Analysis
-
max time kernel
146s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
29/04/2024, 10:21
Static task
static1
Behavioral task
behavioral1
Sample
076e167b9da09bb832b82be7d365526f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
076e167b9da09bb832b82be7d365526f_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
076e167b9da09bb832b82be7d365526f_JaffaCakes118.html
-
Size
78KB
-
MD5
076e167b9da09bb832b82be7d365526f
-
SHA1
c357ad98ce3b3b2712e5db8f9c8ca7e03a456362
-
SHA256
01b579954c2f831c92b74269dc2758a0354ccd5f4d2cde495c8c97b79376ea22
-
SHA512
9676c04df51c615951232454f87267573effec57809fd3b1a0ccf5a8d4b2c683a030f877112b1ffe92e526812c0dcd3b48f5b7c416f379c90b2f933b02ae4b13
-
SSDEEP
1536:wabquklcMklc2klc7uG/bI+3zkcKklcPEijZeqhUEijZeqLyWfO02LvDEa7mE5XB:XklcMklc2klc7uG/bI+3zkcKklcPEijr
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2584 msedge.exe 2584 msedge.exe 3656 msedge.exe 3656 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3656 wrote to memory of 4704 3656 msedge.exe 83 PID 3656 wrote to memory of 4704 3656 msedge.exe 83 PID 3656 wrote to memory of 816 3656 msedge.exe 84 PID 3656 wrote to memory of 816 3656 msedge.exe 84 PID 3656 wrote to memory of 816 3656 msedge.exe 84 PID 3656 wrote to memory of 816 3656 msedge.exe 84 PID 3656 wrote to memory of 816 3656 msedge.exe 84 PID 3656 wrote to memory of 816 3656 msedge.exe 84 PID 3656 wrote to memory of 816 3656 msedge.exe 84 PID 3656 wrote to memory of 816 3656 msedge.exe 84 PID 3656 wrote to memory of 816 3656 msedge.exe 84 PID 3656 wrote to memory of 816 3656 msedge.exe 84 PID 3656 wrote to memory of 816 3656 msedge.exe 84 PID 3656 wrote to memory of 816 3656 msedge.exe 84 PID 3656 wrote to memory of 816 3656 msedge.exe 84 PID 3656 wrote to memory of 816 3656 msedge.exe 84 PID 3656 wrote to memory of 816 3656 msedge.exe 84 PID 3656 wrote to memory of 816 3656 msedge.exe 84 PID 3656 wrote to memory of 816 3656 msedge.exe 84 PID 3656 wrote to memory of 816 3656 msedge.exe 84 PID 3656 wrote to memory of 816 3656 msedge.exe 84 PID 3656 wrote to memory of 816 3656 msedge.exe 84 PID 3656 wrote to memory of 816 3656 msedge.exe 84 PID 3656 wrote to memory of 816 3656 msedge.exe 84 PID 3656 wrote to memory of 816 3656 msedge.exe 84 PID 3656 wrote to memory of 816 3656 msedge.exe 84 PID 3656 wrote to memory of 816 3656 msedge.exe 84 PID 3656 wrote to memory of 816 3656 msedge.exe 84 PID 3656 wrote to memory of 816 3656 msedge.exe 84 PID 3656 wrote to memory of 816 3656 msedge.exe 84 PID 3656 wrote to memory of 816 3656 msedge.exe 84 PID 3656 wrote to memory of 816 3656 msedge.exe 84 PID 3656 wrote to memory of 816 3656 msedge.exe 84 PID 3656 wrote to memory of 816 3656 msedge.exe 84 PID 3656 wrote to memory of 816 3656 msedge.exe 84 PID 3656 wrote to memory of 816 3656 msedge.exe 84 PID 3656 wrote to memory of 816 3656 msedge.exe 84 PID 3656 wrote to memory of 816 3656 msedge.exe 84 PID 3656 wrote to memory of 816 3656 msedge.exe 84 PID 3656 wrote to memory of 816 3656 msedge.exe 84 PID 3656 wrote to memory of 816 3656 msedge.exe 84 PID 3656 wrote to memory of 816 3656 msedge.exe 84 PID 3656 wrote to memory of 2584 3656 msedge.exe 85 PID 3656 wrote to memory of 2584 3656 msedge.exe 85 PID 3656 wrote to memory of 4660 3656 msedge.exe 86 PID 3656 wrote to memory of 4660 3656 msedge.exe 86 