Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 12:01
Static task
static1
Behavioral task
behavioral1
Sample
29dfd5b4b58cc17a2d8c0007af7abd59_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
29dfd5b4b58cc17a2d8c0007af7abd59_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
29dfd5b4b58cc17a2d8c0007af7abd59_JaffaCakes118.html
-
Size
460KB
-
MD5
29dfd5b4b58cc17a2d8c0007af7abd59
-
SHA1
188a467d0034bbd482fe1c8b74f02e106289a109
-
SHA256
21f95450013a48f74520ed058d0e2da71d7f1332855dba26879b52b097cfbd3d
-
SHA512
25ac74906e8dc480521bdd4caacfc19f631b2d9079ac465735eac9b77699a32a8007f7d60c1249e8ea94b71daee8c89e1a8d3be66ad24f1985c869fb36ab6722
-
SSDEEP
6144:SLsMYod+X3oI+Y8PsMYod+X3oI+YcsMYod+X3oI+YLsMYod+X3oI+YQ:e5d+X36T5d+X3o5d+X315d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2484 msedge.exe 2484 msedge.exe 3236 msedge.exe 3236 msedge.exe 4976 identity_helper.exe 4976 identity_helper.exe 1836 msedge.exe 1836 msedge.exe 1836 msedge.exe 1836 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3236 wrote to memory of 3788 3236 msedge.exe 81 PID 3236 wrote to memory of 3788 3236 msedge.exe 81 PID 3236 wrote to memory of 4568 3236 msedge.exe 83 PID 3236 wrote to memory of 4568 3236 msedge.exe 83 PID 3236 wrote to memory of 4568 3236 msedge.exe 83 PID 3236 wrote to memory of 4568 3236 msedge.exe 83 PID 3236 wrote to memory of 4568 3236 msedge.exe 83 PID 3236 wrote to memory of 4568 3236 msedge.exe 83 PID 3236 wrote to memory of 4568 3236 msedge.exe 83 PID 3236 wrote to memory of 4568 3236 msedge.exe 83 PID 3236 wrote to memory of 4568 3236 msedge.exe 83 PID 3236 wrote to memory of 4568 3236 msedge.exe 83 PID 3236 wrote to memory of 4568 3236 msedge.exe 83 PID 3236 wrote to memory of 4568 3236 msedge.exe 83 PID 3236 wrote to memory of 4568 3236 msedge.exe 83 PID 3236 wrote to memory of 4568 3236 msedge.exe 83 PID 3236 wrote to memory of 4568 3236 msedge.exe 83 PID 3236 wrote to memory of 4568 3236 msedge.exe 83 PID 3236 wrote to memory of 4568 3236 msedge.exe 83 PID 3236 wrote to memory of 4568 3236 msedge.exe 83 PID 3236 wrote to memory of 4568 3236 msedge.exe 83 PID 3236 wrote to memory of 4568 3236 msedge.exe 83 PID 3236 wrote to memory of 4568 3236 msedge.exe 83 PID 3236 wrote to memory of 4568 3236 msedge.exe 83 PID 3236 wrote to memory of 4568 3236 msedge.exe 83 PID 3236 wrote to memory of 4568 3236 msedge.exe 83 PID 3236 wrote to memory of 4568 3236 msedge.exe 83 PID 3236 wrote to memory of 4568 3236 msedge.exe 83 PID 3236 wrote to memory of 4568 3236 msedge.exe 83 PID 3236 wrote to memory of 4568 3236 msedge.exe 83 PID 3236 wrote to memory of 4568 3236 msedge.exe 83 PID 3236 wrote to memory of 4568 3236 msedge.exe 83 PID 3236 wrote to memory of 4568 3236 msedge.exe 83 PID 3236 wrote to memory of 4568 3236 msedge.exe 83 PID 3236 wrote to memory of 4568 3236 msedge.exe 83 PID 3236 wrote to memory of 4568 3236 msedge.exe 83 PID 3236 wrote to memory of 4568 3236 msedge.exe 83 PID 3236 wrote to memory of 4568 3236 msedge.exe 83 PID 3236 wrote to memory of 4568 3236 msedge.exe 83 PID 3236 wrote to memory of 4568 3236 msedge.exe 83 PID 3236 wrote to memory of 4568 3236 msedge.exe 83 PID 3236 wrote to memory of 4568 3236 msedge.exe 83 PID 3236 wrote to memory of 2484 3236 msedge.exe 84 PID 3236 wrote to memory of 2484 3236 msedge.exe 84 PID 3236 wrote to memory of 4460 3236 msedge.exe 85 PID 3236 wrote to memory of 4460 3236 msedge.exe 85 PID 3236 wrote to memory of 4460 3236 msedge.exe 85 PID 3236 wrote to memory of 4460 3236 msedge.exe 85 PID 3236 wrote to memory of 4460 3236 