Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 23:20
Static task
static1
Behavioral task
behavioral1
Sample
272f425e7edec4196eb7f89e0cebd316_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
272f425e7edec4196eb7f89e0cebd316_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
272f425e7edec4196eb7f89e0cebd316_JaffaCakes118.html
-
Size
15KB
-
MD5
272f425e7edec4196eb7f89e0cebd316
-
SHA1
d256295b6749ee7f8cca9b69fe35a742de3d445e
-
SHA256
fd3915b713b3efb865bc248a1443db48144571eccb51ee020865c3e728d3f3e1
-
SHA512
50a9fe4daa2cae989866825a9543f22198cc76dd01c3530abed300b7bf77b3737eff3ea4b1a316ce3cc0cff9971462a9ccab8f406d1d5793f8d76c77a85567f1
-
SSDEEP
192:yCm6FbuIklFr2ttYbnEXJRlEuKB+onLkTndxwlXrae/nQGqe+ImeCeEJAb+aoy0x:E9TlFrStYbnEX9EQTdxCIImrA8y0Bst2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4648 msedge.exe 4648 msedge.exe 1424 msedge.exe 1424 msedge.exe 3824 identity_helper.exe 3824 identity_helper.exe 484 msedge.exe 484 msedge.exe 484 msedge.exe 484 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1424 wrote to memory of 3692 1424 msedge.exe 79 PID 1424 wrote to memory of 3692 1424 msedge.exe 79 PID 1424 wrote to memory of 3064 1424 msedge.exe 80 PID 1424 wrote to memory of 3064 1424 msedge.exe 80 PID 1424 wrote to memory of 3064 1424 msedge.exe 80 PID 1424 wrote to memory of 3064 1424 msedge.exe 80 PID 1424 wrote to memory of 3064 1424 msedge.exe 80 PID 1424 wrote to memory of 3064 1424 msedge.exe 80 PID 1424 wrote to memory of 3064 1424 msedge.exe 80 PID 1424 wrote to memory of 3064 1424 msedge.exe 80 PID 1424 wrote to memory of 3064 1424 msedge.exe 80 PID 1424 wrote to memory of 3064 1424 msedge.exe 80 PID 1424 wrote to memory of 3064 1424 msedge.exe 80 PID 1424 wrote to memory of 3064 1424 msedge.exe 80 PID 1424 wrote to memory of 3064 1424 msedge.exe 80 PID 1424 wrote to memory of 3064 1424 msedge.exe 80 PID 1424 wrote to memory of 3064 1424 msedge.exe 80 PID 1424 wrote to memory of 3064 1424 msedge.exe 80 PID 1424 wrote to memory of 3064 1424 msedge.exe 80 PID 1424 wrote to memory of 3064 1424 msedge.exe 80 PID 1424 wrote to memory of 3064 1424 msedge.exe 80 PID 1424 wrote to memory of 3064 1424 msedge.exe 80 PID 1424 wrote to memory of 3064 1424 msedge.exe 80 PID 1424 wrote to memory of 3064 1424 msedge.exe 80 PID 1424 wrote to memory of 3064 1424 msedge.exe 80 PID 1424 wrote to memory of 3064 1424 msedge.exe 80 PID 1424 wrote to memory of 3064 1424 msedge.exe 80 PID 1424 wrote to memory of 3064 1424 msedge.exe 80 PID 1424 wrote to memory of 3064 1424 msedge.exe 80 PID 1424 wrote to memory of 3064 1424 msedge.exe 80 PID 1424 wrote to memory of 3064 1424 msedge.exe 80 PID 1424 wrote to memory of 3064 1424 msedge.exe 80 PID 1424 wrote to memory of 3064 1424 msedge.exe 80 PID 1424 wrote to memory of 3064 1424 msedge.exe 80 PID 1424 wrote to memory of 3064 1424 msedge.exe 80 PID 1424 wrote to memory of 3064 1424 msedge.exe 80 PID 1424 wrote to memory of 3064 1424 msedge.exe 80 PID 1424 wrote to memory of 3064 1424 msedge.exe 80 PID 1424 wrote to memory of 3064 1424 msedge.exe 80 PID 1424 wrote to memory of 3064 1424 msedge.exe 80 PID 1424 wrote to memory of 3064 1424 msedge.exe 80 PID 1424 wrote to memory of 3064 1424 msedge.exe 80 PID 1424 wrote to memory of 4648 1424 msedge.exe 81 PID 1424 wrote to memory of 4648 1424 msedge.exe 81 PID 1424 wrote to memory of 2136 1424 msedge.exe 82 PID 1424 wrote to memory of 2136 1424 msedge.exe 82 PID 1424 wrote to memory of 2136 1424 msedge.exe 82 PID 1424 wrote to memory of 2136 1424 msedge.exe 82 PID 1424 wrote to memory of 2136 1424 msedge.exe 82 PID 1424 wrote to memory of 2136 1424 msedge.exe 82 PID 1424 wrote to memory of 2136 1424 msedge.exe 82 PID 1424 wrote to memory of 2136 1424 msedge.exe 82 PID 1424 wrote to memory of 2136 1424 msedge.exe 82 PID 1424 wrote to memory of 2136 1424 msedge.exe 82 PID 1424 wrote to memory of 2136 1424 msedge.exe 82 PID 1424 wrote to memory of 2136 1424 msedge.exe 82 PID 1424 wrote to memory of 2136 1424 msedge.exe 82 PID 1424 wrote to memory of 2136 1424 msedge.exe 82 PID 1424 wrote to memory of 2136 1424 msedge.exe 82 PID 1424 wrote to memory of 2136 1424 msedge.exe 82 PID 1424 wrote to memory of 2136 1424 msedge.exe 82 PID 1424 wrote to memory of 2136 1424 msedge.exe 82 PID 1424 wrote to memory of 2136 1424 msedge.exe 82 PID 1424 wrote to memory of 2136 1424 msedge.exe 82
