Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2024 02:26
Static task
static1
Behavioral task
behavioral1
Sample
158fbd345fabf9aa8eb6e2426a39abea_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
158fbd345fabf9aa8eb6e2426a39abea_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
158fbd345fabf9aa8eb6e2426a39abea_JaffaCakes118.html
-
Size
70KB
-
MD5
158fbd345fabf9aa8eb6e2426a39abea
-
SHA1
a4b504203a8e54e7ae1b69fbecd10f8670187c30
-
SHA256
c06447ee4d8301de82b09cc48b9502be4887a1df3749a3a24d853acea0a4184c
-
SHA512
d529e4a6e9355a14d4735a35b82cae88a6dc70905cfb5f97868e316296ea56a469bd6d25d0f5c01c717be73c7426730de90a37c2df1d6159c0bf88910786fd1c
-
SSDEEP
768:JiigcMWR3sI2PDDnd0g66pvWoT2e1wCZkoTyMdtbBnfBgN8/lboiGhcRfQFVG8sM:JorTTNen0tbrga90hc+NnhVJ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2924 msedge.exe 2924 msedge.exe 4048 msedge.exe 4048 msedge.exe 3348 identity_helper.exe 3348 identity_helper.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4048 wrote to memory of 4268 4048 msedge.exe 83 PID 4048 wrote to memory of 4268 4048 msedge.exe 83 PID 4048 wrote to memory of 3940 4048 msedge.exe 84 PID 4048 wrote to memory of 3940 4048 msedge.exe 84 PID 4048 wrote to memory of 3940 4048 msedge.exe 84 PID 4048 wrote to memory of 3940 4048 msedge.exe 84 PID 4048 wrote to memory of 3940 4048 msedge.exe 84 PID 4048 wrote to memory of 3940 4048 msedge.exe 84 PID 4048 wrote to memory of 3940 4048 msedge.exe 84 PID 4048 wrote to memory of 3940 4048 msedge.exe 84 PID 4048 wrote to memory of 3940 4048 msedge.exe 84 PID 4048 wrote to memory of 3940 4048 msedge.exe 84 PID 4048 wrote to memory of 3940 4048 msedge.exe 84 PID 4048 wrote to memory of 3940 4048 msedge.exe 84 PID 4048 wrote to memory of 3940 4048 msedge.exe 84 PID 4048 wrote to memory of 3940 4048 msedge.exe 84 PID 4048 wrote to memory of 3940 4048 msedge.exe 84 PID 4048 wrote to memory of 3940 4048 msedge.exe 84 PID 4048 wrote to memory of 3940 4048 msedge.exe 84 PID 4048 wrote to memory of 3940 4048 msedge.exe 84 PID 4048 wrote to memory of 3940 4048 msedge.exe 84 PID 4048 wrote to memory of 3940 4048 msedge.exe 84 PID 4048 wrote to memory of 3940 4048 msedge.exe 84 PID 4048 wrote to memory of 3940 4048 msedge.exe 84 PID 4048 wrote to memory of 3940 4048 msedge.exe 84 PID 4048 wrote to memory of 3940 4048 msedge.exe 84 PID 4048 wrote to memory of 3940 4048 msedge.exe 84 PID 4048 wrote to memory of 3940 4048 msedge.exe 84 PID 4048 wrote to memory of 3940 4048 msedge.exe 84 PID 4048 wrote to memory of 3940 4048 msedge.exe 84 PID 4048 wrote to memory of 3940 4048 msedge.exe 84 PID 4048 wrote to memory of 3940 4048 msedge.exe 84 PID 4048 wrote to memory of 3940 4048 msedge.exe 84 PID 4048 wrote to memory of 3940 4048 msedge.exe 84 PID 4048 wrote to memory of 3940 4048 msedge.exe 84 PID 4048 wrote to memory of 3940 4048 msedge.exe 84 PID 4048 wrote to memory of 3940 4048 msedge.exe 84 PID 4048 wrote to memory of 3940 4048 msedge.exe 84 PID 4048 wrote to memory of 3940 4048 msedge.exe 84 PID 4048 wrote to memory of 3940 4048 msedge.exe 84 PID 4048 wrote to memory of 3940 4048 msedge.exe 84 PID 4048 wrote to memory of 3940 4048 msedge.exe 84 PID 4048 wrote to memory of 2924 4048 msedge.exe 85 PID 4048 wrote to memory of 2924 4048 msedge.exe 85 PID 4048 wrote to memory of 3688 4048 msedge.exe 86 PID 4048 wrote to memory of 3688 4048 msedge.exe 86 PID 4048 wrote to memory of 3688 4048 msedge.exe 86 PID 4048 wrote to memory of 3688 4048 msedge.exe 86 PID 4048 wrote to memory of 3688 4048 msedge.exe 86 PID 4048 wrote to