Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 10:50
Static task
static1
Behavioral task
behavioral1
Sample
299a24eafe1a1640ba01f73b9e398b22_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
299a24eafe1a1640ba01f73b9e398b22_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
299a24eafe1a1640ba01f73b9e398b22_JaffaCakes118.html
-
Size
36KB
-
MD5
299a24eafe1a1640ba01f73b9e398b22
-
SHA1
0b71bed2625adc2b7397c93f72c7ee773641fd17
-
SHA256
50a17a47a495aa40f078df2eba9e5913599cf6791e3ee032195ed3279509513c
-
SHA512
5597af886b8ea97ad84f428c48f6d2eea7bd4149a1c64982a309e9d9a693b684a39f7a268896c8f6c94b42d9b1e4bac6f5395284d565b8652f5553f5bf7a945e
-
SSDEEP
768:agU2KLdujPNwygRRVgNiUkrCKCKCKCKCKCqCKCUPCGC6CHS5WU3EZynzXWcARUvc:aJwPNwygRRVYiUu33333tlXVt2S5n3E1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 528 msedge.exe 528 msedge.exe 3536 msedge.exe 3536 msedge.exe 4732 identity_helper.exe 4732 identity_helper.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3536 wrote to memory of 4584 3536 msedge.exe 82 PID 3536 wrote to memory of 4584 3536 msedge.exe 82 PID 3536 wrote to memory of 4288 3536 msedge.exe 84 PID 3536 wrote to memory of 4288 3536 msedge.exe 84 PID 3536 wrote to memory of 4288 3536 msedge.exe 84 PID 3536 wrote to memory of 4288 3536 msedge.exe 84 PID 3536 wrote to memory of 4288 3536 msedge.exe 84 PID 3536 wrote to memory of 4288 3536 msedge.exe 84 PID 3536 wrote to memory of 4288 3536 msedge.exe 84 PID 3536 wrote to memory of 4288 3536 msedge.exe 84 PID 3536 wrote to memory of 4288 3536 msedge.exe 84 PID 3536 wrote to memory of 4288 3536 msedge.exe 84 PID 3536 wrote to memory of 4288 3536 msedge.exe 84 PID 3536 wrote to memory of 4288 3536 msedge.exe 84 PID 3536 wrote to memory of 4288 3536 msedge.exe 84 PID 3536 wrote to memory of 4288 3536 msedge.exe 84 PID 3536 wrote to memory of 4288 3536 msedge.exe 84 PID 3536 wrote to memory of 4288 3536 msedge.exe 84 PID 3536 wrote to memory of 4288 3536 msedge.exe 84 PID 3536 wrote to memory of 4288 3536 msedge.exe 84 PID 3536 wrote to memory of 4288 3536 msedge.exe 84 PID 3536 wrote to memory of 4288 3536 msedge.exe 84 PID 3536 wrote to memory of 4288 3536 msedge.exe 84 PID 3536 wrote to memory of 4288 3536 msedge.exe 84 PID 3536 wrote to memory of 4288 3536 msedge.exe 84 PID 3536 wrote to memory of 4288 3536 msedge.exe 84 PID 3536 wrote to memory of 4288 3536 msedge.exe 84 PID 3536 wrote to memory of 4288 3536 msedge.exe 84 PID 3536 wrote to memory of 4288 3536 msedge.exe 84 PID 3536 wrote to memory of 4288 3536 msedge.exe 84 PID 3536 wrote to memory of 4288 3536 msedge.exe 84 PID 3536 wrote to memory of 4288 3536 msedge.exe 84 PID 3536 wrote to memory of 4288 3536 msedge.exe 84 PID 3536 wrote to memory of 4288 3536 msedge.exe 84 PID 3536 wrote to memory of 4288 3536 msedge.exe 84 PID 3536 wrote to memory of 4288 3536 msedge.exe 84 PID 3536 wrote to memory of 4288 3536 msedge.exe 84 PID 3536 wrote to memory of 4288 3536 msedge.exe 84 PID 3536 wrote to memory of 4288 3536 msedge.exe 84 PID 3536 wrote to memory of 4288 3536 msedge.exe 84 PID 3536 wrote to memory of 4288 3536 msedge.exe 84 PID 3536 wrote to memory of 4288 3536 msedge.exe 84 PID 3536 wrote to memory of 528 3536 msedge.exe 85 PID 3536 wrote to memory of 528 3536 msedge.exe 85 PID 3536 wrote to memory of 3692 3536 msedge.exe 86 PID 3536 wrote to memory of 3692 3536 msedge.exe 86 PID 3536 wrote to memory of 3692 3536 msedge.exe 86 PID 3536 wrote to memory of 3692 3536 msedge.exe 86 PID 3536 wrote to memory of 3692 3536 msedge.exe 86 PID 3536 wrote to memory of 3692 3536 msedge.exe 86 PID 3536 wrote to memory of 3692 3536 msedge.exe 86 PID 3536 wrote to memory of 3692 3536 msedge.exe 86 PID 3536 wrote to memory of 3692 3536 msedge.exe 86 PID 3536 wrote