Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
29/04/2024, 16:08
Static task
static1
Behavioral task
behavioral1
Sample
081179dd6684c2d1fec74085dae7841e_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
081179dd6684c2d1fec74085dae7841e_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
081179dd6684c2d1fec74085dae7841e_JaffaCakes118.html
-
Size
175KB
-
MD5
081179dd6684c2d1fec74085dae7841e
-
SHA1
125eb029005ad13fcf6b1e88ce2d0b4a15d1d949
-
SHA256
bd34f8c06a4d4ca6e02f534318ce8924f3df20cbc309764b34b3a1f32c25782d
-
SHA512
8ad8390507ab0eac7a552c6988756ad7d16c299765e25d2126e041882bcea6c6c4f5b0a146cf656d478e5e53672d1cf8556aa08e8163b235491d625f5a4cd25f
-
SSDEEP
1536:SqtH8gd8Wu8pI8Cd8hd8dQgbH//WoS3jGNkF5YfBCJiZZ+aeTH+WK/Lf1/hpnVSV:S9CT3j/FcBCJiwB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2824 msedge.exe 2824 msedge.exe 1644 msedge.exe 1644 msedge.exe 3628 identity_helper.exe 3628 identity_helper.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1644 wrote to memory of 1468 1644 msedge.exe 84 PID 1644 wrote to memory of 1468 1644 msedge.exe 84 PID 1644 wrote to memory of 4016 1644 msedge.exe 85 PID 1644 wrote to memory of 4016 1644 msedge.exe 85 PID 1644 wrote to memory of 4016 1644 msedge.exe 85 PID 1644 wrote to memory of 4016 1644 msedge.exe 85 PID 1644 wrote to memory of 4016 1644 msedge.exe 85 PID 1644 wrote to memory of 4016 1644 msedge.exe 85 PID 1644 wrote to memory of 4016 1644 msedge.exe 85 PID 1644 wrote to memory of 4016 1644 msedge.exe 85 PID 1644 wrote to memory of 4016 1644 msedge.exe 85 PID 1644 wrote to memory of 4016 1644 msedge.exe 85 PID 1644 wrote to memory of 4016 1644 msedge.exe 85 PID 1644 wrote to memory of 4016 1644 msedge.exe 85 PID 1644 wrote to memory of 4016 1644 msedge.exe 85 PID 1644 wrote to memory of 4016 1644 msedge.exe 85 PID 1644 wrote to memory of 4016 1644 msedge.exe 85 PID 1644 wrote to memory of 4016 1644 msedge.exe 85 PID 1644 wrote to memory of 4016 1644 msedge.exe 85 PID 1644 wrote to memory of 4016 1644 msedge.exe 85 PID 1644 wrote to memory of 4016 1644 msedge.exe 85 PID 1644 wrote to memory of 4016 1644 msedge.exe 85 PID 1644 wrote to memory of 4016 1644 msedge.exe 85 PID 1644 wrote to memory of 4016 1644 msedge.exe 85 PID 1644 wrote to memory of 4016 1644 msedge.exe 85 PID 1644 wrote to memory of 4016 1644 msedge.exe 85 PID 1644 wrote to memory of 4016 1644 msedge.exe 85 PID 1644 wrote to memory of 4016 1644 msedge.exe 85 PID 1644 wrote to memory of 4016 1644 msedge.exe 85 PID 1644 wrote to memory of 4016 1644 msedge.exe 85 PID 1644 wrote to memory of 4016 1644 msedge.exe 85 PID 1644 wrote to memory of 4016 1644 msedge.exe 85 PID 1644 wrote to memory of 4016 1644 msedge.exe 85 PID 1644 wrote to memory of 4016 1644 msedge.exe 85 PID 1644 wrote to memory of 4016 1644 msedge.exe 85 PID 1644 wrote to memory of 4016 1644 msedge.exe 85 PID 1644 wrote to memory of 4016 1644 msedge.exe 85 PID 1644 wrote to memory of 4016 1644 msedge.exe 85 PID 1644 wrote to memory of 4016 1644 msedge.exe 85 PID 1644 wrote to memory of 4016 1644 msedge.exe 85 PID 1644 wrote to memory of 4016 1644 msedge.exe 85 PID 1644 wrote to memory of 4016 1644 msedge.exe 85 PID 1644 wrote to memory of 2824 1644 msedge.exe 86 PID 1644 wrote to memory of 2824 1644 msedge.exe 86 PID 1644 wrote to memory of 2660 1644 msedge.exe 87 PID 1644 wrote to memory of 2660 1644 msedge.exe 87 PID 1644 wrote to memory of 2660 1644 msedge.exe 87 PID 1644 wrote to memory of 2660 1644 msedge.exe 87 PID 1644 wrote to memory of 2660 1644 msedge.exe 87 PID 1644 wrote to memory of 2660 1644 msedge.exe 87 PID 1644 wrote to memory of 2660 1644 msedge.exe 87 PID 1644 wrote to memory of 2660 1644 msedge.exe 87 PID 1644 wrote to memory of 2660 1644 msedge.exe 87 PID 1644 wrote to memory of 2660 1644 msedge.exe 87 PID 1644 wrote to memory of 2660 1644 msedge.exe 87 PID 1644 wrote to memory of 2660 1644 msedge.exe 87 PID 1644 wrote to memory of 2660 1644 msedge.exe 87 PID 1644 wrote to memory of 2660 1644 msedge.exe 87 PID 1644 wrote