Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 00:15
Static task
static1
Behavioral task
behavioral1
Sample
276338714f63483dd42bfba525595baa_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
276338714f63483dd42bfba525595baa_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
276338714f63483dd42bfba525595baa_JaffaCakes118.html
-
Size
25KB
-
MD5
276338714f63483dd42bfba525595baa
-
SHA1
b9210ee1f1d8264272d3a51a1889d3eca678320d
-
SHA256
a482dd031f353c3f35618602d51d64d05af53a87e9f0288a6d5f6255b3e16ea7
-
SHA512
d2cda439c0ac065442ead63743b6cd6036f3b385c579d001a8d842cea8197ae679c21ddab66d13322fc552e74dc38a6b03511f971f906b318334d64ebe01c13e
-
SSDEEP
384:chvirsIrJnLWVFmzMZQrpRt9TcEEM9fj74njILfvoNteOzzt7rFjFSyiJNFDp2ht:chvoKUfvmJUANZGI+xa
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 624 msedge.exe 624 msedge.exe 632 msedge.exe 632 msedge.exe 3960 identity_helper.exe 3960 identity_helper.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 632 wrote to memory of 4932 632 msedge.exe 79 PID 632 wrote to memory of 4932 632 msedge.exe 79 PID 632 wrote to memory of 1636 632 msedge.exe 81 PID 632 wrote to memory of 1636 632 msedge.exe 81 PID 632 wrote to memory of 1636 632 msedge.exe 81 PID 632 wrote to memory of 1636 632 msedge.exe 81 PID 632 wrote to memory of 1636 632 msedge.exe 81 PID 632 wrote to memory of 1636 632 msedge.exe 81 PID 632 wrote to memory of 1636 632 msedge.exe 81 PID 632 wrote to memory of 1636 632 msedge.exe 81 PID 632 wrote to memory of 1636 632 msedge.exe 81 PID 632 wrote to memory of 1636 632 msedge.exe 81 PID 632 wrote to memory of 1636 632 msedge.exe 81 PID 632 wrote to memory of 1636 632 msedge.exe 81 PID 632 wrote to memory of 1636 632 msedge.exe 81 PID 632 wrote to memory of 1636 632 msedge.exe 81 PID 632 wrote to memory of 1636 632 msedge.exe 81 PID 632 wrote to memory of 1636 632 msedge.exe 81 PID 632 wrote to memory of 1636 632 msedge.exe 81 PID 632 wrote to memory of 1636 632 msedge.exe 81 PID 632 wrote to memory of 1636 632 msedge.exe 81 PID 632 wrote to memory of 1636 632 msedge.exe 81 PID 632 wrote to memory of 1636 632 msedge.exe 81 PID 632 wrote to memory of 1636 632 msedge.exe 81 PID 632 wrote to memory of 1636 632 msedge.exe 81 PID 632 wrote to memory of 1636 632 msedge.exe 81 PID 632 wrote to memory of 1636 632 msedge.exe 81 PID 632 wrote to memory of 1636 632 msedge.exe 81 PID 632 wrote to memory of 1636 632 msedge.exe 81 PID 632 wrote to memory of 1636 632 msedge.exe 81 PID 632 wrote to memory of 1636 632 msedge.exe 81 PID 632 wrote to memory of 1636 632 msedge.exe 81 PID 632 wrote to memory of 1636 632 msedge.exe 81 PID 632 wrote to memory of 1636 632 msedge.exe 81 PID 632 wrote to memory of 1636 632 msedge.exe 81 PID 632 wrote to memory of 1636 632 msedge.exe 81 PID 632 wrote to memory of 1636 632 msedge.exe 81 PID 632 wrote to memory of 1636 632 msedge.exe 81 PID 632 wrote to memory of 1636 632 msedge.exe 81 PID 632 wrote to memory of 1636 632 msedge.exe 81 PID 632 wrote to memory of 1636 632 msedge.exe 81 PID 632 wrote to memory of 1636 632 msedge.exe 81 PID 632 wrote to memory of 624 632 msedge.exe 82 PID 632 wrote to memory of 624 632 msedge.exe 82 PID 632 wrote to memory of 1684 632 msedge.exe 83 PID 632 wrote to memory of 1684 632 msedge.exe 83 PID 632 wrote to memory of 1684 632 msedge.exe 83 PID 632 wrote to memory of 1684 632 msedge.exe 83 PID 632 wrote to memory of 1684 632 msedge.exe 83 PID 632 wrote to memory of 1684 632 msedge.exe 83 PID 632 wrote to memory of 1684 632 msedge.exe 83 PID 632 wrote to memory of 1684 632 msedge.exe 83 PID 632 wrote to memory of 1684 632 msedge.exe 83 PID 632 wrote to memory of 1684 632 msedge.exe 83 PID 632 wrote to memory of 1684 632 msedge.exe 83 PID 632 wrote to memory of 1684 632 msedge.exe 83 PID 632 wrote to memory of 1684 632 msedge.exe 83 PID 632 wrote to memory of 1684 632 msedge.exe 83 PID 632 wrote to memory of 1684 632 msedge.exe 83 PID 632 wrote to memory of 1684 632 msedge.exe 83 PID 632 wrote to memory of 1684 632 msedge.exe 83 PID 632 wrote to memory of 1684 632 msedge.exe 83 PID 632 wrote to memory of 1684 632 msedge.exe 83 PID 632 wrote to memory of 1684 632 