Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 16:43
Static task
static1
Behavioral task
behavioral1
Sample
25c4cd9329b1a66b9765ec150377f7b7_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
25c4cd9329b1a66b9765ec150377f7b7_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
25c4cd9329b1a66b9765ec150377f7b7_JaffaCakes118.html
-
Size
4KB
-
MD5
25c4cd9329b1a66b9765ec150377f7b7
-
SHA1
f3ee75f10f058f16240d15539360c22b138de674
-
SHA256
a9fc599917f79a73fb3053b68a3611c4d39c52c58748d54564026c8af7e13f79
-
SHA512
c3db76faae0bb4d67efe8727c865374e6854b613fa9078e70196993d1f947e64f0345db5cb2d264b1c4d2a026f09a4690655dc4cb5a036d3921d9d6aadc5e6d6
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8od1WLvyd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDs
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2196 msedge.exe 2196 msedge.exe 356 msedge.exe 356 msedge.exe 3300 identity_helper.exe 3300 identity_helper.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 356 msedge.exe 356 msedge.exe 356 msedge.exe 356 msedge.exe 356 msedge.exe 356 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 356 msedge.exe 356 msedge.exe 356 msedge.exe 356 msedge.exe 356 msedge.exe 356 msedge.exe 356 msedge.exe 356 msedge.exe 356 msedge.exe 356 msedge.exe 356 msedge.exe 356 msedge.exe 356 msedge.exe 356 msedge.exe 356 msedge.exe 356 msedge.exe 356 msedge.exe 356 msedge.exe 356 msedge.exe 356 msedge.exe 356 msedge.exe 356 msedge.exe 356 msedge.exe 356 msedge.exe 356 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 356 msedge.exe 356 msedge.exe 356 msedge.exe 356 msedge.exe 356 msedge.exe 356 msedge.exe 356 msedge.exe 356 msedge.exe 356 msedge.exe 356 msedge.exe 356 msedge.exe 356 msedge.exe 356 msedge.exe 356 msedge.exe 356 msedge.exe 356 msedge.exe 356 msedge.exe 356 msedge.exe 356 msedge.exe 356 msedge.exe 356 msedge.exe 356 msedge.exe 356 msedge.exe 356 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 356 wrote to memory of 3800 356 msedge.exe 83 PID 356 wrote to memory of 3800 356 msedge.exe 83 PID 356 wrote to memory of 2104 356 msedge.exe 84 PID 356 wrote to memory of 2104 356 msedge.exe 84 PID 356 wrote to memory of 2104 356 msedge.exe 84 PID 356 wrote to memory of 2104 356 msedge.exe 84 PID 356 wrote to memory of 2104 356 msedge.exe 84 PID 356 wrote to memory of 2104 356 msedge.exe 84 PID 356 wrote to memory of 2104 356 msedge.exe 84 PID 356 wrote to memory of 2104 356 msedge.exe 84 PID 356 wrote to memory of 2104 356 msedge.exe 84 PID 356 wrote to memory of 2104 356 msedge.exe 84 PID 356 wrote to memory of 2104 356 msedge.exe 84 PID 356 wrote to memory of 2104 356 msedge.exe 84 PID 356 wrote to memory of 2104 356 msedge.exe 84 PID 356 wrote to memory of 2104 356 msedge.exe 84 PID 356 wrote to memory of 2104 356 msedge.exe 84 PID 356 wrote to memory of 2104 356 msedge.exe 84 PID 356 wrote to memory of 2104 356 msedge.exe 84 PID 356 wrote to memory of 2104 356 msedge.exe 84 PID 356 wrote to memory of 2104 356 msedge.exe 84 PID 356 wrote to memory of 2104 356 msedge.exe 84 PID 356 wrote to memory of 2104 356 msedge.exe 84 PID 356 wrote to memory of 2104 356 msedge.exe 84 PID 356 wrote to memory of 2104 356 msedge.exe 84 PID 356 wrote to memory of 2104 356 msedge.exe 84 PID 356 wrote to memory of 2104 356 msedge.exe 84 PID 356 wrote to memory of 2104 356 msedge.exe 84 PID 356 wrote to memory of 2104 356 msedge.exe 84 PID 356 wrote to memory of 2104 356 msedge.exe 84 PID 356 wrote to memory of 2104 356 msedge.exe 84 PID 356 wrote to memory of 2104 356 msedge.exe 84 PID 356 wrote to memory of 2104 356 msedge.exe 84 PID 356 wrote to memory of 2104 356 msedge.exe 84 PID 356 wrote to memory of 2104 356 msedge.exe 84 PID 356 wrote to memory of 2104 356 msedge.exe 84 PID 356 wrote to memory of 2104 356 msedge.exe 84 PID 356 wrote to memory of 2104 356 msedge.exe 84 PID 356 wrote to memory of 2104 356 msedge.exe 84 PID 356 wrote to memory of 2104 356 msedge.exe 84 PID 356 wrote to memory of 2104 356 msedge.exe 84 PID 356 wrote to memory of 2104 356 msedge.exe 84 PID 356 wrote to memory of 2196 356 msedge.exe 85 PID 356 wrote to memory of 2196 356 msedge.exe 