PID 3656 wrote to memory of 4660 3656 msedge.exe 86 PID 3656 wrote to memory of 4660 3656 msedge.exe 86 PID 3656 wrote to memory of 4660 3656 msedge.exe 86 PID 3656 wrote to memory of 4660 3656 msedge.exe 86 PID 3656 wrote to memory of 4660 3656 msedge.exe 86 PID 3656 wrote to memory of 4660 3656 msedge.exe 86 PID 3656 wrote to memory of 4660 3656 msedge.exe 86 PID 3656 wrote to memory of 4660 3656 msedge.exe 86 PID 3656 wrote to memory of 4660 3656 msedge.exe 86 PID 3656 wrote to memory of 4660 3656 msedge.exe 86 PID 3656 wrote to memory of 4660 3656 msedge.exe 86 PID 3656 wrote to memory of 4660 3656 msedge.exe 86 PID 3656 wrote to memory of 4660 3656 msedge.exe 86 PID 3656 wrote to memory of 4660 3656 msedge.exe 86 PID 3656 wrote to memory of 4660 3656 msedge.exe 86 PID 3656 wrote to memory of 4660 3656 msedge.exe 86 PID 3656 wrote to memory of 4660 3656 msedge.exe 86 PID 3656 wrote to memory of 4660 3656 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\076e167b9da09bb832b82be7d365526f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe3af846f8,0x7ffe3af84708,0x7ffe3af847182⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,831552994545806405,8052297456460376353,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:22⤵PID:816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1980,831552994545806405,8052297456460376353,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2412 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1980,831552994545806405,8052297456460376353,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,831552994545806405,8052297456460376353,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,831552994545806405,8052297456460376353,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,831552994545806405,8052297456460376353,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4404 /prefetch:12⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,831552994545806405,8052297456460376353,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2500
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3836
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dbac49e66219979194c79f1cf1cb3dd1
SHA14ef87804a04d51ae1fac358f92382548b27f62f2
SHA256f24ed6c5bf4b734a9af4d64e14a80a160bea569f50849f70bf7b7277c4f48562
SHA512bb314d61f53cf7774f6dfb6b772c72f5daf386bc3d27d2bb7a14c65848ee86e6c48e9c5696693ded31846b69b9372a530175df48494e3d61a228e49d43401ad1
-
Filesize
152B
MD5a9e55f5864d6e2afd2fd84e25a3bc228
SHA1a5efcff9e3df6252c7fe8535d505235f82aab276
SHA2560f4df3120e4620555916be8e51c29be8d600d68ae5244efad6a0268aabc8c452
SHA51212f45fa73a6de6dfe17acc8b52b60f2d79008da130730b74cc138c1dcd73ccc99487165e3c8c90dc247359fde272f1ec6b3cf2c5fcb04e5093936144d0558b75
-
Filesize
6KB
MD5178b0eb45aee4434b56310aa7d46904a
SHA15a003a3b81485243b093582db4bbfae4e03cc12b
SHA25649bcf83431d8b4e29011626eeda9ea0565c727947c9cebd287e33a8937972180
SHA51253d7573e3327aeb774b5a982a9d2293b61861f65e371115c3d560d0433ddfac53d65126fa4e5c6cce699617464c49fcaa67faaf6c272db0514447c5f59066336
-
Filesize
8KB
MD555c18615b22c52079c3a818363323ef0
SHA108cfec9d946da0f04552cb356992838f1709f2c6
SHA2560bd0484f96a1e7ee9e2176c6d23acc24a0b9ede4c197b18dee1e50253128dd7b
SHA512b99b2e7308053bccfd405736733090594f4c44fdfb493457b61bc61004e8cb448da0bcd7d705d40e3a2d69228ef5127b94ebdf8d37410511bd8ad1ffc565806e