Analysis
-
max time kernel
149s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 07:05
Static task
static1
Behavioral task
behavioral1
Sample
28d8430d0fbada5379760dad6e7dfc0e_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
28d8430d0fbada5379760dad6e7dfc0e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
28d8430d0fbada5379760dad6e7dfc0e_JaffaCakes118.html
-
Size
30KB
-
MD5
28d8430d0fbada5379760dad6e7dfc0e
-
SHA1
1ad882fbe052caa70c57396551d78f99842e94bb
-
SHA256
76515a4fd5aa4ddcffa04d63b6b4ba6054a24b08fd049f1d7ab892580550517d
-
SHA512
cd110e6396f0c650d5f05f6a377e3e13c5b253c570b0e1b4db5fcd326ebb11235afacefc76932b14fa8ef2d3b4b08df0b6ac873fe3a948501b3387bc976565df
-
SSDEEP
192:uWnVb5nBTnQjxn5Q/4nQiezNnbnQOkEnt4mnQTbnJnQJMClAOr3rolZirFgs7c6f:6Q//n53rolZif7cl3w3e4oDzO/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4640 msedge.exe 4640 msedge.exe 2544 msedge.exe 2544 msedge.exe 3992 identity_helper.exe 3992 identity_helper.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2544 wrote to memory of 2336 2544 msedge.exe 80 PID 2544 wrote to memory of 2336 2544 msedge.exe 80 PID 2544 wrote to memory of 2488 2544 msedge.exe 82 PID 2544 wrote to memory of 2488 2544 msedge.exe 82 PID 2544 wrote to memory of 2488 2544 msedge.exe 82 PID 2544 wrote to memory of 2488 2544 msedge.exe 82 PID 2544 wrote to memory of 2488 2544 msedge.exe 82 PID 2544 wrote to memory of 2488 2544 msedge.exe 82 PID 2544 wrote to memory of 2488 2544 msedge.exe 82 PID 2544 wrote to memory of 2488 2544 msedge.exe 82 PID 2544 wrote to memory of 2488 2544 msedge.exe 82 PID 2544 wrote to memory of 2488 2544 msedge.exe 82 PID 2544 wrote to memory of 2488 2544 msedge.exe 82 PID 2544 wrote to memory of 2488 2544 msedge.exe 82 PID 2544 wrote to memory of 2488 2544 msedge.exe 82 PID 2544 wrote to memory of 2488 2544 msedge.exe 82 PID 2544 wrote to memory of 2488 2544 msedge.exe 82 PID 2544 wrote to memory of 2488 2544 msedge.exe 82 PID 2544 wrote to memory of 2488 2544 msedge.exe 82 PID 2544 wrote to memory of 2488 2544 msedge.exe 82 PID 2544 wrote to memory of 2488 2544 msedge.exe 82 PID 2544 wrote to memory of 2488 2544 msedge.exe 82 PID 2544 wrote to memory of 2488 2544 msedge.exe 82 PID 2544 wrote to memory of 2488 2544 msedge.exe 82 PID 2544 wrote to memory of 2488 2544 msedge.exe 82 PID 2544 wrote to memory of 2488 2544 msedge.exe 82 PID 2544 wrote to memory of 2488 2544 msedge.exe 82 PID 2544 wrote to memory of 2488 2544 msedge.exe 82 PID 2544 wrote to memory of 2488 2544 msedge.exe 82 PID 2544 wrote to memory of 2488 2544 msedge.exe 82 PID 2544 wrote to memory of 2488 2544 msedge.exe 82 PID 2544 wrote to memory of 2488 2544 msedge.exe 82 PID 2544 wrote to memory of 2488 2544 msedge.exe 82 PID 2544 wrote to memory of 2488 2544 msedge.exe 82 PID 2544 wrote to memory of 2488 2544 msedge.exe 82 PID 2544 wrote to memory of 2488 2544 msedge.exe 82 PID 2544 wrote to memory of 2488 2544 msedge.exe 82 PID 2544 wrote to memory of 2488 2544 msedge.exe 82 PID 2544 wrote to memory of 2488 2544 msedge.exe 82 PID 2544 wrote to memory of 2488 2544 msedge.exe 82 PID 2544 wrote to memory of 2488 2544 msedge.exe 82 PID 2544 wrote to memory of 2488 2544 msedge.exe 82 PID 2544 wrote to memory of 4640 2544 msedge.exe 83 PID 2544 wrote to memory of 4640 2544 msedge.exe 83 PID 2544 wrote to memory of 3512 2544 msedge.exe 84 PID 2544 wrote to memory of 3512 2544 msedge.exe 84 PID 2544 wrote to memory of 3512 2544 msedge.exe 84 PID 2544 wrote to memory of 3512 2544 