Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 10:54
Static task
static1
Behavioral task
behavioral1
Sample
24853abbdc02315083fdefb13ebb0794_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
24853abbdc02315083fdefb13ebb0794_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
24853abbdc02315083fdefb13ebb0794_JaffaCakes118.html
-
Size
27KB
-
MD5
24853abbdc02315083fdefb13ebb0794
-
SHA1
e618f79d21a90bc7741633695ce5481925b2084d
-
SHA256
18f28723c9094c3381fa48dffc70422b17aa1465b0f7663e81c988dcfe58fac0
-
SHA512
98c7e9067761c47f752749399e01e21aad890d0e3c8f08e4fe2f5fb06833fac8c3e879570c335c3fc7ceb800b91a63f7edf75e08be9ca566bf3a800c1b20a0f6
-
SSDEEP
768:RD7BGtZRsVhx1B0Q1BJvxNR3FBaXLKNK7l4c/eIRHNawb0Z4ejn/rjxxV99d:RD7BYZRsVhx1B0Q1BJZNRTaXLKNal4cY
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2016 msedge.exe 2016 msedge.exe 3568 msedge.exe 3568 msedge.exe 1072 identity_helper.exe 1072 identity_helper.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3568 wrote to memory of 4652 3568 msedge.exe 85 PID 3568 wrote to memory of 4652 3568 msedge.exe 85 PID 3568 wrote to memory of 4640 3568 msedge.exe 86 PID 3568 wrote to memory of 4640 3568 msedge.exe 86 PID 3568 wrote to memory of 4640 3568 msedge.exe 86 PID 3568 wrote to memory of 4640 3568 msedge.exe 86 PID 3568 wrote to memory of 4640 3568 msedge.exe 86 PID 3568 wrote to memory of 4640 3568 msedge.exe 86 PID 3568 wrote to memory of 4640 3568 msedge.exe 86 PID 3568 wrote to memory of 4640 3568 msedge.exe 86 PID 3568 wrote to memory of 4640 3568 msedge.exe 86 PID 3568 wrote to memory of 4640 3568 msedge.exe 86 PID 3568 wrote to memory of 4640 3568 msedge.exe 86 PID 3568 wrote to memory of 4640 3568 msedge.exe 86 PID 3568 wrote to memory of 4640 3568 msedge.exe 86 PID 3568 wrote to memory of 4640 3568 msedge.exe 86 PID 3568 wrote to memory of 4640 3568 msedge.exe 86 PID 3568 wrote to memory of 4640 3568 msedge.exe 86 PID 3568 wrote to memory of 4640 3568 msedge.exe 86 PID 3568 wrote to memory of 4640 3568 msedge.exe 86 PID 3568 wrote to memory of 4640 3568 msedge.exe 86 PID 3568 wrote to memory of 4640 3568 msedge.exe 86 PID 3568 wrote to memory of 4640 3568 msedge.exe 86 PID 3568 wrote to memory of 4640 3568 msedge.exe 86 PID 3568 wrote to memory of 4640 3568 msedge.exe 86 PID 3568 wrote to memory of 4640 3568 msedge.exe 86 PID 3568 wrote to memory of 4640 3568 msedge.exe 86 PID 3568 wrote to memory of 4640 3568 msedge.exe 86 PID 3568 wrote to memory of 4640 3568 msedge.exe 86 PID 3568 wrote to memory of 4640 3568 msedge.exe 86 PID 3568 wrote to memory of 4640 3568 msedge.exe 86 PID 3568 wrote to memory of 4640 3568 msedge.exe 86 PID 3568 wrote to memory of 4640 3568 msedge.exe 86 PID 3568 wrote to memory of 4640 3568 msedge.exe 86 PID 3568 wrote to memory of 4640 3568 msedge.exe 86 PID 3568 wrote to memory of 4640 3568 msedge.exe 86 PID 3568 wrote to memory of 4640 3568 msedge.exe 86 PID 3568 wrote to memory of 4640 3568 msedge.exe 86 PID 3568 wrote to memory of 4640 3568 msedge.exe 86 PID 3568 wrote to memory of 4640 3568 msedge.exe 86 PID 3568 wrote to memory of 4640 3568 msedge.exe 86 PID 3568 wrote to memory of 4640 3568 msedge.exe 86 PID 3568 wrote to memory of 2016 3568 msedge.exe 87 PID 3568 wrote to memory of 2016 3568 msedge.exe 87 PID 3568 wrote to memory of 4704 3568 msedge.exe 88 PID 3568 wrote to memory of 4704 3568 msedge.exe 88 PID 3568 wrote to memory of 4704 3568 msedge.exe 88 PID 3568 wrote to memory of 4704 3568 msedge.exe 88 PID 3568 wrote to memory of 4704 3568 msedge.exe 88 PID 3568 wrote to memory of 4704 3568 msedge.exe 88 PID 3568 wrote to memory of 4704 3568 msedge.exe 88 PID 3568 wrote to memory of 4704 3568 msedge.exe 88 PID 3568 wrote to memory of 4704 3568 msedge.exe 88 PID 3568 wrote to memory of 4704 3568 msedge.exe 88 PID 3568 wrote to memory of 4704 3568 msedge.exe 88 PID 3568 wrote to memory of 4704 3568 msedge.exe 88 PID 3568 wrote to memory of 4704 3568 msedge.exe 88 PID 3568 wrote to memory of 4704 3568 msedge.exe 88 PID 3568 wrote to memory of 4704 3568 msedge.exe 88 PID 3568 wrote to memory of 4704 3568 msedge.exe 88 PID 3568 wrote to memory of 4704 3568 msedge.exe 88 PID 3568 wrote to memory of 4704 3568 msedge.exe 88 PID 3568 wrote to memory of 4704 3568 