Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
30-04-2024 13:52
Static task
static1
Behavioral task
behavioral1
Sample
09e34529fbc0057862ca05ef5caac79e_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
09e34529fbc0057862ca05ef5caac79e_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
09e34529fbc0057862ca05ef5caac79e_JaffaCakes118.html
-
Size
35KB
-
MD5
09e34529fbc0057862ca05ef5caac79e
-
SHA1
5124bb575f62c29408242adc2db2cd5f0c70645a
-
SHA256
6e00f3b16e8b3439b467d7cdec03bc62aed49839a37079a0f8c3af5d5656a12c
-
SHA512
9c9a5c76f73dca3db4e37db5dc1c7b13595b32eae8b97d00d39f93068847e6cb905f57d5fa6471272e08f95d434379877756271ae24d862b1b6a258b70aed51f
-
SSDEEP
768:zwx/MDTHtF88hAR1iZPXbjE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6TIZOf6sggf6lU:Q/VIabJxNVNu0Sx/P8NK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2892 msedge.exe 2892 msedge.exe 5008 msedge.exe 5008 msedge.exe 2464 identity_helper.exe 2464 identity_helper.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5008 wrote to memory of 780 5008 msedge.exe 83 PID 5008 wrote to memory of 780 5008 msedge.exe 83 PID 5008 wrote to memory of 3028 5008 msedge.exe 84 PID 5008 wrote to memory of 3028 5008 msedge.exe 84 PID 5008 wrote to memory of 3028 5008 msedge.exe 84 PID 5008 wrote to memory of 3028 5008 msedge.exe 84 PID 5008 wrote to memory of 3028 5008 msedge.exe 84 PID 5008 wrote to memory of 3028 5008 msedge.exe 84 PID 5008 wrote to memory of 3028 5008 msedge.exe 84 PID 5008 wrote to memory of 3028 5008 msedge.exe 84 PID 5008 wrote to memory of 3028 5008 msedge.exe 84 PID 5008 wrote to memory of 3028 5008 msedge.exe 84 PID 5008 wrote to memory of 3028 5008 msedge.exe 84 PID 5008 wrote to memory of 3028 5008 msedge.exe 84 PID 5008 wrote to memory of 3028 5008 msedge.exe 84 PID 5008 wrote to memory of 3028 5008 msedge.exe 84 PID 5008 wrote to memory of 3028 5008 msedge.exe 84 PID 5008 wrote to memory of 3028 5008 msedge.exe 84 PID 5008 wrote to memory of 3028 5008 msedge.exe 84 PID 5008 wrote to memory of 3028 5008 msedge.exe 84 PID 5008 wrote to memory of 3028 5008 msedge.exe 84 PID 5008 wrote to memory of 3028 5008 msedge.exe 84 PID 5008 wrote to memory of 3028 5008 msedge.exe 84 PID 5008 wrote to memory of 3028 5008 msedge.exe 84 PID 5008 wrote to memory of 3028 5008 msedge.exe 84 PID 5008 wrote to memory of 3028 5008 msedge.exe 84 PID 5008 wrote to memory of 3028 5008 msedge.exe 84 PID 5008 wrote to memory of 3028 5008 msedge.exe 84 PID 5008 wrote to memory of 3028 5008 msedge.exe 84 PID 5008 wrote to memory of 3028 5008 msedge.exe 84 PID 5008 wrote to memory of 3028 5008 msedge.exe 84 PID 5008 wrote to memory of 3028 5008 msedge.exe 84 PID 5008 wrote to memory of 3028 5008 msedge.exe 84 PID 5008 wrote to memory of 3028 5008 msedge.exe 84 PID 5008 wrote to memory of 3028 5008 msedge.exe 84 PID 5008 wrote to memory of 3028 5008 msedge.exe 84 PID 5008 wrote to memory of 3028 5008 msedge.exe 84 PID 5008 wrote to memory of 3028 5008 msedge.exe 84 PID 5008 wrote to memory of 3028 5008 msedge.exe 84 PID 5008 wrote to memory of 3028 5008 msedge.exe 84 PID 5008 wrote to memory of 3028 5008 msedge.exe 84 PID 5008 wrote to memory of 3028 5008 msedge.exe 84 PID 5008 wrote to memory of 2892 5008 msedge.exe 85 PID 5008 wrote to memory of 2892 5008 msedge.exe 85 PID 5008 wrote to memory of 784 5008 msedge.exe 86 PID 5008 wrote to memory of 784 5008 msedge.exe 86 PID 5008 wrote to memory of 784 5008 msedge.exe 86 PID 5008 wrote to memory of 784 5008 msedge.exe 86 PID 5008 wrote to memory of 784 5008 msedge.exe 86 PID 5008 wrote to memory of 784 5008 msedge.exe 86 PID 5008 wrote to memory