Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
04-05-2024 10:54
Static task
static1
Behavioral task
behavioral1
Sample
1268f15e427723f728ada4ca8d2ded79_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1268f15e427723f728ada4ca8d2ded79_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
1268f15e427723f728ada4ca8d2ded79_JaffaCakes118.html
-
Size
31KB
-
MD5
1268f15e427723f728ada4ca8d2ded79
-
SHA1
2ed2dad398d2b8f6a070ef21f8c6b99c51a67c0c
-
SHA256
8cc3206f8d0ae9c0739de5c085d04cf658b087416dccf6aa1bd54c9e3879d90b
-
SHA512
1ef56c3f8c933a410a5b7ce7bf4841774487cf4403b42e0c1fc8f5786e2c5fc0b9493d622dddbac690add787d734cf36cbc3fbeaa931bca440cd977d41355ebf
-
SSDEEP
192:uwfNb5ntunQjxn5Q/JnQieUNn5nQOkEntn/nQTbnhnQmSPx8+t1vw1DqgpD0hrqI:JQ/8Ax8+te8piaX
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3032 msedge.exe 3032 msedge.exe 3520 msedge.exe 3520 msedge.exe 4480 identity_helper.exe 4480 identity_helper.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3520 wrote to memory of 2964 3520 msedge.exe 85 PID 3520 wrote to memory of 2964 3520 msedge.exe 85 PID 3520 wrote to memory of 3692 3520 msedge.exe 86 PID 3520 wrote to memory of 3692 3520 msedge.exe 86 PID 3520 wrote to memory of 3692 3520 msedge.exe 86 PID 3520 wrote to memory of 3692 3520 msedge.exe 86 PID 3520 wrote to memory of 3692 3520 msedge.exe 86 PID 3520 wrote to memory of 3692 3520 msedge.exe 86 PID 3520 wrote to memory of 3692 3520 msedge.exe 86 PID 3520 wrote to memory of 3692 3520 msedge.exe 86 PID 3520 wrote to memory of 3692 3520 msedge.exe 86 PID 3520 wrote to memory of 3692 3520 msedge.exe 86 PID 3520 wrote to memory of 3692 3520 msedge.exe 86 PID 3520 wrote to memory of 3692 3520 msedge.exe 86 PID 3520 wrote to memory of 3692 3520 msedge.exe 86 PID 3520 wrote to memory of 3692 3520 msedge.exe 86 PID 3520 wrote to memory of 3692 3520 msedge.exe 86 PID 3520 wrote to memory of 3692 3520 msedge.exe 86 PID 3520 wrote to memory of 3692 3520 msedge.exe 86 PID 3520 wrote to memory of 3692 3520 msedge.exe 86 PID 3520 wrote to memory of 3692 3520 msedge.exe 86 PID 3520 wrote to memory of 3692 3520 msedge.exe 86 PID 3520 wrote to memory of 3692 3520 msedge.exe 86 PID 3520 wrote to memory of 3692 3520 msedge.exe 86 PID 3520 wrote to memory of 3692 3520 msedge.exe 86 PID 3520 wrote to memory of 3692 3520 msedge.exe 86 PID 3520 wrote to memory of 3692 3520 msedge.exe 86 PID 3520 wrote to memory of 3692 3520 msedge.exe 86 PID 3520 wrote to memory of 3692 3520 msedge.exe 86 PID 3520 wrote to memory of 3692 3520 msedge.exe 86 PID 3520 wrote to memory of 3692 3520 msedge.exe 86 PID 3520 wrote to memory of 3692 3520 msedge.exe 86 PID 3520 wrote to memory of 3692 3520 msedge.exe 86 PID 3520 wrote to memory of 3692 3520 msedge.exe 86 PID 3520 wrote to memory of 3692 3520 msedge.exe 86 PID 3520 wrote to memory of 3692 3520 msedge.exe 86 PID 3520 wrote to memory of 3692 3520 msedge.exe 86 PID 3520 wrote to memory of 3692 3520 msedge.exe 86 PID 3520 wrote to memory of 3692 3520 msedge.exe 86 PID 3520 wrote to memory of 3692 3520 msedge.exe 86 PID 3520 wrote to memory of 3692 3520 msedge.exe 86 PID 3520 wrote to memory of 3692 3520 msedge.exe 86 PID 3520 wrote to memory of 3032 3520 msedge.exe 87 PID 3520 wrote to memory of 3032 3520 msedge.exe 87 PID 3520 wrote to memory of 2848 3520 msedge.exe 88 PID 3520 wrote to memory of 2848 3520 msedge.exe 88 PID 3520 wrote to memory of 2848 3520 msedge.exe 88 PID 3520 wrote to memory of 2848 3520 msedge.exe 88 PID 3520 wrote to memory of 