Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 02:56
Static task
static1
Behavioral task
behavioral1
Sample
27f5be76e720f28e2e26c3fa80a37789_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
27f5be76e720f28e2e26c3fa80a37789_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
27f5be76e720f28e2e26c3fa80a37789_JaffaCakes118.html
-
Size
224KB
-
MD5
27f5be76e720f28e2e26c3fa80a37789
-
SHA1
5493e7e20575e97a095d8a1b9803eb8dd2a754cb
-
SHA256
3065f5891554ed235ab6ba7be1b2cd59e7aa932544e8793b630d145d9c6ea550
-
SHA512
f495b37d3ee005c91ba2c424adda0e2d500845d865a0d7f05153ece96ee92ac6640f8a3283e29ea17179eb20bd37ebcc8fde238665c12b34cf5a975246139e52
-
SSDEEP
1536:ZFOOaDOJ1wIbkdEDHtEz0b22anerm12ZT/Lpyrm64frr+70dNkYZeF6:1aDOJ1nkdkMiLpyKMuNkYZeF6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2968 msedge.exe 2968 msedge.exe 224 msedge.exe 224 msedge.exe 2468 identity_helper.exe 2468 identity_helper.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 224 wrote to memory of 3832 224 msedge.exe 78 PID 224 wrote to memory of 3832 224 msedge.exe 78 PID 224 wrote to memory of 4084 224 msedge.exe 79 PID 224 wrote to memory of 4084 224 msedge.exe 79 PID 224 wrote to memory of 4084 224 msedge.exe 79 PID 224 wrote to memory of 4084 224 msedge.exe 79 PID 224 wrote to memory of 4084 224 msedge.exe 79 PID 224 wrote to memory of 4084 224 msedge.exe 79 PID 224 wrote to memory of 4084 224 msedge.exe 79 PID 224 wrote to memory of 4084 224 msedge.exe 79 PID 224 wrote to memory of 4084 224 msedge.exe 79 PID 224 wrote to memory of 4084 224 msedge.exe 79 PID 224 wrote to memory of 4084 224 msedge.exe 79 PID 224 wrote to memory of 4084 224 msedge.exe 79 PID 224 wrote to memory of 4084 224 msedge.exe 79 PID 224 wrote to memory of 4084 224 msedge.exe 79 PID 224 wrote to memory of 4084 224 msedge.exe 79 PID 224 wrote to memory of 4084 224 msedge.exe 79 PID 224 wrote to memory of 4084 224 msedge.exe 79 PID 224 wrote to memory of 4084 224 msedge.exe 79 PID 224 wrote to memory of 4084 224 msedge.exe 79 PID 224 wrote to memory of 4084 224 msedge.exe 79 PID 224 wrote to memory of 4084 224 msedge.exe 79 PID 224 wrote to memory of 4084 224 msedge.exe 79 PID 224 wrote to memory of 4084 224 msedge.exe 79 PID 224 wrote to memory of 4084 224 msedge.exe 79 PID 224 wrote to memory of 4084 224 msedge.exe 79 PID 224 wrote to memory of 4084 224 msedge.exe 79 PID 224 wrote to memory of 4084 224 msedge.exe 79 PID 224 wrote to memory of 4084 224 msedge.exe 79 PID 224 wrote to memory of 4084 224 msedge.exe 79 PID 224 wrote to memory of 4084 224 msedge.exe 79 PID 224 wrote to memory of 4084 224 msedge.exe 79 PID 224 wrote to memory of 4084 224 msedge.exe 79 PID 224 wrote to memory of 4084 224 msedge.exe 79 PID 224 wrote to memory of 4084 224 msedge.exe 79 PID 224 wrote to memory of 4084 224 msedge.exe 79 PID 224 wrote to memory of 4084 224 msedge.exe 79 PID 224 wrote to memory of 4084 224 msedge.exe 79 PID 224 wrote to memory of 4084 224 msedge.exe 79 PID 224 wrote to memory of 4084 224 msedge.exe 79 PID 224 wrote to memory of 4084 224 msedge.exe 79 PID 224 wrote to memory of 2968 224 msedge.exe 80 PID 224 wrote to memory of 2968 224 msedge.exe 80 PID 224 wrote to memory of 3276 224 msedge.exe 81 PID 224 wrote to memory of 3276 224 msedge.exe 81 PID 224 wrote to memory of 3276 224 msedge.exe 81 PID 224 wrote to memory of 3276 224 msedge.exe 81 PID 224 wrote to memory of 3276 224 msedge.exe 81 PID 224 wrote to memory of 3276 224 msedge.exe 81 PID 224 wrote to memory of 3276 224 msedge.exe 81 PID 224 wrote to memory of 3276 224 msedge.exe 81 PID 224 wrote to memory of 3276 224 msedge.exe 81 PID 224 wrote to memory of 3276 224 msedge.exe 81 PID 224 wrote to memory of 3276 224 msedge.exe 81 PID 224 wrote to memory of 3276 224 msedge.exe 81 PID 224 wrote to memory of 3276 224 msedge.exe 81 PID 224 wrote to memory of 3276 224 msedge.exe 81 PID 224 wrote to memory of 3276 224 msedge.exe 81 PID 224 wrote to memory of 3276 224 msedge.exe 81 PID 224 wrote to memory of 3276 224 msedge.exe 81 PID 224 wrote to memory of 3276 224 msedge.exe 81 PID 224 wrote to memory of 3276 224 msedge.exe 81 PID 224 wrote to memory of 3276 224 msedge.exe 81
