Analysis
-
max time kernel
148s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
03/05/2024, 15:18
Static task
static1
Behavioral task
behavioral1
Sample
10d33784a45ba7b69678878c918be353_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
10d33784a45ba7b69678878c918be353_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
10d33784a45ba7b69678878c918be353_JaffaCakes118.html
-
Size
4KB
-
MD5
10d33784a45ba7b69678878c918be353
-
SHA1
724e2a65ae5ec36c0045742406038ef0292aca22
-
SHA256
0f03ed1f99230f4ca770d9144d74fb4076b2e60b8ceb3feaaebcd9130ca51886
-
SHA512
5dd5e160abd084789aedc1721dc3eca79ee76a80c30cc857d57fd2e3ad5c34ea542856e6c15defc242f3ee2e63f6624139f017467a2f22775148cfa83d88c7cf
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oykoVhd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDP
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2464 msedge.exe 2464 msedge.exe 532 msedge.exe 532 msedge.exe 3672 identity_helper.exe 3672 identity_helper.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 532 wrote to memory of 1500 532 msedge.exe 84 PID 532 wrote to memory of 1500 532 msedge.exe 84 PID 532 wrote to memory of 3648 532 msedge.exe 86 PID 532 wrote to memory of 3648 532 msedge.exe 86 PID 532 wrote to memory of 3648 532 msedge.exe 86 PID 532 wrote to memory of 3648 532 msedge.exe 86 PID 532 wrote to memory of 3648 532 msedge.exe 86 PID 532 wrote to memory of 3648 532 msedge.exe 86 PID 532 wrote to memory of 3648 532 msedge.exe 86 PID 532 wrote to memory of 3648 532 msedge.exe 86 PID 532 wrote to memory of 3648 532 msedge.exe 86 PID 532 wrote to memory of 3648 532 msedge.exe 86 PID 532 wrote to memory of 3648 532 msedge.exe 86 PID 532 wrote to memory of 3648 532 msedge.exe 86 PID 532 wrote to memory of 3648 532 msedge.exe 86 PID 532 wrote to memory of 3648 532 msedge.exe 86 PID 532 wrote to memory of 3648 532 msedge.exe 86 PID 532 wrote to memory of 3648 532 msedge.exe 86 PID 532 wrote to memory of 3648 532 msedge.exe 86 PID 532 wrote to memory of 3648 532 msedge.exe 86 PID 532 wrote to memory of 3648 532 msedge.exe 86 PID 532 wrote to memory of 3648 532 msedge.exe 86 PID 532 wrote to memory of 3648 532 msedge.exe 86 PID 532 wrote to memory of 3648 532 msedge.exe 86 PID 532 wrote to memory of 3648 532 msedge.exe 86 PID 532 wrote to memory of 3648 532 msedge.exe 86 PID 532 wrote to memory of 3648 532 msedge.exe 86 PID 532 wrote to memory of 3648 532 msedge.exe 86 PID 532 wrote to memory of 3648 532 msedge.exe 86 PID 532 wrote to memory of 3648 532 msedge.exe 86 PID 532 wrote to memory of 3648 532 msedge.exe 86 PID 532 wrote to memory of 3648 532 msedge.exe 86 PID 532 wrote to memory of 3648 532 msedge.exe 86 PID 532 wrote to memory of 3648 532 msedge.exe 86 PID 532 wrote to memory of 3648 532 msedge.exe 86 PID 532 wrote to memory of 3648 532 msedge.exe 86 PID 532 wrote to memory of 3648 532 msedge.exe 86 PID 532 wrote to memory of 3648 532 msedge.exe 86 PID 532 wrote to memory of 3648 532 msedge.exe 86 PID 532 wrote to memory of 3648 532 msedge.exe 86 PID 532 wrote to memory of 3648 532 msedge.exe 86 PID 532 wrote to memory of 3648 532 msedge.exe 86 PID 532 wrote to memory of 2464 532 msedge.exe 87 PID 532 wrote to memory of 2464 532 msedge.exe 87 PID 532 wrote to memory of 2984 532 msedge.exe 88 PID 532 wrote to memory of 2984 532 msedge.exe 88 PID 532 wrote to memory of 2984 532 msedge.exe 88 PID 532 wrote to memory of 2984 532 msedge.exe 88 PID 532 wrote to memory of 2984 532 msedge.exe 88 PID 532 wrote to memory of 2984 532 msedge.exe 88 PID 532 wrote to memory of 2984 532 msedge.exe 88 PID 532 wrote to memory of 2984 532 msedge.exe 88 PID 532 wrote to memory of 2984 532 msedge.exe 88 PID 532 wrote to memory of 