memory of 3688 4048 msedge.exe 86 PID 4048 wrote to memory of 3688 4048 msedge.exe 86 PID 4048 wrote to memory of 3688 4048 msedge.exe 86 PID 4048 wrote to memory of 3688 4048 msedge.exe 86 PID 4048 wrote to memory of 3688 4048 msedge.exe 86 PID 4048 wrote to memory of 3688 4048 msedge.exe 86 PID 4048 wrote to memory of 3688 4048 msedge.exe 86 PID 4048 wrote to memory of 3688 4048 msedge.exe 86 PID 4048 wrote to memory of 3688 4048 msedge.exe 86 PID 4048 wrote to memory of 3688 4048 msedge.exe 86 PID 4048 wrote to memory of 3688 4048 msedge.exe 86 PID 4048 wrote to memory of 3688 4048 msedge.exe 86 PID 4048 wrote to memory of 3688 4048 msedge.exe 86 PID 4048 wrote to memory of 3688 4048 msedge.exe 86 PID 4048 wrote to memory of 3688 4048 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\158fbd345fabf9aa8eb6e2426a39abea_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa4b146f8,0x7ffaa4b14708,0x7ffaa4b147182⤵PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,3590819816122238271,14706985433988030613,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,3590819816122238271,14706985433988030613,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,3590819816122238271,14706985433988030613,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:82⤵PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3590819816122238271,14706985433988030613,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3590819816122238271,14706985433988030613,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,3590819816122238271,14706985433988030613,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:82⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,3590819816122238271,14706985433988030613,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3590819816122238271,14706985433988030613,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4888 /prefetch:12⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3590819816122238271,14706985433988030613,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3590819816122238271,14706985433988030613,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4612 /prefetch:12⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3590819816122238271,14706985433988030613,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:12⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,3590819816122238271,14706985433988030613,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1880 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3592
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1192
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
6KB
MD552cf341e0b01dd1d690f143e9f181ae4
SHA1191acd8c473c5625b562c5aed99c16483b3d76ac
SHA256562e37e5897648062bf63d0e8035c1a1c17d67a98ce233a8b5a428b58a84bbad
SHA512c546c41ae26b1149cd231732bbd2600d41cd8da5800e5157bd5705728209f8127c037b4cf604a55700af75ad5bd41e3e4455f2747ab7968633b5e7a736909c9b
-
Filesize
6KB
MD5a4201c88df774adae029fce59fdcac6c
SHA11ab86b32fb5529cae3e5d707d0774dada6be5abf
SHA2562d2b56edb2cbc4ce33778433c4ddb4d6b95d5ca1e29111375a965cf282f0e1a6
SHA51203aae966d4507a8fe6889db608f355d2299bbfa3387a20d5213d5930e49cea92a28980a63fb28f6d45d1680104505f05632adce18e2763cb113b3605e94b03fc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54284d01ab0c16c07fb06927bc760cda4
SHA1ba1c32dacabf18bb08f72447e71c5d77595e4549
SHA2566858a514e697d88a8aef3f73ed9fc8cd1a23186356e6ea24fd6e5d70408aca2a
SHA512d0d5c409e6faf45b3bc93e34d3c98aebe53988577eb7c6fa2ffc3e6d930d1976204e31821e59e535331a176985ea72113fad44956e6debefe2dc09cae03d4ab7