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\272f425e7edec4196eb7f89e0cebd316_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffedb2d46f8,0x7ffedb2d4708,0x7ffedb2d47182⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2280,324250587041944234,16567738533298267719,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2288 /prefetch:22⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2280,324250587041944234,16567738533298267719,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2324 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2280,324250587041944234,16567738533298267719,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2280,324250587041944234,16567738533298267719,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:1636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2280,324250587041944234,16567738533298267719,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2280,324250587041944234,16567738533298267719,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1324 /prefetch:82⤵PID:576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2280,324250587041944234,16567738533298267719,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1324 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2280,324250587041944234,16567738533298267719,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:1332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2280,324250587041944234,16567738533298267719,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:1064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2280,324250587041944234,16567738533298267719,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:12⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2280,324250587041944234,16567738533298267719,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2280,324250587041944234,16567738533298267719,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5000 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:484
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1012
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
252B
MD585b6f2a48b1851a309cd1d53f8a5e5a8
SHA1865e4f7d31a2ca7471b95e21eeea2acdbff8b22f
SHA256bef8aeee7a0e5ca28984dead3d51aac99d2a1a4ea9f028e0fcba5f3aba7d708c
SHA51280b264b3830c12bdee41165c48bf0ead35df155083392d04cda3cb02929fec3d9fea1a02b8e79ea58895490b47047859e5468ac72fb10d37186159dc1336cf8a
-
Filesize
6KB
MD5d150d9c38a680e8c6ae3e5c96ca9f88c
SHA13b014affa44729a98f930a721ba4ec1877631416
SHA256aeffc9721d0f626202a92db934532b2617ae5b7cbfaf332af645acb3e14be594
SHA5124540b43b931b0f237510c36fc42dc4a77daccf2e52be5be473cde598b60ba20595f32906dea6003e705dccf776d09e371b728f9ec9f121626ea2c0c34fa6b751
-
Filesize
6KB
MD51aa8608316ac768dd72c49d6088852c0
SHA19c2190f9674723e359ca75dd86a3126c9bbe5ca5
SHA2568329f978ccf87f1419444506c91d30e4d3e09fb414c0e4e59040a9f2f0969968
SHA51232c661070d8294172fdfed6b9d1e72f7f8320d0d64e3a80b20634322527e1560097ce4df66e2a43ba7ef69e0716370ac6fd668060e2d93c759c9450da945bdd8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD53c9c3a5fe2c0a792d4622d020b62267e
SHA1d6a19bd88417cfd2a6d7f70b16c764d39f7de64e
SHA256cdd2d5939abfc0d9bf1e038808d687745212ba02a43d35219fa05c4ac3c7df50
SHA512d5c16f93e85e4c314b68dacd8089d8bf9e1f65277b663688c6d9a92bea5e2f282595d171420dc574e9e426ba8d64b0c31cb211e82148ddbcc6f903964c3f5efa