 msedge.exe 86 PID 2156 wrote to memory of 1628 2156 msedge.exe 86 PID 2156 wrote to memory of 1628 2156 msedge.exe 86 PID 2156 wrote to memory of 1628 2156 msedge.exe 86 PID 2156 wrote to memory of 1628 2156 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\076cf8976098359fe9a7cd5df9f7641c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff957be46f8,0x7ff957be4708,0x7ff957be47182⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,17017205096694206382,9650320076257481871,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,17017205096694206382,9650320076257481871,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,17017205096694206382,9650320076257481871,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2496 /prefetch:82⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17017205096694206382,9650320076257481871,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17017205096694206382,9650320076257481871,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17017205096694206382,9650320076257481871,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3960 /prefetch:12⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17017205096694206382,9650320076257481871,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,17017205096694206382,9650320076257481871,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5600 /prefetch:82⤵PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,17017205096694206382,9650320076257481871,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5600 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17017205096694206382,9650320076257481871,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:2992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17017205096694206382,9650320076257481871,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17017205096694206382,9650320076257481871,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4496 /prefetch:12⤵PID:1340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17017205096694206382,9650320076257481871,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,17017205096694206382,9650320076257481871,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4616 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4544
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1480
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3844
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
Filesize
6KB
MD503a593dadc744c6a82d8b716342270a6
SHA1d02fcaef2f7326c44599b4d3dc49b3f34396e997
SHA25651d48a69e498fd17f4b6adc4a76fe985de0060882255cf9f75c48a7691d7fdb3
SHA51236df0c65e5e787f651a07e49b2b6de62d3acf363e587e1ec6689609fabd9d774211da22502a4ed9b06aaa6f11ac03ec0fe82c13a32dbc2ca09985ea06c146971
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5707616c89d3d13f309fc85dc9b722774
SHA147fb450ee98f2ea0cd7c1be1aec657d00d4411e0
SHA256e8e26ed8ee3da289a38cdb3959cec5522c9ff71df8db3343535242ba6382144a
SHA51210cfdd5254d1ccc2328b9cddd9a01c6d9cbf4ad79c4a6d16301e854ceffaeaed3820cea7c51302c73299165107b0547e8e37c4e6104981491308e0b435a367ed