Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30-04-2024 22:50
Static task
static1
Behavioral task
behavioral1
Sample
0a9736f07e1a8c4f3f10ad40b618e562_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0a9736f07e1a8c4f3f10ad40b618e562_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
0a9736f07e1a8c4f3f10ad40b618e562_JaffaCakes118.html
-
Size
35KB
-
MD5
0a9736f07e1a8c4f3f10ad40b618e562
-
SHA1
10db820fbdcae66a9acf7dea0a87ca32fca82375
-
SHA256
bb2cf2056d62c557ca20f4584ac67761786c64212a7b22c195cc548add567803
-
SHA512
ef194ba9f386a43ed6464c95f34898f2c5f4ebe0cb2452df54b4232da97323cc8fef2b7731328d9cbdb363565b4165fbae609e5833f964658fa17919c8c3035c
-
SSDEEP
768:zwx/MDTHxp88hARBZPXME1XnXrFLxNLlDNoPqkPTHlnkM3Gr6T/uJxF6lJtxU6lI:Q/vbJxNV4u0Sx/x87K
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2000 msedge.exe 2000 msedge.exe 2452 msedge.exe 2452 msedge.exe 3036 identity_helper.exe 3036 identity_helper.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2452 wrote to memory of 2448 2452 msedge.exe 82 PID 2452 wrote to memory of 2448 2452 msedge.exe 82 PID 2452 wrote to memory of 4436 2452 msedge.exe 83 PID 2452 wrote to memory of 4436 2452 msedge.exe 83 PID 2452 wrote to memory of 4436 2452 msedge.exe 83 PID 2452 wrote to memory of 4436 2452 msedge.exe 83 PID 2452 wrote to memory of 4436 2452 msedge.exe 83 PID 2452 wrote to memory of 4436 2452 msedge.exe 83 PID 2452 wrote to memory of 4436 2452 msedge.exe 83 PID 2452 wrote to memory of 4436 2452 msedge.exe 83 PID 2452 wrote to memory of 4436 2452 msedge.exe 83 PID 2452 wrote to memory of 4436 2452 msedge.exe 83 PID 2452 wrote to memory of 4436 2452 msedge.exe 83 PID 2452 wrote to memory of 4436 2452 msedge.exe 83 PID 2452 wrote to memory of 4436 2452 msedge.exe 83 PID 2452 wrote to memory of 4436 2452 msedge.exe 83 PID 2452 wrote to memory of 4436 2452 msedge.exe 83 PID 2452 wrote to memory of 4436 2452 msedge.exe 83 PID 2452 wrote to memory of 4436 2452 msedge.exe 83 PID 2452 wrote to memory of 4436 2452 msedge.exe 83 PID 2452 wrote to memory of 4436 2452 msedge.exe 83 PID 2452 wrote to memory of 4436 2452 msedge.exe 83 PID 2452 wrote to memory of 4436 2452 msedge.exe 83 PID 2452 wrote to memory of 4436 2452 msedge.exe 83 PID 2452 wrote to memory of 4436 2452 msedge.exe 83 PID 2452 wrote to memory of 4436 2452 msedge.exe 83 PID 2452 wrote to memory of 4436 2452 msedge.exe 83 PID 2452 wrote to memory of 4436 2452 msedge.exe 83 PID 2452 wrote to memory of 4436 2452 msedge.exe 83 PID 2452 wrote to memory of 4436 2452 msedge.exe 83 PID 2452 wrote to memory of 4436 2452 msedge.exe 83 PID 2452 wrote to memory of 4436 2452 msedge.exe 83 PID 2452 wrote to memory of 4436 2452 msedge.exe 83 PID 2452 wrote to memory of 4436 2452 msedge.exe 83 PID 2452 wrote to memory of 4436 2452 msedge.exe 83 PID 2452 wrote to memory of 4436 2452 msedge.exe 83 PID 2452 wrote to memory of 4436 2452 msedge.exe 83 PID 2452 wrote to memory of 4436 2452 msedge.exe 83 PID 2452 wrote to memory of 4436 2452 msedge.exe 83 PID 2452 wrote to memory of 4436 2452 msedge.exe 83 PID 2452 wrote to memory of 4436 2452 msedge.exe 83 PID 2452 wrote to memory of 4436 2452 msedge.exe 83 PID 2452 wrote to memory of 2000 2452 msedge.exe 84 PID 2452 wrote to memory of 2000 2452 msedge.exe 84 PID 2452 wrote to memory of 4808 2452 msedge.exe 85 PID 2452 wrote to memory of 4808 2452 msedge.exe 85 PID 2452 wrote to memory of 4808 2452 msedge.exe 85 PID 2452 wrote to memory of 4808 2452 msedge.exe 85 PID 2452 wrote to memory of 4808 2452 msedge.exe 85 PID 2452 wrote to memory of 4808 2452 msedge.exe 85 PID 2452 wrote to memory of 4808 2452 msedge.exe 85 PID 2452 wrote to memory of 4808 2452 msedge.exe 85 PID 2452 wrote to memory of 4808 2452 msedge.exe 85 PID 2452 wrote to memory of 4808 2452 msedge.exe 85 PID 2452 wrote to memory of 4808 2452 msedge.exe 85 PID 2452 wrote to