Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2024, 07:07
Static task
static1
Behavioral task
behavioral1
Sample
119df4a0dbfadac29bcfa4db38ee2512_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
119df4a0dbfadac29bcfa4db38ee2512_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
119df4a0dbfadac29bcfa4db38ee2512_JaffaCakes118.html
-
Size
36KB
-
MD5
119df4a0dbfadac29bcfa4db38ee2512
-
SHA1
c0a60e059a71ff0622f0239a2c159dc16dce3703
-
SHA256
229fcfe28b80d468764531018ee36bf0d9219612d07650e4cce5218c1b66af63
-
SHA512
b8e13ecbffe8eca94799426662dbf7894e7e4e069fc7b8f2fb4a73b95b4f81282d3c0f4fd92b1f0b183082f7e32801a633104ed873efca46dc8a66de8238c727
-
SSDEEP
768:zwx/MDTH+g88hARuZPXlE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6Tbii6cL36OxJy6X:Q/PbJxNVNu6Sr/k8QK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5008 msedge.exe 5008 msedge.exe 60 msedge.exe 60 msedge.exe 4484 identity_helper.exe 4484 identity_helper.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe 60 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 60 wrote to memory of 3596 60 msedge.exe 83 PID 60 wrote to memory of 3596 60 msedge.exe 83 PID 60 wrote to memory of 4632 60 msedge.exe 84 PID 60 wrote to memory of 4632 60 msedge.exe 84 PID 60 wrote to memory of 4632 60 msedge.exe 84 PID 60 wrote to memory of 4632 60 msedge.exe 84 PID 60 wrote to memory of 4632 60 msedge.exe 84 PID 60 wrote to memory of 4632 60 msedge.exe 84 PID 60 wrote to memory of 4632 60 msedge.exe 84 PID 60 wrote to memory of 4632 60 msedge.exe 84 PID 60 wrote to memory of 4632 60 msedge.exe 84 PID 60 wrote to memory of 4632 60 msedge.exe 84 PID 60 wrote to memory of 4632 60 msedge.exe 84 PID 60 wrote to memory of 4632 60 msedge.exe 84 PID 60 wrote to memory of 4632 60 msedge.exe 84 PID 60 wrote to memory of 4632 60 msedge.exe 84 PID 60 wrote to memory of 4632 60 msedge.exe 84 PID 60 wrote to memory of 4632 60 msedge.exe 84 PID 60 wrote to memory of 4632 60 msedge.exe 84 PID 60 wrote to memory of 4632 60 msedge.exe 84 PID 60 wrote to memory of 4632 60 msedge.exe 84 PID 60 wrote to memory of 4632 60 msedge.exe 84 PID 60 wrote to memory of 4632 60 msedge.exe 84 PID 60 wrote to memory of 4632 60 msedge.exe 84 PID 60 wrote to memory of 4632 60 msedge.exe 84 PID 60 wrote to memory of 4632 60 msedge.exe 84 PID 60 wrote to memory of 4632 60 msedge.exe 84 PID 60 wrote to memory of 4632 60 msedge.exe 84 PID 60 wrote to memory of 4632 60 msedge.exe 84 PID 60 wrote to memory of 4632 60 msedge.exe 84 PID 60 wrote to memory of 4632 60 msedge.exe 84 PID 60 wrote to memory of 4632 60 msedge.exe 84 PID 60 wrote to memory of 4632 60 msedge.exe 84 PID 60 wrote to memory of 4632 60 msedge.exe 84 PID 60 wrote to memory of 4632 60 msedge.exe 84 PID 60 wrote to memory of 4632 60 msedge.exe 84 PID 60 wrote to memory of 4632 60 msedge.exe 84 PID 60 wrote to memory of 4632 60 msedge.exe 84 PID 60 wrote to memory of 4632 60 msedge.exe 84 PID 60 wrote to memory of 4632 60 msedge.exe 84 PID 60 wrote to memory of 4632 60 msedge.exe 84 PID 60 wrote to memory of 4632 60 msedge.exe 84 PID 60 wrote to memory of 5008 60 msedge.exe 85 PID 60 wrote to memory of 5008 60 msedge.exe 85 PID 60 wrote to memory of 4492 60 msedge.exe 86 PID 60 wrote to memory of 4492 60 msedge.exe 86 PID 60 wrote to memory of 4492 60 msedge.exe 86 PID 60 wrote to memory of 4492 60 msedge.exe 86 PID 60 wrote to memory of 4492 60 msedge.exe 86 PID 60 wrote to memory of 4492 60 msedge.exe 86 PID 60 wrote to memory of 