Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2024, 16:51
Static task
static1
Behavioral task
behavioral1
Sample
13a0ebc6fdd6ddc11489b4f35e976558_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
13a0ebc6fdd6ddc11489b4f35e976558_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
13a0ebc6fdd6ddc11489b4f35e976558_JaffaCakes118.html
-
Size
461KB
-
MD5
13a0ebc6fdd6ddc11489b4f35e976558
-
SHA1
cd2d0b31b47c5efb1ead66f3cf9be5de63ff5db4
-
SHA256
24f6cb8a98c9f2ea7d069bd517a17fd1eec1293f3f99c750e653fcb753305e95
-
SHA512
b163551d8e06206ed281fe07da0650d3889632c4e81ea8bd1964905e6f978802aee5b2697c58e2e202769aed299b97e356b9732203f764400151dee751378a4c
-
SSDEEP
6144:S5sMYod+X3oI+YaQHQdsMYod+X3oI+YKsMYod+X3oI+YLsMYod+X3oI+YQ:i5d+X3u5d+X3m5d+X315d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4580 msedge.exe 4580 msedge.exe 4072 msedge.exe 4072 msedge.exe 4608 identity_helper.exe 4608 identity_helper.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4072 wrote to memory of 3408 4072 msedge.exe 83 PID 4072 wrote to memory of 3408 4072 msedge.exe 83 PID 4072 wrote to memory of 5008 4072 msedge.exe 84 PID 4072 wrote to memory of 5008 4072 msedge.exe 84 PID 4072 wrote to memory of 5008 4072 msedge.exe 84 PID 4072 wrote to memory of 5008 4072 msedge.exe 84 PID 4072 wrote to memory of 5008 4072 msedge.exe 84 PID 4072 wrote to memory of 5008 4072 msedge.exe 84 PID 4072 wrote to memory of 5008 4072 msedge.exe 84 PID 4072 wrote to memory of 5008 4072 msedge.exe 84 PID 4072 wrote to memory of 5008 4072 msedge.exe 84 PID 4072 wrote to memory of 5008 4072 msedge.exe 84 PID 4072 wrote to memory of 5008 4072 msedge.exe 84 PID 4072 wrote to memory of 5008 4072 msedge.exe 84 PID 4072 wrote to memory of 5008 4072 msedge.exe 84 PID 4072 wrote to memory of 5008 4072 msedge.exe 84 PID 4072 wrote to memory of 5008 4072 msedge.exe 84 PID 4072 wrote to memory of 5008 4072 msedge.exe 84 PID 4072 wrote to memory of 5008 4072 msedge.exe 84 PID 4072 wrote to memory of 5008 4072 msedge.exe 84 PID 4072 wrote to memory of 5008 4072 msedge.exe 84 PID 4072 wrote to memory of 5008 4072 msedge.exe 84 PID 4072 wrote to memory of 5008 4072 msedge.exe 84 PID 4072 wrote to memory of 5008 4072 msedge.exe 84 PID 4072 wrote to memory of 5008 4072 msedge.exe 84 PID 4072 wrote to memory of 5008 4072 msedge.exe 84 PID 4072 wrote to memory of 5008 4072 msedge.exe 84 PID 4072 wrote to memory of 5008 4072 msedge.exe 84 PID 4072 wrote to memory of 5008 4072 msedge.exe 84 PID 4072 wrote to memory of 5008 4072 msedge.exe 84 PID 4072 wrote to memory of 5008 4072 msedge.exe 84 PID 4072 wrote to memory of 5008 4072 msedge.exe 84 PID 4072 wrote to memory of 5008 4072 msedge.exe 84 PID 4072 wrote to memory of 5008 4072 msedge.exe 84 PID 4072 wrote to memory of 5008 4072 msedge.exe 84 PID 4072 wrote to memory of 5008 4072 msedge.exe 84 PID 4072 wrote to memory of 5008 4072 msedge.exe 84 PID 4072 wrote to memory of 5008 4072 msedge.exe 84 PID 4072 wrote to memory of 5008 4072 msedge.exe 84 PID 4072 wrote to memory of 5008 4072 msedge.exe 84 PID 4072 wrote to memory of 5008 4072 msedge.exe 84 PID 4072 wrote to memory of 5008 4072 msedge.exe 84 PID 4072 wrote to memory of 4580 4072 msedge.exe 85 PID 4072 wrote to memory of 4580 4072 msedge.exe 85 PID 4072 wrote to memory of 3768 4072 msedge.exe 86 PID 4072 wrote to memory of 3768 4072 msedge.exe 86 PID 4072 wrote to memory of 3768 4072 msedge.exe 86 PID 4072 wrote to memory of 3768 4072 msedge.exe 86 PID 4072 wrote to memory of 3768 4072 msedge.exe 86 PID 4072 wrote to memory of 3768 4072 msedge.exe 86 PID 4072 wrote to memory of 3768 4072 msedge.exe 86 PID 4072 wrote to memory of 3768 4072 msedge.exe 86 PID 4072 wrote to memory of 3768 4072 msedge.exe 86 PID 4072 wrote to memory of 3768 4072 msedge.exe 86 PID 4072 wrote to memory of 3768 4072 msedge.exe 86 PID 4072 wrote to memory of 3768 4072 msedge.exe 