Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 00:09
Static task
static1
Behavioral task
behavioral1
Sample
275d7807514b6578a5e5a6e6b884d51a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
275d7807514b6578a5e5a6e6b884d51a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
275d7807514b6578a5e5a6e6b884d51a_JaffaCakes118.html
-
Size
32KB
-
MD5
275d7807514b6578a5e5a6e6b884d51a
-
SHA1
b761d91da78ce820e74ef42ce62051ab879d8c2a
-
SHA256
01ecdbd99c4b9618889a4be55a536423215488125925854a76d6819507cc96d4
-
SHA512
5a9fd67eb96028a02f36ec8b4c936d96a3fd4aebcb4c89342bf8df05e6c1c471cc40cc4b97f9d9eb6b0bc4567494f481474b8eae3cee905616e6c3806ea8ed2a
-
SSDEEP
192:uWDFb5nIlnQjxn5Q/fnQie2NnonQOkEntJVnQTbnlnQVMCaAbbLU/IfyINcsitOf:TQ/Ow4LuxVP2ZIAlkJOv
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4960 msedge.exe 4960 msedge.exe 3408 msedge.exe 3408 msedge.exe 856 identity_helper.exe 856 identity_helper.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3408 wrote to memory of 1332 3408 msedge.exe 82 PID 3408 wrote to memory of 1332 3408 msedge.exe 82 PID 3408 wrote to memory of 100 3408 msedge.exe 83 PID 3408 wrote to memory of 100 3408 msedge.exe 83 PID 3408 wrote to memory of 100 3408 msedge.exe 83 PID 3408 wrote to memory of 100 3408 msedge.exe 83 PID 3408 wrote to memory of 100 3408 msedge.exe 83 PID 3408 wrote to memory of 100 3408 msedge.exe 83 PID 3408 wrote to memory of 100 3408 msedge.exe 83 PID 3408 wrote to memory of 100 3408 msedge.exe 83 PID 3408 wrote to memory of 100 3408 msedge.exe 83 PID 3408 wrote to memory of 100 3408 msedge.exe 83 PID 3408 wrote to memory of 100 3408 msedge.exe 83 PID 3408 wrote to memory of 100 3408 msedge.exe 83 PID 3408 wrote to memory of 100 3408 msedge.exe 83 PID 3408 wrote to memory of 100 3408 msedge.exe 83 PID 3408 wrote to memory of 100 3408 msedge.exe 83 PID 3408 wrote to memory of 100 3408 msedge.exe 83 PID 3408 wrote to memory of 100 3408 msedge.exe 83 PID 3408 wrote to memory of 100 3408 msedge.exe 83 PID 3408 wrote to memory of 100 3408 msedge.exe 83 PID 3408 wrote to memory of 100 3408 msedge.exe 83 PID 3408 wrote to memory of 100 3408 msedge.exe 83 PID 3408 wrote to memory of 100 3408 msedge.exe 83 PID 3408 wrote to memory of 100 3408 msedge.exe 83 PID 3408 wrote to memory of 100 3408 msedge.exe 83 PID 3408 wrote to memory of 100 3408 msedge.exe 83 PID 3408 wrote to memory of 100 3408 msedge.exe 83 PID 3408 wrote to memory of 100 3408 msedge.exe 83 PID 3408 wrote to memory of 100 3408 msedge.exe 83 PID 3408 wrote to memory of 100 3408 msedge.exe 83 PID 3408 wrote to memory of 100 3408 msedge.exe 83 PID 3408 wrote to memory of 100 3408 msedge.exe 83 PID 3408 wrote to memory of 100 3408 msedge.exe 83 PID 3408 wrote to memory of 100 3408 msedge.exe 83 PID 3408 wrote to memory of 100 3408 msedge.exe 83 PID 3408 wrote to memory of 100 3408 msedge.exe 83 PID 3408 wrote to memory of 100 3408 msedge.exe 83 PID 3408 wrote to memory of 100 3408 msedge.exe 83 PID 3408 wrote to memory of 100 3408 msedge.exe 83 PID 3408 wrote to memory of 100 3408 msedge.exe 83 PID 3408 wrote to memory of 100 3408 msedge.exe 83 PID 3408 wrote to memory of 4960 3408 msedge.exe 84 PID 3408 wrote to memory of 4960 3408 msedge.exe 84 PID 3408 wrote to memory of 3228 3408 msedge.exe 85 PID 3408 wrote to memory of 3228 3408 msedge.exe 85 PID 3408 wrote to memory of 3228 3408 msedge.exe 85 PID 3408 wrote to memory of 3228 3408 msedge.exe 85 PID 3408 wrote to memory of 3228 3408 msedge.exe 85 PID 3408 wrote to memory of 3228 3408 msedge.exe 85 PID 3408 wrote to memory of 3228 3408 msedge.exe 85 PID 3408 wrote