85 PID 356 wrote to memory of 4924 356 msedge.exe 86 PID 356 wrote to memory of 4924 356 msedge.exe 86 PID 356 wrote to memory of 4924 356 msedge.exe 86 PID 356 wrote to memory of 4924 356 msedge.exe 86 PID 356 wrote to memory of 4924 356 msedge.exe 86 PID 356 wrote to memory of 4924 356 msedge.exe 86 PID 356 wrote to memory of 4924 356 msedge.exe 86 PID 356 wrote to memory of 4924 356 msedge.exe 86 PID 356 wrote to memory of 4924 356 msedge.exe 86 PID 356 wrote to memory of 4924 356 msedge.exe 86 PID 356 wrote to memory of 4924 356 msedge.exe 86 PID 356 wrote to memory of 4924 356 msedge.exe 86 PID 356 wrote to memory of 4924 356 msedge.exe 86 PID 356 wrote to memory of 4924 356 msedge.exe 86 PID 356 wrote to memory of 4924 356 msedge.exe 86 PID 356 wrote to memory of 4924 356 msedge.exe 86 PID 356 wrote to memory of 4924 356 msedge.exe 86 PID 356 wrote to memory of 4924 356 msedge.exe 86 PID 356 wrote to memory of 4924 356 msedge.exe 86 PID 356 wrote to memory of 4924 356 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\25c4cd9329b1a66b9765ec150377f7b7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:356 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd7e6746f8,0x7ffd7e674708,0x7ffd7e6747182⤵PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2256,11261849557504197816,6729991782419105918,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2268 /prefetch:22⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2256,11261849557504197816,6729991782419105918,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2256,11261849557504197816,6729991782419105918,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2588 /prefetch:82⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,11261849557504197816,6729991782419105918,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,11261849557504197816,6729991782419105918,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2256,11261849557504197816,6729991782419105918,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 /prefetch:82⤵PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2256,11261849557504197816,6729991782419105918,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,11261849557504197816,6729991782419105918,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,11261849557504197816,6729991782419105918,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,11261849557504197816,6729991782419105918,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4136 /prefetch:12⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,11261849557504197816,6729991782419105918,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2256,11261849557504197816,6729991782419105918,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2252 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3192
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2156
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
292B
MD556d0fcf3e9a76ec78b87a540bcb662f5
SHA17c312074875ac1a58a7eced4f514f3e576f9a476
SHA2569e1483a78a5ac4605a044f50c52afe8f5184d7f3d5cbbc842264b8119d511f13
SHA512629841240b1353fe8c5a34f9877d75e489a6ad134c5958d021ada276505d369cc2a5893441c731e0e9c4a012c966177692b4d6f94d7d2d1e50c5f20f917451d6
-
Filesize
6KB
MD5c3f49b3c692f92630f4cc698fe408945
SHA16c1574730e1a7b26850ae977af0fa02b87410e71
SHA25636349347f6e32d4e5d70f06eca72843889d854b90a720c6ce14afb0fb6c21552
SHA51287daed8473e31d52b55e752ea7418187dee8e64d0ebeca312d76341138deabd0393d236acfc5600403e57728bf07c468fc0f62fc0c41a633389ce6c95e488bdd
-
Filesize
6KB
MD5fb9f0719b4df02f562e30118b339cf85
SHA104e82c6c225c19f7d8999a8960999ac6d85fddec
SHA256f37615e0b55600310d2d9e36ac2b6dc4d877a69cb3cb25de0d605fba26bd29bb
SHA5121430807198e6b6de565dc2ae4baad48bd5f5c841a5ab34399e23cb5ee10bf222d53532c54f8c23b28fee40936a53898d498f2d49b1da0c9472220e6bf21d94dc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b52337a06e93a3eacbe3789bf864c980
SHA1b077d3f60c6966ad5153955ae33956e1842ecaf3
SHA2568bbf90a5a460580a3bcf61c754a2401c3314832ed51b21a37ce6ed010bbb8191
SHA51298d684b5aa66044a7dc5e34bbf5769ffeecf883cc1a9eb7289c0abed6c2a60febec2eff7d898e64a48178e9e494e136e44eb252a2e829c2b4d7cce6d26e059d6