86 PID 4072 wrote to memory of 3768 4072 msedge.exe 86 PID 4072 wrote to memory of 3768 4072 msedge.exe 86 PID 4072 wrote to memory of 3768 4072 msedge.exe 86 PID 4072 wrote to memory of 3768 4072 msedge.exe 86 PID 4072 wrote to memory of 3768 4072 msedge.exe 86 PID 4072 wrote to memory of 3768 4072 msedge.exe 86 PID 4072 wrote to memory of 3768 4072 msedge.exe 86 PID 4072 wrote to memory of 3768 4072 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\13a0ebc6fdd6ddc11489b4f35e976558_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc325346f8,0x7ffc32534708,0x7ffc325347182⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2240,8238992987243310152,1955233403431127615,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2260 /prefetch:22⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2240,8238992987243310152,1955233403431127615,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2240,8238992987243310152,1955233403431127615,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:3768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,8238992987243310152,1955233403431127615,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,8238992987243310152,1955233403431127615,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2240,8238992987243310152,1955233403431127615,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5100 /prefetch:82⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2240,8238992987243310152,1955233403431127615,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5100 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,8238992987243310152,1955233403431127615,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:2804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,8238992987243310152,1955233403431127615,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,8238992987243310152,1955233403431127615,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:12⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,8238992987243310152,1955233403431127615,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2240,8238992987243310152,1955233403431127615,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3076 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1216
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2324
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58b2290ca03b4ca5fe52d82550c7e7d69
SHA120583a7851a906444204ce8ba4fa51153e6cd494
SHA256f9ff4871fc5317299de907489d466e630be63d698c8f7cb77cc81faddbecc6d2
SHA512704ec8122cc1c263dff67ddbb5c20ee0db8a438674d716bc3be5b266ee5629a219b0049d721f9eb2dd8f2d8fda0163659eaa4d3e1f0a6e9072a8ffb92bb2b25d
-
Filesize
152B
MD5919c29d42fb6034fee2f5de14d573c63
SHA124a2e1042347b3853344157239bde3ed699047a8
SHA25617cd6de97a0c020cb4935739cfef4ec4e074e8d127ac4c531b6dc496580c8141
SHA512bb7eadd087bbcec8b1b8a49b102b454333f2f9708d36b6ffc3c82fdc52e46873398d967238c3bfe9ac6caef45b017a5fe3938ebf5f3053e4ef9be7b2752b563d
-
Filesize
5KB
MD51fdb982deb513cb7971d0f8cec93d206
SHA13bbe753846283469b3fe7777183c1ec5130e6dda
SHA2565f1113e00126180f10ede480da80d2e44bf939e3e053258153112c32480f923d
SHA5123ffca67dc89afc231b826fbf38b24b4158ff4e1c34ed041f4f8f060b1566adf16d3836465a792ffe2286edbdb1b75e2059432d2fe556e73435e0de70885291cb
-
Filesize
6KB
MD53dd3ffa65638a11ef41893aef9b078d9
SHA1a2b08f92d681aa0b3ad7732d8d7d371cf970c9a0
SHA256eec47d060997180d6692a2afbaaf4698747756b3fce6057d439982315745a0d1
SHA512deeb9a95d5eb9afab686578b8117ce08ea6c53d0010b976b28ade83421eb60beffb8b9d229a1a83f3eaea8c277649fe652758fc5e3c84506a4c7e92e8b3a9411
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ee4d4d3c2389f979b0b5fc326e118cb9
SHA112e985cfef00bf76ae166e07205c77a66a358467
SHA25603638ac55c9bae5812fbe914122a0a486b5a4b6bd28535b1d2047a38b51157c2
SHA5121afc4b5f8b0e659ee97b4eaeac165ed51654d6a8eb50c4290785b38eebaaf8955127214bf4a4038d4505a278572a00c67ae57230d3a0230dee5838e74374ece8