of 784 5008 msedge.exe 86 PID 5008 wrote to memory of 784 5008 msedge.exe 86 PID 5008 wrote to memory of 784 5008 msedge.exe 86 PID 5008 wrote to memory of 784 5008 msedge.exe 86 PID 5008 wrote to memory of 784 5008 msedge.exe 86 PID 5008 wrote to memory of 784 5008 msedge.exe 86 PID 5008 wrote to memory of 784 5008 msedge.exe 86 PID 5008 wrote to memory of 784 5008 msedge.exe 86 PID 5008 wrote to memory of 784 5008 msedge.exe 86 PID 5008 wrote to memory of 784 5008 msedge.exe 86 PID 5008 wrote to memory of 784 5008 msedge.exe 86 PID 5008 wrote to memory of 784 5008 msedge.exe 86 PID 5008 wrote to memory of 784 5008 msedge.exe 86 PID 5008 wrote to memory of 784 5008 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\09e34529fbc0057862ca05ef5caac79e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff80ad846f8,0x7ff80ad84708,0x7ff80ad847182⤵PID:780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,15868563254897402471,16955694947324630043,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,15868563254897402471,16955694947324630043,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,15868563254897402471,16955694947324630043,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:82⤵PID:784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,15868563254897402471,16955694947324630043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,15868563254897402471,16955694947324630043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,15868563254897402471,16955694947324630043,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4912 /prefetch:82⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,15868563254897402471,16955694947324630043,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4912 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,15868563254897402471,16955694947324630043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,15868563254897402471,16955694947324630043,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:12⤵PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,15868563254897402471,16955694947324630043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:12⤵PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,15868563254897402471,16955694947324630043,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4652 /prefetch:12⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,15868563254897402471,16955694947324630043,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4484 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2488
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2724
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2596
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
Filesize
6KB
MD54fb5bc6866937c1c93cdfd49e507518c
SHA1fc289287c8cb65e8b082c44e702307dfb2748a34
SHA256c5bd4ce3ec16a84d4b96d5d4b8bebfedab2fed71201498132c39f28b7d528fb2
SHA5129923679e2e2b60a39621132e11317e5a3c7cceb4461134837563ade6bf6a95008d9196a89039a5d05f1cc869794a8aaabda99e749808213290f1db7ae0f60779
-
Filesize
6KB
MD572747fa2c0a681ac3e77447b88f39c71
SHA121dcc85a2ef3d917ae06ebbfb8194e19a79b5bac
SHA256c7808c2b904ae2ebbecee5a903ef1ea965b7043e05a1fa37ae4ba0a01c0db53f
SHA5121567f1240308be2a3da202534007e2439e80eb33af9fd4bce2ed25639ffce19ddc06730874fd39262aa7b9652112016a6d5a3d90e195034044de782117751274
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD59b1886d754f713d0d6da257fd25cb06c
SHA10028d0e9de22a7beb35ce08109a753e2bdb3c1ee
SHA25617f08f56afbbc034a7dde8a4a2ffc01ac4e37bb53b8a9682c16fc6d9ab8ac423
SHA5121e43bae42fc9e965dfa9a7d2591b682bf9f922c5c15641ca81b51a6a2202c84114468d4cac3b32f9ec29125aa3a13500adc415997a62122dc6a62c29e686d939