2848 3520 msedge.exe 88 PID 3520 wrote to memory of 2848 3520 msedge.exe 88 PID 3520 wrote to memory of 2848 3520 msedge.exe 88 PID 3520 wrote to memory of 2848 3520 msedge.exe 88 PID 3520 wrote to memory of 2848 3520 msedge.exe 88 PID 3520 wrote to memory of 2848 3520 msedge.exe 88 PID 3520 wrote to memory of 2848 3520 msedge.exe 88 PID 3520 wrote to memory of 2848 3520 msedge.exe 88 PID 3520 wrote to memory of 2848 3520 msedge.exe 88 PID 3520 wrote to memory of 2848 3520 msedge.exe 88 PID 3520 wrote to memory of 2848 3520 msedge.exe 88 PID 3520 wrote to memory of 2848 3520 msedge.exe 88 PID 3520 wrote to memory of 2848 3520 msedge.exe 88 PID 3520 wrote to memory of 2848 3520 msedge.exe 88 PID 3520 wrote to memory of 2848 3520 msedge.exe 88 PID 3520 wrote to memory of 2848 3520 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\1268f15e427723f728ada4ca8d2ded79_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaef7f46f8,0x7ffaef7f4708,0x7ffaef7f47182⤵PID:2964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,11334533285765099422,6803157235556099163,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2248 /prefetch:22⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2220,11334533285765099422,6803157235556099163,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2220,11334533285765099422,6803157235556099163,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2528 /prefetch:82⤵PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,11334533285765099422,6803157235556099163,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,11334533285765099422,6803157235556099163,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,11334533285765099422,6803157235556099163,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 /prefetch:82⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,11334533285765099422,6803157235556099163,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,11334533285765099422,6803157235556099163,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,11334533285765099422,6803157235556099163,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,11334533285765099422,6803157235556099163,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,11334533285765099422,6803157235556099163,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:12⤵PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,11334533285765099422,6803157235556099163,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4836
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2308
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
6KB
MD561e449663661d84e06cd6a1f10cc2d2f
SHA10404cb87ea75dc094cc1d735e13c56aa4794193a
SHA256ca54341813c35eb3a3c6d1e7c0e6f532574c655d3cef7c0207200d33fca0028b
SHA51252a1afcf00a33edf2701439cc3a36f9af660c3339f034be504121c679c30b6a4847f8fca9dbb0a011ddac8680d90fcfd4829688477d49671512734e8b88b77a4
-
Filesize
6KB
MD59855acecbbf76f5f26443bb77242a077
SHA1c7f08bb3da4ec6c88781b56415e0aca7d4124a7d
SHA25664ff1b2d8fc5664b99f3aacd0338a35fe5861760044ed3a7c3a9adc8d340c634
SHA512f446bf570002d4e38e6a4c7851be8108f1011e3797c75c199d1c20bde60b16389ab3f061c40f53a982137b580b3ff516695f994ca26f9986a9924c47d58238cf
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5cc77c8234d7bf583be85ac3599a9c04b
SHA1b6577e1ccb5205babcf10e06a9a896fcc8f65954
SHA256da64b320d67c0d9e646440734a1b9e0966b9e995e8a8b0644400188ced005c17
SHA5121a8368bfb0de340f1b367692b7b5e3b95735aa8eec3fd4f9512baef1198560d77f6f71d21bd955375843df2483ae95db677b3b158990059325335f5cf8bc34b2