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\27f5be76e720f28e2e26c3fa80a37789_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd168946f8,0x7ffd16894708,0x7ffd168947182⤵PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,9713905817120406078,2924154034812922410,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,9713905817120406078,2924154034812922410,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2344 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,9713905817120406078,2924154034812922410,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:82⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,9713905817120406078,2924154034812922410,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,9713905817120406078,2924154034812922410,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,9713905817120406078,2924154034812922410,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 /prefetch:82⤵PID:2088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,9713905817120406078,2924154034812922410,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,9713905817120406078,2924154034812922410,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,9713905817120406078,2924154034812922410,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4248 /prefetch:12⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,9713905817120406078,2924154034812922410,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4048 /prefetch:12⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,9713905817120406078,2924154034812922410,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3828 /prefetch:12⤵PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,9713905817120406078,2924154034812922410,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4880 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1604
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4952
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
1KB
MD5180b04cea727b80d9e62a9866d8fe1a9
SHA1365f2ab0feb81ae37bffcd2cbe668d92622d9769
SHA25638a2c263f19a889ca7b283e3fba56cd5b02f63c341e6faa6e8c6f516635b21cf
SHA512da431c1c0fb1083a89f3f3c92c1bb316d42503317ad93106f7fa1f8942184cc8e735a673ebabfc10461809f8a8bbae6fc4047060123fcde46aa2bedc644eaa84
-
Filesize
6KB
MD5cac7312155c395c68443c6f6522839b9
SHA131d450d38e21351d224b74d85719e9bc69387e78
SHA256321b2ed1c0e8f7843b03fe0d1c638601036655f920925c7786b69defdc21b430
SHA512dbb1e0b0dde8c0d777b82317c5d086d92aa7586c9f3b40fbe8be7b50257902b3a60d2a1c3e708a7f361e87e515558ce4c3a422bd0d20dfd35ced7152b7ebd324
-
Filesize
6KB
MD5c7762637381041395a6bbccda60064a0
SHA1467adc12e8011a6dd5c7cfb466f7320d032ee550
SHA256fbc8230cb3b6149da19a2c16c5c79a7c3dcf9764e525ee35699df7d13fea3a9d
SHA512392877bc08bcf656d8702bc4dea00073d2333aee3ab923a975e8a9a729f309378f4d8d2144c13fd28976dd3fd634bc6a39166b623f7f4de4221a37bd952eb141
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a5f59fc25b87a2c33d3d5ecce6b96b5b
SHA12f9be79e7aed366a94f5d6a4780cde531c3d5959
SHA256c9d09134601ae8bb2ce9bdf05ad82eb3fa93c563849fcb43e2ff4673ed6f9099
SHA512244475e7e035a6634020d78139a71ccf8a7c8838797164edcd594e74ca92ff614d835f6b2043e4b40f566a5e8e7a69cf8e96bed70c6cdcdce665ba35f74fd364