msedge.exe 84 PID 2544 wrote to memory of 3512 2544 msedge.exe 84 PID 2544 wrote to memory of 3512 2544 msedge.exe 84 PID 2544 wrote to memory of 3512 2544 msedge.exe 84 PID 2544 wrote to memory of 3512 2544 msedge.exe 84 PID 2544 wrote to memory of 3512 2544 msedge.exe 84 PID 2544 wrote to memory of 3512 2544 msedge.exe 84 PID 2544 wrote to memory of 3512 2544 msedge.exe 84 PID 2544 wrote to memory of 3512 2544 msedge.exe 84 PID 2544 wrote to memory of 3512 2544 msedge.exe 84 PID 2544 wrote to memory of 3512 2544 msedge.exe 84 PID 2544 wrote to memory of 3512 2544 msedge.exe 84 PID 2544 wrote to memory of 3512 2544 msedge.exe 84 PID 2544 wrote to memory of 3512 2544 msedge.exe 84 PID 2544 wrote to memory of 3512 2544 msedge.exe 84 PID 2544 wrote to memory of 3512 2544 msedge.exe 84 PID 2544 wrote to memory of 3512 2544 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\28d8430d0fbada5379760dad6e7dfc0e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcda8746f8,0x7ffcda874708,0x7ffcda8747182⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,2494027631530737169,2977526559065030804,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,2494027631530737169,2977526559065030804,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,2494027631530737169,2977526559065030804,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,2494027631530737169,2977526559065030804,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,2494027631530737169,2977526559065030804,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:2164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,2494027631530737169,2977526559065030804,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 /prefetch:82⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,2494027631530737169,2977526559065030804,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,2494027631530737169,2977526559065030804,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,2494027631530737169,2977526559065030804,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,2494027631530737169,2977526559065030804,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,2494027631530737169,2977526559065030804,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,2494027631530737169,2977526559065030804,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2040 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:748
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4276
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:8
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
6KB
MD510836d015bfc6af5d886cfb241e0cce8
SHA1fa7b6df0e95de7c053ed3060c8a55d098048e5ac
SHA2563ea33380814d55d317814fab1755dafd402ea9dc459888b837b9f47883dec684
SHA512045d7cac43d73f4e268b0f152793f3f910b1f0215af551cb77f467cf51b8186d2551a43a62d0c8064e17aee792c1b32d9ce505bb564f546e8043b70021b52381
-
Filesize
6KB
MD5cc6072c5bc7188b328bbe4c6096b2118
SHA1c3f52a82c1a8cb103e23a284a5face5ea00e4dac
SHA256b9f6b2ac00458a3309ca3d75312ab99ef5d36913e6132c42696610de71ffda79
SHA51260c1cf8250c0dea1b606dc4206c99a10984234ac185ff1cd6dd12c93f67da6dcd7fc8b693fe579cbccccc8bda582033a8ec124d7a866557782da9b1cf66a0050
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e250d65047564de837c1bbdc185ae878
SHA1650a6cb349feaa87344e48e8278dd30fec1bec0c
SHA256f088ce265aad37b97789c13d97efb2f65c3621f5a433302cd1945cdaad4f4a44
SHA512e23dd5f3af074a81000f6f0acdd625be903b16e765697663a488c00d0dfc788d94dae4f175bd0010502fef620a5d1131c209e5a53827b29c52d66871c621d6d6