Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 14:53
Static task
static1
Behavioral task
behavioral1
Sample
255b84adae9678f21f2b5a4d6cc279ca_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
255b84adae9678f21f2b5a4d6cc279ca_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
255b84adae9678f21f2b5a4d6cc279ca_JaffaCakes118.html
-
Size
27KB
-
MD5
255b84adae9678f21f2b5a4d6cc279ca
-
SHA1
e7aedb6fe6313eecd8630b9633441cede2940dfc
-
SHA256
d1a7687c1d474c0632eb7a0c3ac856c58fd01625e07176dd00d57f900bc37faa
-
SHA512
6e4ed3bc85e1f8fa87275c2bf3c15336ab862f1431c8f51dabc22b119a37220bc2e0a7096a5346f66cd0b6ba1063ba29a290853664b37262f7105dbd068961f6
-
SSDEEP
192:1fozoFQkb5nSQnQjLntQ/wnQieWnCnQOkrntWRnQTbnonQ/krAlRo7St7o+Ewrsi:1Qzo+H7Q/fuGAxjd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 876 msedge.exe 876 msedge.exe 5264 msedge.exe 5264 msedge.exe 5948 identity_helper.exe 5948 identity_helper.exe 5792 msedge.exe 5792 msedge.exe 5792 msedge.exe 5792 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5264 msedge.exe 5264 msedge.exe 5264 msedge.exe 5264 msedge.exe 5264 msedge.exe 5264 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5264 msedge.exe 5264 msedge.exe 5264 msedge.exe 5264 msedge.exe 5264 msedge.exe 5264 msedge.exe 5264 msedge.exe 5264 msedge.exe 5264 msedge.exe 5264 msedge.exe 5264 msedge.exe 5264 msedge.exe 5264 msedge.exe 5264 msedge.exe 5264 msedge.exe 5264 msedge.exe 5264 msedge.exe 5264 msedge.exe 5264 msedge.exe 5264 msedge.exe 5264 msedge.exe 5264 msedge.exe 5264 msedge.exe 5264 msedge.exe 5264 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5264 msedge.exe 5264 msedge.exe 5264 msedge.exe 5264 msedge.exe 5264 msedge.exe 5264 msedge.exe 5264 msedge.exe 5264 msedge.exe 5264 msedge.exe 5264 msedge.exe 5264 msedge.exe 5264 msedge.exe 5264 msedge.exe 5264 msedge.exe 5264 msedge.exe 5264 msedge.exe 5264 msedge.exe 5264 msedge.exe 5264 msedge.exe 5264 msedge.exe 5264 msedge.exe 5264 msedge.exe 5264 msedge.exe 5264 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5264 wrote to memory of 4780 5264 msedge.exe 83 PID 5264 wrote to memory of 4780 5264 msedge.exe 83 PID 5264 wrote to memory of 716 5264 msedge.exe 84 PID 5264 wrote to memory of 716 5264 msedge.exe 84 PID 5264 wrote to memory of 716 5264 msedge.exe 84 PID 5264 wrote to memory of 716 5264 msedge.exe 84 PID 5264 wrote to memory of 716 5264 msedge.exe 84 PID 5264 wrote to memory of 716 5264 msedge.exe 84 PID 5264 wrote to memory of 716 5264 msedge.exe 84 PID 5264 wrote to memory of 716 5264 msedge.exe 84 PID 5264 wrote to memory of 716 5264 msedge.exe 84 PID 5264 wrote to memory of 716 5264 msedge.exe 84 PID 5264 wrote to memory of 716 5264 msedge.exe 84 PID 5264 wrote to memory of 716 5264 msedge.exe 84 PID 5264 wrote to memory of 716 5264 msedge.exe 84 PID 5264 wrote to memory of 716 5264 msedge.exe 84 PID 5264 wrote to memory of 716 5264 msedge.exe 84 PID 5264 wrote to memory of 716 5264 msedge.exe 84 PID 5264 wrote to memory of 716 5264 msedge.exe 84 PID 5264 wrote to memory of 716 5264 msedge.exe 84 PID 5264 wrote to memory of 716 5264 msedge.exe 84 PID 5264 wrote to memory of 716 5264 msedge.exe 84 PID 5264 wrote to memory of 716 5264 msedge.exe 84 PID 5264 wrote to memory of 716 5264 msedge.exe 84 PID 5264 wrote to memory of 716 5264 msedge.exe 84 PID 5264 wrote to memory of 716 5264 msedge.exe 84 PID 5264 wrote to memory of 716 5264 msedge.exe 84 PID 5264 wrote to memory of 716 5264 msedge.exe 84 PID 5264 wrote to memory of 716 5264 msedge.exe 84 PID 5264 wrote to memory of 716 5264 msedge.exe 84 PID 5264 wrote to memory of 716 5264 msedge.exe 84 PID 5264 wrote to memory of 716 5264 msedge.exe 84 PID 5264 wrote to memory of 716 5264 msedge.exe 84 PID 5264 wrote to memory of 716 5264 msedge.exe 84 PID 5264 wrote to memory of 716 5264 msedge.exe 84 PID 5264 wrote to memory of 716 5264 msedge.exe 84 PID 5264 wrote to memory of 716 5264 msedge.exe 84 PID 5264 wrote to memory of 716 5264 msedge.exe 84 PID 5264 wrote to memory of 716 5264 msedge.exe 84 PID 5264 wrote to memory of 716 5264 