msedge.exe 88 PID 3568 wrote to memory of 4704 3568 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\24853abbdc02315083fdefb13ebb0794_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa44546f8,0x7ffaa4454708,0x7ffaa44547182⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,3202215156522384770,2147188869241419353,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,3202215156522384770,2147188869241419353,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2420 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,3202215156522384770,2147188869241419353,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2940 /prefetch:82⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3202215156522384770,2147188869241419353,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3202215156522384770,2147188869241419353,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:2816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,3202215156522384770,2147188869241419353,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5868 /prefetch:82⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,3202215156522384770,2147188869241419353,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5868 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3202215156522384770,2147188869241419353,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4964 /prefetch:12⤵PID:884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3202215156522384770,2147188869241419353,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3202215156522384770,2147188869241419353,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4608 /prefetch:12⤵PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3202215156522384770,2147188869241419353,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:12⤵PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,3202215156522384770,2147188869241419353,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4640 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3044
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4184
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dbac49e66219979194c79f1cf1cb3dd1
SHA14ef87804a04d51ae1fac358f92382548b27f62f2
SHA256f24ed6c5bf4b734a9af4d64e14a80a160bea569f50849f70bf7b7277c4f48562
SHA512bb314d61f53cf7774f6dfb6b772c72f5daf386bc3d27d2bb7a14c65848ee86e6c48e9c5696693ded31846b69b9372a530175df48494e3d61a228e49d43401ad1
-
Filesize
152B
MD5a9e55f5864d6e2afd2fd84e25a3bc228
SHA1a5efcff9e3df6252c7fe8535d505235f82aab276
SHA2560f4df3120e4620555916be8e51c29be8d600d68ae5244efad6a0268aabc8c452
SHA51212f45fa73a6de6dfe17acc8b52b60f2d79008da130730b74cc138c1dcd73ccc99487165e3c8c90dc247359fde272f1ec6b3cf2c5fcb04e5093936144d0558b75
-
Filesize
523B
MD563a820e9b7d1c4e54c6fa448d58354d3
SHA10964baaab36782c3fdabee407a28e1497bf1eca8
SHA256c30a750cb67e16b8db3615008717e754ea55e5dd3591e7156455d3e3ad3d92c5
SHA5120337c7689e4f5c65af61dd0d42588355433fc432cb843ad7d3b78d092f96dc0847eb741fc0c22ebb12e511e8f4fe41263d05b459cf075f6252bd7e6fbcf3ab4b
-
Filesize
5KB
MD50cca91d7d9999a59188ec4b2a8dfd9e4
SHA1687eaa2bb299a8d5b25f8d5595823802c2ecc5ac
SHA2563ae26bfd067216fbbe67a5e0d684632c920be17ec4e6478d2a1a559effdd1812
SHA51286a9e8fd142111c2c25cd934b3bbd65aca41c6607698f4a70854aae99369c181e456638d1906da572265987e6d43a138ea8304870444e2b4ee2b5a0a4a8d9e16
-
Filesize
6KB
MD57ef66c1c68f5c79134ac19e38c5a742d
SHA1cf0efa35def27d48d9eedc36051ecb5003a99797
SHA25677c4aeac57ff5b706e8a09f6d0ad3db72b3f0e1b1b9280b6a1741dc04e57a9c7
SHA51298435fd3551b33908f044575f1965a9ace090b3eab17cb2c2759979e77e6299cd8f1e166dba626932fa9c13fbe9e6ff4a8ecc6f4b8950e9d434b0f8d86ded16b
-
Filesize
6KB
MD544e56ca923bd90f13d45b5b564c7a4cb
SHA1d7d7957617f552a4a3754bb520a37dfc51744302
SHA256aa2a57574d0d5d410e8ad279cf57c6b52a16f8cd549674cec44f6a0793bd6194
SHA512ef817b6eb2b5209e062ba1e48c375df16a2fb874015468122722eef71b1dd76e001ca12fc5c9edb6cbf581900b5c68c75766f5557962f2b8046d564e95691f7c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57ea54164f557c01fbe7adbb0d37c196c
SHA1806ad63981349422eca18bc367bdd4d512e60879
SHA25638324b11d04668bc31e59a60e95a0f041f859f1cc5da2dbc71fb1a14825896f6
SHA512cf14e24d18ed4be7dd3dadc07630aa163cc12e86f3a852bb588b8107168174e2f2a5bc4d62a20db44d0686f80abfbf6dc2a832fada160aab97c5c477741bf59b