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\276338714f63483dd42bfba525595baa_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa5a1a46f8,0x7ffa5a1a4708,0x7ffa5a1a47182⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,5058283942144323353,12709928916937181561,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:1636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,5058283942144323353,12709928916937181561,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2344 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,5058283942144323353,12709928916937181561,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5058283942144323353,12709928916937181561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5058283942144323353,12709928916937181561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5058283942144323353,12709928916937181561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:12⤵PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5058283942144323353,12709928916937181561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5058283942144323353,12709928916937181561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5058283942144323353,12709928916937181561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5872 /prefetch:12⤵PID:3300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,5058283942144323353,12709928916937181561,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6592 /prefetch:82⤵PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,5058283942144323353,12709928916937181561,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6592 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5058283942144323353,12709928916937181561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6600 /prefetch:12⤵PID:2444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5058283942144323353,12709928916937181561,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6384 /prefetch:12⤵PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5058283942144323353,12709928916937181561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4564 /prefetch:12⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5058283942144323353,12709928916937181561,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5968 /prefetch:12⤵PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,5058283942144323353,12709928916937181561,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4800 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3584
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4084
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4612
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4296
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\903a7743-4df4-4562-8990-b6f34cb1065f.tmp
Filesize7KB
MD54bec21bf533f21674988f88dc788c210
SHA1244c50f5678f915b2670e463749a9511f8893b2f
SHA256685e77567d1e821ddfd3f1a32f37d6ca4050b413f00dca51245186ac97921940
SHA512c4be716924e886cf2e892b7d418fe8aa8b6f7156bcea8b896afd46ac4bfd52de00b7cac4c87d466e4f3d3765bdc1d519920f2225910a100f08e203ca26baefb9
-
Filesize
288B
MD526c84741f300417d9453671a41f96ca6
SHA1b37e9a6722c337f606dbad95f10e1e15dc4e3420
SHA256d87c62a4e95e12b6a1168fb605b820bcfabbf689dc49b1129d475e0bce6f77e7
SHA5128e97b816965b71e1a0217645c8345278e39f60fafa618be94cdefe6a018a8209f34822e1fd18f101737f7747295e0876e41832e9d9db4292c9c913b157e6583a
-
Filesize
2KB
MD5074280cb1ca7f94f51270c4fb57295f9
SHA1c684d1b8c6eb0696c7d7f65b9ea1a0cb704e4008
SHA2561c2f593a3033346c467e845ec0ec9133eb61d43439b38e16b4494cd43b5acf6b
SHA51276a0b391288133ce88bbc78065548d3ebb40ffba7ab1147e2bbee0fe62e11c84f233d49928a597134ef9e2849863a0cf05a96526ee1bb252100cc390e32071e9
-
Filesize
2KB
MD50b1eff6312733b85619e8ac1d83fa2b6
SHA16f39e14086b5b456152bf08a71e4ec598b0e3c7b
SHA256f7d862d693c14232f613280f54faf8e285068ccd2a4d6425e4e077938bf3e71d
SHA5124a624087444c1cb250de07116332a0384b4f1df35e9d7be2b01ef710d74b47b41ec36b6db7a75c6254ed0165643a865ee04bf644c948becbbe0651bb5fa6fc7e
-
Filesize
6KB
MD59d4ede9f8d9a365f89ccee009c816036
SHA1988eb47766a5e78545f2570308c67ccced993d7b
SHA2563952fb3ebbd523e6b5554c9f35a1d4b9f179f2b8aa49e3d9ea6cb12f6c46dc14
SHA5125f8b8d13164f43879c48f812ef862ccf2334a14ec6bbaa98672cac3f3573a1a9f75e678cf94bc6e518356f160937022bab58a91b35ba934b2dafdcb6edffd6d3
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD54fac678111836b29433995004b13596c
SHA1fbc998755ba4cb74a0219277f6d50a23fd4224f0
SHA256ccf224dbe2d5865d11a4fbbddaa3cb00a8f416b00869607bfe41cb4ee9a8ea68
SHA51291dc675521846bec599ee58d24924b9c3f15627ca394dea17dd4e8fe6cf8e3ed21979694efe11e734649cfad5e5f36336a4d147fa97973cc272d08a1b443c3c1