4492 60 msedge.exe 86 PID 60 wrote to memory of 4492 60 msedge.exe 86 PID 60 wrote to memory of 4492 60 msedge.exe 86 PID 60 wrote to memory of 4492 60 msedge.exe 86 PID 60 wrote to memory of 4492 60 msedge.exe 86 PID 60 wrote to memory of 4492 60 msedge.exe 86 PID 60 wrote to memory of 4492 60 msedge.exe 86 PID 60 wrote to memory of 4492 60 msedge.exe 86 PID 60 wrote to memory of 4492 60 msedge.exe 86 PID 60 wrote to memory of 4492 60 msedge.exe 86 PID 60 wrote to memory of 4492 60 msedge.exe 86 PID 60 wrote to memory of 4492 60 msedge.exe 86 PID 60 wrote to memory of 4492 60 msedge.exe 86 PID 60 wrote to memory of 4492 60 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\119df4a0dbfadac29bcfa4db38ee2512_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8930846f8,0x7ff893084708,0x7ff8930847182⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,6863967299429109530,10042770717710755796,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,6863967299429109530,10042770717710755796,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,6863967299429109530,10042770717710755796,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,6863967299429109530,10042770717710755796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,6863967299429109530,10042770717710755796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,6863967299429109530,10042770717710755796,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:82⤵PID:2628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,6863967299429109530,10042770717710755796,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,6863967299429109530,10042770717710755796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,6863967299429109530,10042770717710755796,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,6863967299429109530,10042770717710755796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,6863967299429109530,10042770717710755796,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,6863967299429109530,10042770717710755796,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3924 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1544
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3936
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
614B
MD506b7a0adc6e982751eb4021c6630ef86
SHA1b27bb7f8de4fb711c241ca32e60261ada778a1df
SHA256c61a43c4e08b4dffd29027ab80622cdef59d36c52996a1b9eb8c82d46cce5e59
SHA5127a10657e162ce9967754f364f3f8960431d14f1af9485f466980dd1dd88b46fbda1156f4c6b4ae1d290119e4da2320e55b7dac7bd39c5047dce1ebabb2f4062b
-
Filesize
6KB
MD5ffdd5893651f1c2df76e000e66c4e547
SHA12ba819bc701b088bcfba515fe6c04bf472ceee84
SHA256f89b46d80770ce505549c6c4543b951eb4f2d3173e2b7cec59dffadc96598102
SHA5128bf3d69a732adfb07b247cdb721f1be2b15b3ffc21f8bfd23bb9c123d504ac0ee08d5c2016ec27f671da904e76a59bd4063a412c51d05d1c276fa6bce91d3598
-
Filesize
6KB
MD53205a5d954d7250039d025b22288d1bd
SHA13fe89bb1fb52e5c5f93b7866e0424ee3186ba44e
SHA256e98392a200edfbfd8427506ad233cbfde2ad99460afbbac565d52b79debd466f
SHA512c7010832f18aff3a95a1e9cd52d05d2402327d1927452a2e0f0c71290768395ddd4fb95aed4863630a150e38668eddcf5f73358b254babe8e71e927eb59d23d1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5229401ba68240980da084d3833a7de2e
SHA18e50c63d81476567776739f381f97faa699500d7
SHA256324a223b9344b1a634555d1d500b9bf1baf12fc269e58a6e1401e8f6078928d8
SHA512ce624d65b2d33ad8cf5291644d9a3c473bf2ce93cbb766443131e236bc8fce7a1c364a0841afaf03aa2ff3786c2ea61f5dce3824f353bce34364122945ac4e18