Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 20:39
Static task
static1
Behavioral task
behavioral1
Sample
21a32f425914e42e7a3e406e7443d2f3_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
21a32f425914e42e7a3e406e7443d2f3_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
21a32f425914e42e7a3e406e7443d2f3_JaffaCakes118.html
-
Size
11KB
-
MD5
21a32f425914e42e7a3e406e7443d2f3
-
SHA1
0bc2e9dab87e36a99a9270fbea047fd7d5408312
-
SHA256
ad49187ae2c87c70514e5e34d81e6a8f5030e4e712ed1ccd6a4560645b95c852
-
SHA512
03d7aa05dcb4a58e2da9da8c8ff8fdcde5ba191c35f7a89781039c9f6cbdb8b8607d64dc4f660ccbe1a5a411f26dd3faccf71b32a52e94619340128beb69f790
-
SSDEEP
192:f1QVUVqt1/kJrxvuiDOflWRleGWR/DceRbjmAA3crLUmN4tv8GyD8u2u0pVvoK1Z:f1QVUVqt1yxvuiqf4RleGW9fjM3SLQtj
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5796 msedge.exe 5796 msedge.exe 1592 msedge.exe 1592 msedge.exe 3612 identity_helper.exe 3612 identity_helper.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1592 wrote to memory of 3080 1592 msedge.exe 87 PID 1592 wrote to memory of 3080 1592 msedge.exe 87 PID 1592 wrote to memory of 4676 1592 msedge.exe 88 PID 1592 wrote to memory of 4676 1592 msedge.exe 88 PID 1592 wrote to memory of 4676 1592 msedge.exe 88 PID 1592 wrote to memory of 4676 1592 msedge.exe 88 PID 1592 wrote to memory of 4676 1592 msedge.exe 88 PID 1592 wrote to memory of 4676 1592 msedge.exe 88 PID 1592 wrote to memory of 4676 1592 msedge.exe 88 PID 1592 wrote to memory of 4676 1592 msedge.exe 88 PID 1592 wrote to memory of 4676 1592 msedge.exe 88 PID 1592 wrote to memory of 4676 1592 msedge.exe 88 PID 1592 wrote to memory of 4676 1592 msedge.exe 88 PID 1592 wrote to memory of 4676 1592 msedge.exe 88 PID 1592 wrote to memory of 4676 1592 msedge.exe 88 PID 1592 wrote to memory of 4676 1592 msedge.exe 88 PID 1592 wrote to memory of 4676 1592 msedge.exe 88 PID 1592 wrote to memory of 4676 1592 msedge.exe 88 PID 1592 wrote to memory of 4676 1592 msedge.exe 88 PID 1592 wrote to memory of 4676 1592 msedge.exe 88 PID 1592 wrote to memory of 4676 1592 msedge.exe 88 PID 1592 wrote to memory of 4676 1592 msedge.exe 88 PID 1592 wrote to memory of 4676 1592 msedge.exe 88 PID 1592 wrote to memory of 4676 1592 msedge.exe 88 PID 1592 wrote to memory of 4676 1592 msedge.exe 88 PID 1592 wrote to memory of 4676 1592 msedge.exe 88 PID 1592 wrote to memory of 4676 1592 msedge.exe 88 PID 1592 wrote to memory of 4676 1592 msedge.exe 88 PID 1592 wrote to memory of 4676 1592 msedge.exe 88 PID 1592 wrote to memory of 4676 1592 msedge.exe 88 PID 1592 wrote to memory of 4676 1592 msedge.exe 88 PID 1592 wrote to memory of 4676 1592 msedge.exe 88 PID 1592 wrote to memory of 4676 1592 msedge.exe 88 PID 1592 wrote to memory of 4676 1592 msedge.exe 88 PID 1592 wrote to memory of 4676 1592 msedge.exe 88 PID 1592 wrote to memory of 4676 1592 msedge.exe 88 PID 1592 wrote to memory of 4676 1592 msedge.exe 88 PID 1592 wrote to memory of 4676 1592 msedge.exe 88 PID 1592 wrote to memory of 4676 1592 msedge.exe 88 PID 1592 wrote to memory of 4676 1592 msedge.exe 88 PID 1592 wrote to memory of 4676 1592 msedge.exe 88 PID 1592 wrote to memory of 4676 1592 msedge.exe 88 PID 1592 wrote to memory of 5796 1592 msedge.exe 89 PID 1592 wrote to memory of 5796 1592 msedge.exe 89 PID 1592 wrote to memory of 3392 1592 msedge.exe 90 PID 1592 wrote to memory of 3392 1592 msedge.exe 90 PID 1592 wrote to memory of 3392 1592 msedge.exe 90 PID 1592 wrote to memory of 3392 1592 msedge.exe 90 PID 1592 wrote to memory of 3392 1592 msedge.exe 90 PID 1592 wrote to memory of 3392 1592 msedge.exe 90 PID 1592 wrote to memory of 3392 1592 msedge.exe 90 PID 1592 wrote to memory