Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
29-04-2024 17:16
Static task
static1
Behavioral task
behavioral1
Sample
0832347c3e0ae5e9e9c9cfae0c72a5bd_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
0832347c3e0ae5e9e9c9cfae0c72a5bd_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0832347c3e0ae5e9e9c9cfae0c72a5bd_JaffaCakes118.html
-
Size
122KB
-
MD5
0832347c3e0ae5e9e9c9cfae0c72a5bd
-
SHA1
ad4fb211f4b2005320965c31466d3fd9d36acd87
-
SHA256
70c6df651b35fafdab145a4d9762cf5dccceaf0d0636756a5de6c0c620ffbc63
-
SHA512
f272a4057cbe510ccede564e0a53cfc9543b3e85ca9e35b68be4e57dde5f2c7aba0c917f095eb87bc976d3c13352338ceeffda1d8069b0234cc384f3b2882163
-
SSDEEP
1536:STl9fyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGL:STlVyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3340 msedge.exe 3340 msedge.exe 3440 msedge.exe 3440 msedge.exe 4188 identity_helper.exe 4188 identity_helper.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3440 wrote to memory of 1428 3440 msedge.exe 84 PID 3440 wrote to memory of 1428 3440 msedge.exe 84 PID 3440 wrote to memory of 4840 3440 msedge.exe 85 PID 3440 wrote to memory of 4840 3440 msedge.exe 85 PID 3440 wrote to memory of 4840 3440 msedge.exe 85 PID 3440 wrote to memory of 4840 3440 msedge.exe 85 PID 3440 wrote to memory of 4840 3440 msedge.exe 85 PID 3440 wrote to memory of 4840 3440 msedge.exe 85 PID 3440 wrote to memory of 4840 3440 msedge.exe 85 PID 3440 wrote to memory of 4840 3440 msedge.exe 85 PID 3440 wrote to memory of 4840 3440 msedge.exe 85 PID 3440 wrote to memory of 4840 3440 msedge.exe 85 PID 3440 wrote to memory of 4840 3440 msedge.exe 85 PID 3440 wrote to memory of 4840 3440 msedge.exe 85 PID 3440 wrote to memory of 4840 3440 msedge.exe 85 PID 3440 wrote to memory of 4840 3440 msedge.exe 85 PID 3440 wrote to memory of 4840 3440 msedge.exe 85 PID 3440 wrote to memory of 4840 3440 msedge.exe 85 PID 3440 wrote to memory of 4840 3440 msedge.exe 85 PID 3440 wrote to memory of 4840 3440 msedge.exe 85 PID 3440 wrote to memory of 4840 3440 msedge.exe 85 PID 3440 wrote to memory of 4840 3440 msedge.exe 85 PID 3440 wrote to memory of 4840 3440 msedge.exe 85 PID 3440 wrote to memory of 4840 3440 msedge.exe 85 PID 3440 wrote to memory of 4840 3440 msedge.exe 85 PID 3440 wrote to memory of 4840 3440 msedge.exe 85 PID 3440 wrote to memory of 4840 3440 msedge.exe 85 PID 3440 wrote to memory of 4840 3440 msedge.exe 85 PID 3440 wrote to memory of 4840 3440 msedge.exe 85 PID 3440 wrote to memory of 4840 3440 msedge.exe 85 PID 3440 wrote to memory of 4840 3440 msedge.exe 85 PID 3440 wrote to memory of 4840 3440 msedge.exe 85 PID 3440 wrote to memory of 4840 3440 msedge.exe 85 PID 3440 wrote to memory of 4840 3440 msedge.exe 85 PID 3440 wrote to memory of 4840 3440 msedge.exe 85 PID 3440 wrote to memory of 4840 3440 msedge.exe 85 PID 3440 wrote to memory of 4840 3440 msedge.exe 85 PID 3440 wrote to memory of 4840 3440 msedge.exe 85 PID 3440 wrote to memory of 4840 3440 msedge.exe 85 PID 3440 wrote to memory of 4840 3440 msedge.exe 85 PID 3440 wrote to memory of 4840 3440 msedge.exe 85 PID 3440 wrote to memory of 4840 3440 msedge.exe 85 PID 3440 wrote to memory of 3340 3440 msedge.exe 86 PID 3440 wrote to memory of 3340 3440 msedge.exe 86 PID 3440 wrote to memory of 1620 3440 msedge.exe 87 PID 3440 wrote to memory of 1620 3440 msedge.exe 87 PID 3440 wrote to memory of 1620 3440 msedge.exe 87 PID 3440 wrote to memory of 1620 3440 msedge.exe 87 PID 3440 wrote to memory of 1620 3440 msedge.exe 87 PID 3440 wrote to memory of 1620 3440 msedge.exe 87 PID 3440 wrote to