2984 532 msedge.exe 88 PID 532 wrote to memory of 2984 532 msedge.exe 88 PID 532 wrote to memory of 2984 532 msedge.exe 88 PID 532 wrote to memory of 2984 532 msedge.exe 88 PID 532 wrote to memory of 2984 532 msedge.exe 88 PID 532 wrote to memory of 2984 532 msedge.exe 88 PID 532 wrote to memory of 2984 532 msedge.exe 88 PID 532 wrote to memory of 2984 532 msedge.exe 88 PID 532 wrote to memory of 2984 532 msedge.exe 88 PID 532 wrote to memory of 2984 532 msedge.exe 88 PID 532 wrote to memory of 2984 532 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\10d33784a45ba7b69678878c918be353_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd6d7e46f8,0x7ffd6d7e4708,0x7ffd6d7e47182⤵PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,15427771194939140756,3408314793382516248,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,15427771194939140756,3408314793382516248,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2504 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,15427771194939140756,3408314793382516248,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,15427771194939140756,3408314793382516248,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,15427771194939140756,3408314793382516248,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:1340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,15427771194939140756,3408314793382516248,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:82⤵PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,15427771194939140756,3408314793382516248,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,15427771194939140756,3408314793382516248,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:1368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,15427771194939140756,3408314793382516248,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,15427771194939140756,3408314793382516248,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4092 /prefetch:12⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,15427771194939140756,3408314793382516248,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,15427771194939140756,3408314793382516248,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3012 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4200
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4756
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1360
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\3b900951-2fc6-412a-9859-1e2caa75b4b8.tmp
Filesize6KB
MD5ab00f3a27f9aa5cd47b735aa927989c1
SHA17774d30a8c61ccda050f07c63278f9cacf8c3020
SHA256e3d19c5086eaaf90ad9aa70956e0d919c1d0223ec98ac17508305b17b78f2274
SHA512f3703674c564ac4362a69fc07929917543428fcf5a9a5d5d6ab90e33ff93782229faba462c0c168e986c8626ff4b6c89a6f3adaa54e5370280a4e11259902256
-
Filesize
292B
MD51c6eb9052bf26daaf198f62d09e33ce8
SHA19ffaac57d50b1072aa39d53e7442ccd73e1f8a46
SHA25646842fc337c052df72d22a21b34b061c498e603239ee7049e3f9c9a812e7152d
SHA5125b6b4fe584d9f3073195752276e73435d7cf424ae6d431d74bbd465c347f835cbdbc143783d99cb611884814500ecd7309afcdef35895630c9c485ac3663105a
-
Filesize
6KB
MD552fd942db9ee1bd8a96e258be8125230
SHA179f7024657725e216c61cf718b147efcc519e1d5
SHA256424d3894ba31872ed0d448b471841a4ec482980a38065561e762eb0dd2f733d7
SHA512fa9c3fbdad79adb8a4b347f525b9d15024b96ab488ebabddf1e11cf2790335c93535b16759e8de64850e01257f95c8e46d2b0e85d84b40df47eb01989f65b5be
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b5035a46159405595f02531d50da5c43
SHA1aa1e2338920ed702c331cd9ee21489adf45a51be
SHA256f1cf2f5215e7ce6b22ac43a923c45ab507887eeff3e8f61c6a972bbf07a748f8
SHA512e0f685ae62dd699291cd90af054828ce7ba8ffdabb0dc8af65a6042f3ecba859d9467ddfb5b42bde4e02092905cc8a24c6daade0d607d021f3919254a896a921