to memory of 3692 3536 msedge.exe 86 PID 3536 wrote to memory of 3692 3536 msedge.exe 86 PID 3536 wrote to memory of 3692 3536 msedge.exe 86 PID 3536 wrote to memory of 3692 3536 msedge.exe 86 PID 3536 wrote to memory of 3692 3536 msedge.exe 86 PID 3536 wrote to memory of 3692 3536 msedge.exe 86 PID 3536 wrote to memory of 3692 3536 msedge.exe 86 PID 3536 wrote to memory of 3692 3536 msedge.exe 86 PID 3536 wrote to memory of 3692 3536 msedge.exe 86 PID 3536 wrote to memory of 3692 3536 msedge.exe 86 PID 3536 wrote to memory of 3692 3536 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\299a24eafe1a1640ba01f73b9e398b22_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f44046f8,0x7ff8f4404708,0x7ff8f44047182⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,9412842894185854157,5333045504624739485,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2192,9412842894185854157,5333045504624739485,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2192,9412842894185854157,5333045504624739485,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,9412842894185854157,5333045504624739485,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,9412842894185854157,5333045504624739485,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,9412842894185854157,5333045504624739485,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6040 /prefetch:12⤵PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,9412842894185854157,5333045504624739485,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6020 /prefetch:12⤵PID:1088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,9412842894185854157,5333045504624739485,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3436 /prefetch:82⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,9412842894185854157,5333045504624739485,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3436 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,9412842894185854157,5333045504624739485,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4472 /prefetch:12⤵PID:1544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,9412842894185854157,5333045504624739485,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:12⤵PID:632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,9412842894185854157,5333045504624739485,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1832 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:728
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:364
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
6KB
MD58f41ead2f32c99e14578c024156749b3
SHA170226b8dc2666752541712c08975eef9cc6be44d
SHA256d4f2512d8acc3d0391a05c47cec557a5f3f7b0e40a70053e4cc28fd7d6c7a506
SHA51269fc5e50afbcab86e9bd879f9084967a90dc3e3b15bf381d1d1483971827e1d2dc69bd10be4179aafadd15655c79aea585cfb4e4c2b2c6976a440688f144aa13
-
Filesize
6KB
MD544a03846d41655b3f880b015d78d1404
SHA1d40aa62b031bd098eaf7d0edf2cdc280f347b421
SHA2568a1a5e1bedc0df5e06f2b75bef8028ae6614f3a06f97ca157600d2c727f7f95a
SHA5126996b6f4e08761f23d7d8ea7dffae1ba7a201a9c2529919a08f87b79218b09adaf0927ea11e63ec9ac5f6ab5a0f618a9541856ee56c51aba6f10ccb5142a50f0
-
Filesize
6KB
MD5886911bf78e89e49fec3685d3211fdd5
SHA14c742c367654e2958496a679e57f461e8c02c8a4
SHA256b0939b846e21a44f18e340aacc9bfe40143b47a7fa4ad31ca2c0cca43fea4467
SHA51239badf228130450ae319f9d2483b5a9e38c4dcec555bdb7825f17e66da25589cf5da4431de743b9c9c90c7591e95108409fa55063979f4780aabcfe0a8f74f34
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5183a62353d9322b854d204095d4e6480
SHA1024fa7c2c303841e3c6df2310c9e7bb56fb12090
SHA2562e86ae54561139be6bf11fe89bc6365daf1c7c1b635377ad0e3d052827f3f068
SHA5123592884612acf6b076580cafc10be1e19bdffa79ebb0cfe71dc73ace65e9e69eadc3a0e78cd1b6824cfde4a7179949297da3f3f2cf8dc6be4f8b645cebf823a4