to memory of 2660 1644 msedge.exe 87 PID 1644 wrote to memory of 2660 1644 msedge.exe 87 PID 1644 wrote to memory of 2660 1644 msedge.exe 87 PID 1644 wrote to memory of 2660 1644 msedge.exe 87 PID 1644 wrote to memory of 2660 1644 msedge.exe 87 PID 1644 wrote to memory of 2660 1644 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\081179dd6684c2d1fec74085dae7841e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffca55546f8,0x7ffca5554708,0x7ffca55547182⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2240,206610690996510377,5707221942244681048,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2272 /prefetch:22⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2240,206610690996510377,5707221942244681048,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2240,206610690996510377,5707221942244681048,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:2660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,206610690996510377,5707221942244681048,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,206610690996510377,5707221942244681048,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,206610690996510377,5707221942244681048,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4328 /prefetch:12⤵PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,206610690996510377,5707221942244681048,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4892 /prefetch:12⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2240,206610690996510377,5707221942244681048,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 /prefetch:82⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2240,206610690996510377,5707221942244681048,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,206610690996510377,5707221942244681048,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:12⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,206610690996510377,5707221942244681048,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,206610690996510377,5707221942244681048,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,206610690996510377,5707221942244681048,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2240,206610690996510377,5707221942244681048,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1740 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2352
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4984
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3164
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52a70f1bd4da893a67660d6432970788d
SHA1ddf4047e0d468f56ea0c0d8ff078a86a0bb62873
SHA256c550af5ba51f68ac4d18747edc5dea1a655dd212d84bad1e6168ba7a97745561
SHA51226b9a365e77df032fc5c461d85d1ba313eafead38827190608c6537ec12b2dfdbed4e1705bfd1e61899034791ad6fa88ea7490c3a48cdaec4d04cd0577b11343
-
Filesize
152B
MD5fbe1ce4d182aaffb80de94263be1dd35
SHA1bc6c9827aa35a136a7d79be9e606ff359e2ac3ea
SHA2560021f72dbca789f179762b0e17c28fe0b93a12539b08294800e47469905aeb51
SHA5123fb0a3b38e7d4a30f5560594b1d14e6e58419e274255fb68dfe0ca897aa181f9ce8cb2048403f851fd36a17b0e34d272d03927769d41a500b2fe64806354902f
-
Filesize
6KB
MD5aee49523acd03e7ec030e2e532132cee
SHA179836cc0fa62873efc25f1a8e7fba05bd947d6c2
SHA2568bd2732fdb9556c3f4df7380cafc0317e078ee67a0feb448b3d7be651df458f3
SHA5121fc9a5a2e3464df60c4ad745328d60c41ad64d39aa23de057d9d3538b27d48d20f7e962457c7a74b73da6bcf22b673bed0eac86bc789c9248df711ea48dc5278
-
Filesize
6KB
MD508412a8376836314f0311ed67357f9f5
SHA19de9294b2a26db5415244bdc61b26a3d51abe9e2
SHA256dc26ccc077764fa75fbd5cb003f18ce12d9b074a0c3c27c42d3fb79407507aea
SHA5120353a59f4219a01e38993fe7e79df833d039dc0e7a6e97ac7268db4315dd8c1630e53dab3c5cad6f2c5798242c906f1e6efa6895f85b11da18af1d25902ce81d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5f493862fc6a9e0794c46c68f71ecdd92
SHA160a5cd40802661763882beeecae17a104660f68d
SHA25672a948e7ccaa08104d2a081223b9e342c4aed0cc0d73a0e4a8c85d6bfb91e343
SHA5129509e6b0794216e6e66ccfab2530ce50c960e80781622276f0b5a31392c13dac9942f80f5e0a6bb883176966fbb18c171877d57de67b51af98b8f72d3ef08de2