of 3392 1592 msedge.exe 90 PID 1592 wrote to memory of 3392 1592 msedge.exe 90 PID 1592 wrote to memory of 3392 1592 msedge.exe 90 PID 1592 wrote to memory of 3392 1592 msedge.exe 90 PID 1592 wrote to memory of 3392 1592 msedge.exe 90 PID 1592 wrote to memory of 3392 1592 msedge.exe 90 PID 1592 wrote to memory of 3392 1592 msedge.exe 90 PID 1592 wrote to memory of 3392 1592 msedge.exe 90 PID 1592 wrote to memory of 3392 1592 msedge.exe 90 PID 1592 wrote to memory of 3392 1592 msedge.exe 90 PID 1592 wrote to memory of 3392 1592 msedge.exe 90 PID 1592 wrote to memory of 3392 1592 msedge.exe 90 PID 1592 wrote to memory of 3392 1592 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\21a32f425914e42e7a3e406e7443d2f3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa1f8c46f8,0x7ffa1f8c4708,0x7ffa1f8c47182⤵PID:3080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,14022856876100187471,3215178933289315036,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,14022856876100187471,3215178933289315036,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,14022856876100187471,3215178933289315036,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:82⤵PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,14022856876100187471,3215178933289315036,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,14022856876100187471,3215178933289315036,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,14022856876100187471,3215178933289315036,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,14022856876100187471,3215178933289315036,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,14022856876100187471,3215178933289315036,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:12⤵PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,14022856876100187471,3215178933289315036,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,14022856876100187471,3215178933289315036,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,14022856876100187471,3215178933289315036,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:1152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,14022856876100187471,3215178933289315036,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2720 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:996
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4064
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\484bff98-c4a7-456a-a3be-7384aa3fd5b7.tmp
Filesize6KB
MD5cd829853d929ba65dd3822673e66b4d7
SHA1c07ad249477be6eb25fcb21b0f8972d595d14a22
SHA256514b0d518e36d7b87c0a12e0ae54535ba60e12a3d05289e2eaf7500e26c4161e
SHA5121b74ef47f661dee5ec745ce0c8ea93ad45e1cef70541fbc55be306d854534b22db9e6c1ffbcd7c932ecf350eba63770d3b107d0eaa9ae07185238c0738b42ce7
-
Filesize
256B
MD502c8ffeab71998d11066f83d8607e0fe
SHA1a09b81a4b02a5976b2ddcc341715262a5d1fff47
SHA256e39a3c1937c5b196c861a02a9a3ae35d54c9aec8d7536c03ffadee3557fec25b
SHA512aac7470085e3da75d84f33aac7165bd46215b7b99896b7189da35d64eedee738ec11b59a935dabee8d80ae19282cc873a0b636f71b5f877a89039932a641485e
-
Filesize
5KB
MD5ff64a27c5bbb396498ae0ffdfed283a5
SHA1d9f9974fcedbb09c9f960b62e80811d01518541c
SHA2567e1a99d8af63861860af70b55a981e458e6985551c3358347568d0b561f773e3
SHA5128bc980ac8820b43fb0fb62fbd888fca354c65e822efaa64bd89061a9d7d4e8be5821f469f4cfec268c07600b88012e26e308bbf4fae6857d34584e88d987c136
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b4141922f7b4c72357be652032dc39dc
SHA16f802539ff7e2907e5820bf2a4a70e032abc3197
SHA2563ad4355cd070acd1faa560d99f4c395f0ca68fcbc7ec05b9a970fe20e71d01c3
SHA5127c932a6239cbd5da6d856cd5172d78ec0ea72dc6ac91c724a7ee131ee43971d106de1e10fcb159afe6445b1355ea69d3494cc7e949c876e82c9f812c509da91e