memory of 1620 3440 msedge.exe 87 PID 3440 wrote to memory of 1620 3440 msedge.exe 87 PID 3440 wrote to memory of 1620 3440 msedge.exe 87 PID 3440 wrote to memory of 1620 3440 msedge.exe 87 PID 3440 wrote to memory of 1620 3440 msedge.exe 87 PID 3440 wrote to memory of 1620 3440 msedge.exe 87 PID 3440 wrote to memory of 1620 3440 msedge.exe 87 PID 3440 wrote to memory of 1620 3440 msedge.exe 87 PID 3440 wrote to memory of 1620 3440 msedge.exe 87 PID 3440 wrote to memory of 1620 3440 msedge.exe 87 PID 3440 wrote to memory of 1620 3440 msedge.exe 87 PID 3440 wrote to memory of 1620 3440 msedge.exe 87 PID 3440 wrote to memory of 1620 3440 msedge.exe 87 PID 3440 wrote to memory of 1620 3440 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0832347c3e0ae5e9e9c9cfae0c72a5bd_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff891b046f8,0x7ff891b04708,0x7ff891b047182⤵PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,1320201842234976541,5897788859940960230,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2240 /prefetch:22⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2220,1320201842234976541,5897788859940960230,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2220,1320201842234976541,5897788859940960230,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2560 /prefetch:82⤵PID:1620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,1320201842234976541,5897788859940960230,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,1320201842234976541,5897788859940960230,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,1320201842234976541,5897788859940960230,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4936 /prefetch:82⤵PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,1320201842234976541,5897788859940960230,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4936 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,1320201842234976541,5897788859940960230,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:12⤵PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,1320201842234976541,5897788859940960230,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:12⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,1320201842234976541,5897788859940960230,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,1320201842234976541,5897788859940960230,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,1320201842234976541,5897788859940960230,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1132 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4364
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2916
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
Filesize
6KB
MD5cebd6e854956952788a4a2c35cd52c6e
SHA1968ca14fc7518bfc8ac7020aa0f212e557c11be4
SHA2563496144b2d738f2f377d05bcc072261f8081650b2737e323fd042a094ed41a56
SHA512f269bb6b3b83035b1010a058c580ab7fed55411113e766082c5d807d36b1dd9d5212a5075941ee16b5cf956a688aaf25da95537a1e414b7bcd31e4211d521761
-
Filesize
6KB
MD5d4617a64e26ed030e1b931efd1a5c3f4
SHA1ff2e8a20810ba07e4cd64c61c6737605022fd6d3
SHA256353f79d84dd82c24cbf32b2bf47ab5cbb281e2118c62f3030dde371c918f2a0a
SHA51272a6ede33683fadc3f9006e9304d8fcc1b406e4813b16498b8946809e7c7cf76d478ef28dc495ae1bfcaf8ff7d1d2af485f3721f673bc30957cc0711a2b876ad
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5d045e7e963e5e03d0b787c463e1f5057
SHA1a68b64062e75b1328a8a8f5e134205728c14835e
SHA256546ac1876a043ba66f7571d996c21bf1d69d132d217e518e3fede834d2775c5f
SHA51296d93a3348044018506b0973e870432e06a1a4b2df9ba39a3db1654e0b114b376ad57c1d5c699dc0d64793bbd345170488c70bd4e8495d57fccf8383bf2d0033