memory of 4808 2452 msedge.exe 85 PID 2452 wrote to memory of 4808 2452 msedge.exe 85 PID 2452 wrote to memory of 4808 2452 msedge.exe 85 PID 2452 wrote to memory of 4808 2452 msedge.exe 85 PID 2452 wrote to memory of 4808 2452 msedge.exe 85 PID 2452 wrote to memory of 4808 2452 msedge.exe 85 PID 2452 wrote to memory of 4808 2452 msedge.exe 85 PID 2452 wrote to memory of 4808 2452 msedge.exe 85 PID 2452 wrote to memory of 4808 2452 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0a9736f07e1a8c4f3f10ad40b618e562_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffadc1246f8,0x7ffadc124708,0x7ffadc1247182⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,16694230119409229245,18205268124048159484,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2000 /prefetch:22⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,16694230119409229245,18205268124048159484,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,16694230119409229245,18205268124048159484,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2948 /prefetch:82⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16694230119409229245,18205268124048159484,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3128 /prefetch:12⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16694230119409229245,18205268124048159484,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3140 /prefetch:12⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,16694230119409229245,18205268124048159484,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5472 /prefetch:82⤵PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,16694230119409229245,18205268124048159484,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5472 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16694230119409229245,18205268124048159484,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16694230119409229245,18205268124048159484,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4212 /prefetch:12⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16694230119409229245,18205268124048159484,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4248 /prefetch:12⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16694230119409229245,18205268124048159484,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4260 /prefetch:12⤵PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,16694230119409229245,18205268124048159484,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5024 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2480
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:376
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
614B
MD5d2f560e965db53b79d6363bf55cb3372
SHA12913e1390dedd76fa937e20ab39a209dc492cb4f
SHA2563befabb6092c6f32e4734e0574988bdd412f971ed8dc5784c4e808f010f1533f
SHA512f40eaa65759668984a60f1ae6911ff0f5acf4596ca3007f17e82326bb9cfe630fb0db829fcd2bc30a57cbe0984e0537b0d0091be1b43bc99fa3ea2c6b348d501
-
Filesize
6KB
MD576bdd910947a52959131af4d79684b6b
SHA1fd4e8d6a6da0ff24cba1edc2b44c703fcf341117
SHA256fc21acee04b0cbd922d28e41e54b0441f62e2c13d339270c0d505bdbf7258107
SHA51226eacd13038bd1392a2df70374a7d1f25a7241c264e91ed963d6ddb473eac6789bedf8507c3dfff10bb853ed7983fd1faf01c6a1391cc297ede3d10f361e4993
-
Filesize
6KB
MD5757aec646f29c57969211c0d9c9ffbfb
SHA1b2e1dd61c9bb0ef02c4a4ead21e5a72c2d158420
SHA2568882a9904a2b847974c939e638a904d89a12122594ce135245b4bfae9912dce5
SHA5127583539093770c5b71255e4a78f1bc33906277b0b202a975dc477f6028c132e8e9f29e934f8af50f5081b4f911099e0a33fdffb827096458a9ef03e434799604
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5d5609b7595bd23d82cd66e66b3425569
SHA1baa1a33245d6c3205e49d67dc921e454346994a6
SHA2562a7c549fa44a8d04765ad0a4d31f282a7e5f3c3ec436910c39619dbe0ab6a9a3
SHA512c5e0f088f7c436c121dedf776ef92572c3e2d2121323bc825d8636e9cede1d9d00ef7d0425d27d96ceb9cd1d0562bf4d8168d4284c110e9bec7df0e50c781d9a