to memory of 3228 3408 msedge.exe 85 PID 3408 wrote to memory of 3228 3408 msedge.exe 85 PID 3408 wrote to memory of 3228 3408 msedge.exe 85 PID 3408 wrote to memory of 3228 3408 msedge.exe 85 PID 3408 wrote to memory of 3228 3408 msedge.exe 85 PID 3408 wrote to memory of 3228 3408 msedge.exe 85 PID 3408 wrote to memory of 3228 3408 msedge.exe 85 PID 3408 wrote to memory of 3228 3408 msedge.exe 85 PID 3408 wrote to memory of 3228 3408 msedge.exe 85 PID 3408 wrote to memory of 3228 3408 msedge.exe 85 PID 3408 wrote to memory of 3228 3408 msedge.exe 85 PID 3408 wrote to memory of 3228 3408 msedge.exe 85 PID 3408 wrote to memory of 3228 3408 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\275d7807514b6578a5e5a6e6b884d51a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff1e8a46f8,0x7fff1e8a4708,0x7fff1e8a47182⤵PID:1332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,14538417049053607179,2426120718904628288,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,14538417049053607179,2426120718904628288,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,14538417049053607179,2426120718904628288,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2592 /prefetch:82⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,14538417049053607179,2426120718904628288,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2600 /prefetch:12⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,14538417049053607179,2426120718904628288,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,14538417049053607179,2426120718904628288,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,14538417049053607179,2426120718904628288,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,14538417049053607179,2426120718904628288,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:12⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,14538417049053607179,2426120718904628288,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:12⤵PID:1636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,14538417049053607179,2426120718904628288,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:12⤵PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,14538417049053607179,2426120718904628288,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3464 /prefetch:12⤵PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,14538417049053607179,2426120718904628288,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1840 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4712
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2184
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1576
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
6KB
MD58f0bb2c3e50918145b8405cfb88722e0
SHA1fe7b4dd350b3a5c1c1e1253bc9bb827a6b40f259
SHA256e101e0a9c0d1a9138a281bbef900c19e0d832e94affa42b4b6419984d100b1f6
SHA512f272a8ca8bcb79522dbe107e4476090cb7f802b8b927c9a95ca366999fde90f5b68bdc3e043bd7cda9a2c8b37de68ffe71fae0edfae76448c51cbc6628609ce7
-
Filesize
5KB
MD59d419475469421565a078fa67762dedb
SHA1ee0080334859c7ae42db1bf96f5939c597fc1543
SHA2566da83a331c8b55484df6b60725284b300dc6289ee28a7a552155557b1f930f28
SHA51218365d3b249061fa4c150e4266cf3554c8f156b9761446196bd33b3959b9f887df6aa2b94f79d4c0cb842953f230e63f130118e65d599f88a1cf10a0e5636494
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a01f083d584f44de7b781f0422018bfe
SHA12bc3a5e6581ddf144c870017c6b98816db7ff375
SHA256b6e109a8bd2fa1a6ef442a2401e80737a95c90b902e4afa68556c92d2d9c341f
SHA512411eb31a9651f976f6a1510cc60a8e8bcc6fb2cfc1415095269c74a5abbaf12b21a6c6235d51e1693eb9c1c138fab9a61ccfd56513a2eec02fdd82050a38048e