msedge.exe 84 PID 5264 wrote to memory of 716 5264 msedge.exe 84 PID 5264 wrote to memory of 716 5264 msedge.exe 84 PID 5264 wrote to memory of 876 5264 msedge.exe 85 PID 5264 wrote to memory of 876 5264 msedge.exe 85 PID 5264 wrote to memory of 1664 5264 msedge.exe 86 PID 5264 wrote to memory of 1664 5264 msedge.exe 86 PID 5264 wrote to memory of 1664 5264 msedge.exe 86 PID 5264 wrote to memory of 1664 5264 msedge.exe 86 PID 5264 wrote to memory of 1664 5264 msedge.exe 86 PID 5264 wrote to memory of 1664 5264 msedge.exe 86 PID 5264 wrote to memory of 1664 5264 msedge.exe 86 PID 5264 wrote to memory of 1664 5264 msedge.exe 86 PID 5264 wrote to memory of 1664 5264 msedge.exe 86 PID 5264 wrote to memory of 1664 5264 msedge.exe 86 PID 5264 wrote to memory of 1664 5264 msedge.exe 86 PID 5264 wrote to memory of 1664 5264 msedge.exe 86 PID 5264 wrote to memory of 1664 5264 msedge.exe 86 PID 5264 wrote to memory of 1664 5264 msedge.exe 86 PID 5264 wrote to memory of 1664 5264 msedge.exe 86 PID 5264 wrote to memory of 1664 5264 msedge.exe 86 PID 5264 wrote to memory of 1664 5264 msedge.exe 86 PID 5264 wrote to memory of 1664 5264 msedge.exe 86 PID 5264 wrote to memory of 1664 5264 msedge.exe 86 PID 5264 wrote to memory of 1664 5264 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\255b84adae9678f21f2b5a4d6cc279ca_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5264 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbf32f46f8,0x7ffbf32f4708,0x7ffbf32f47182⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,6415919861593595138,13447659250109817490,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,6415919861593595138,13447659250109817490,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,6415919861593595138,13447659250109817490,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6415919861593595138,13447659250109817490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:5380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6415919861593595138,13447659250109817490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,6415919861593595138,13447659250109817490,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5040 /prefetch:82⤵PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,6415919861593595138,13447659250109817490,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5040 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6415919861593595138,13447659250109817490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6415919861593595138,13447659250109817490,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=64 /prefetch:12⤵PID:816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6415919861593595138,13447659250109817490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6415919861593595138,13447659250109817490,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4628 /prefetch:12⤵PID:5476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,6415919861593595138,13447659250109817490,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5792
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3816
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
6KB
MD5417fea7baaae2d711afe6cc766dd11f8
SHA1a7c6d496181f174eff22607794fb15e8829ee6aa
SHA2563f757d34aaef25bfa7a32e36266582f70987d278a8e0857bbc725fefc6f8167d
SHA512c472c27c17855c88f2aa4fd85a362a5c8fc656216b16efda42d73a3266af5cb86bafb342e683ff17f824ff2dfce5d9652b10fea6ebcc5075738bd397a36b1071
-
Filesize
6KB
MD51d502e2e61b73d650c32ea9b34f7fac6
SHA119ae974dc9472df61b11e11bdb3c66b5eb0eb329
SHA25691fb2ba360eb9109069958d088002e5f686fc97d4d1b684e8c2785ac5d9f95a3
SHA512960e8bb678c408e5cd092c1249a0db742a1f2ee74e224dbaa38fd38ef9daea88d9e69ebee29483378b23cb2e34de4be2ba217b0b43b4db6886482f07c93a6995
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57d570fddfb26e1efa8e8c66b2b633428
SHA1615415f3752ff85cbd4f02f01a98a6552dfc5120
SHA2569b51d6e7e262e93ef7097775540d247e73e7cc7ecc294694c98a1fd281c7472f
SHA5127801a3bc973423c132cf9256d71fe778a4f3c8fc14f746a4c0774bab9fa54521c8cf2407176fd23497accb53f0679625d926447c85f4a62fc2a0a61c279fe0d7