msedge.exe 85 PID 3236 wrote to memory of 4460 3236 msedge.exe 85 PID 3236 wrote to memory of 4460 3236 msedge.exe 85 PID 3236 wrote to memory of 4460 3236 msedge.exe 85 PID 3236 wrote to memory of 4460 3236 msedge.exe 85 PID 3236 wrote to memory of 4460 3236 msedge.exe 85 PID 3236 wrote to memory of 4460 3236 msedge.exe 85 PID 3236 wrote to memory of 4460 3236 msedge.exe 85 PID 3236 wrote to memory of 4460 3236 msedge.exe 85 PID 3236 wrote to memory of 4460 3236 msedge.exe 85 PID 3236 wrote to memory of 4460 3236 msedge.exe 85 PID 3236 wrote to memory of 4460 3236 msedge.exe 85 PID 3236 wrote to memory of 4460 3236 msedge.exe 85 PID 3236 wrote to memory of 4460 3236 msedge.exe 85 PID 3236 wrote to memory of 4460 3236 msedge.exe 85 PID 3236 wrote to memory of 4460 3236 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\29dfd5b4b58cc17a2d8c0007af7abd59_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe410b46f8,0x7ffe410b4708,0x7ffe410b47182⤵PID:3788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,15055578384559207802,1726654727820853713,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,15055578384559207802,1726654727820853713,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2364 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,15055578384559207802,1726654727820853713,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:82⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15055578384559207802,1726654727820853713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15055578384559207802,1726654727820853713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,15055578384559207802,1726654727820853713,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 /prefetch:82⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,15055578384559207802,1726654727820853713,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15055578384559207802,1726654727820853713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15055578384559207802,1726654727820853713,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15055578384559207802,1726654727820853713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:12⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15055578384559207802,1726654727820853713,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:12⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,15055578384559207802,1726654727820853713,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3084 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1836
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1612
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
6KB
MD5eeb1c6c01d1d96549870f306a9c50548
SHA1da960a15fa87da0e3e77187f0d4360f017fb0a7a
SHA256a73d651a0cabed87780d102dcee3bc4db6375c44cec87126ad39c86ac68eb4fd
SHA5123594038387b51a2f2dad9cd3247b5fe077f0a351deecc3d3d9fafe85ce89571105020fedf6e164ae209c9a4c05ddd25df62576bc6bb119edf49bb3c4c45133ea
-
Filesize
6KB
MD50e28788379d6471fc9bb4cd4957f5703
SHA11dd1afca526fba9c8a547b3b46d138ee70d148b5
SHA256bd744101ed6ca0f73a940c8c551a6dff0f4a94ae064a889971ff14d9c79a8882
SHA5127e482b7be6ed0042b27baf49a5727d91923192ab1d244968edc743341628c8bbdc7a1270cf5b4045c92d7fecdfa4e47a66e15d4a583a611e6511c715d4a16480
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c214cbfa60562c367e91513456add5bd
SHA1396b8727aebf38193b4b2d8ede664e4a102373d3
SHA2564b13486de244374612c4c72a2430c04f7c1898fae7d8e699c4d498cb5d3a8f1d
SHA512eb936d3385427f7af521401d1cbc58c95f5b794c01619232e65119f45807ae0b93514530d7a8814a0c31ed27f7bd1a30bc1b8491aa13870b681193ed301b276a