Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 15:52
Static task
static1
Behavioral task
behavioral1
Sample
2ab79cc6149e9001a8515886e9d0c591_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2ab79cc6149e9001a8515886e9d0c591_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2ab79cc6149e9001a8515886e9d0c591_JaffaCakes118.html
-
Size
4KB
-
MD5
2ab79cc6149e9001a8515886e9d0c591
-
SHA1
18ed8b0bf3af909fc644c99ea3e62c0ddd81fa98
-
SHA256
e179aa87a7199b6637ca188962f73e87345887d1f4894406103f05dff97f30fb
-
SHA512
40a727e3e33b355ddb7ab0663b6825975eed4bd852eae51458d1380b54b8aa877237091285b02964f51a9418e34ad240b5345d6b47f0f8f705ac92048192469d
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oHjZd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pD4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 540 msedge.exe 540 msedge.exe 4120 msedge.exe 4120 msedge.exe 3760 identity_helper.exe 3760 identity_helper.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4120 wrote to memory of 4912 4120 msedge.exe 83 PID 4120 wrote to memory of 4912 4120 msedge.exe 83 PID 4120 wrote to memory of 1724 4120 msedge.exe 84 PID 4120 wrote to memory of 1724 4120 msedge.exe 84 PID 4120 wrote to memory of 1724 4120 msedge.exe 84 PID 4120 wrote to memory of 1724 4120 msedge.exe 84 PID 4120 wrote to memory of 1724 4120 msedge.exe 84 PID 4120 wrote to memory of 1724 4120 msedge.exe 84 PID 4120 wrote to memory of 1724 4120 msedge.exe 84 PID 4120 wrote to memory of 1724 4120 msedge.exe 84 PID 4120 wrote to memory of 1724 4120 msedge.exe 84 PID 4120 wrote to memory of 1724 4120 msedge.exe 84 PID 4120 wrote to memory of 1724 4120 msedge.exe 84 PID 4120 wrote to memory of 1724 4120 msedge.exe 84 PID 4120 wrote to memory of 1724 4120 msedge.exe 84 PID 4120 wrote to memory of 1724 4120 msedge.exe 84 PID 4120 wrote to memory of 1724 4120 msedge.exe 84 PID 4120 wrote to memory of 1724 4120 msedge.exe 84 PID 4120 wrote to memory of 1724 4120 msedge.exe 84 PID 4120 wrote to memory of 1724 4120 msedge.exe 84 PID 4120 wrote to memory of 1724 4120 msedge.exe 84 PID 4120 wrote to memory of 1724 4120 msedge.exe 84 PID 4120 wrote to memory of 1724 4120 msedge.exe 84 PID 4120 wrote to memory of 1724 4120 msedge.exe 84 PID 4120 wrote to memory of 1724 4120 msedge.exe 84 PID 4120 wrote to memory of 1724 4120 msedge.exe 84 PID 4120 wrote to memory of 1724 4120 msedge.exe 84 PID 4120 wrote to memory of 1724 4120 msedge.exe 84 PID 4120 wrote to memory of 1724 4120 msedge.exe 84 PID 4120 wrote to memory of 1724 4120 msedge.exe 84 PID 4120 wrote to memory of 1724 4120 msedge.exe 84 PID 4120 wrote to memory of 1724 4120 msedge.exe 84 PID 4120 wrote to memory of 1724 4120 msedge.exe 84 PID 4120 wrote to memory of 1724 4120 msedge.exe 84 PID 4120 wrote to memory of 1724 4120 msedge.exe 84 PID 4120 wrote to memory of 1724 4120 msedge.exe 84 PID 4120 wrote to memory of 1724 4120 msedge.exe 84 PID 4120 wrote to memory of 1724 4120 msedge.exe 84 PID 4120 wrote to memory of 1724 4120 msedge.exe 84 PID 4120 wrote to memory of 1724 4120 msedge.exe 84 PID 4120 wrote to memory of 1724 4120 msedge.exe 84 PID 4120 wrote to memory of 1724 4120 msedge.exe 84 PID 4120 wrote to memory of 540 4120 msedge.exe 85 PID 4120 wrote to memory of 540 4120 msedge.exe 85 PID 4120 wrote to memory of 2452 4120 msedge.exe 86 PID 4120 wrote to memory of 2452 4120 msedge.exe 86 PID 4120 wrote to memory of 2452 4120 msedge.exe 86 PID 4120 wrote to memory of 2452 4120 msedge.exe 86 PID 4120 wrote to memory of 2452 4120 msedge.exe 86 PID 4120 wrote to memory of 2452 4120 msedge.exe 86 PID 4120 wrote to memory of 2452 4120 msedge.exe 86 PID 4120 wrote to memory of 2452 4120 msedge.exe 86 PID 4120 wrote to memory of 2452 4120 msedge.exe 86 PID 4120 wrote to memory of 2452 4120 msedge.exe 86 PID 4120 wrote to memory of 2452 4120 msedge.exe 86 PID 4120 wrote to memory of 2452 4120 msedge.exe 86 PID 4120 wrote to memory of 2452 4120 msedge.exe 86 PID 4120 wrote to memory of 2452 4120 msedge.exe 86 PID 4120 wrote to memory of 2452 4120 msedge.exe 86 PID 4120 wrote to memory of 2452 4120 msedge.exe 86 PID 4120 wrote to memory of 2452 4120 msedge.exe 86 PID 4120 wrote to memory of 2452 4120 msedge.exe 86 PID 4120 wrote to memory of 2452 4120 msedge.exe 86 PID 4120 wrote to memory of 2452 4120 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2ab79cc6149e9001a8515886e9d0c591_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd8a7946f8,0x7ffd8a794708,0x7ffd8a7947182⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,7696411629399825033,4688440107990011820,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,7696411629399825033,4688440107990011820,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2088 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,7696411629399825033,4688440107990011820,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:82⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7696411629399825033,4688440107990011820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7696411629399825033,4688440107990011820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,7696411629399825033,4688440107990011820,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵PID:4196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,7696411629399825033,4688440107990011820,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7696411629399825033,4688440107990011820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4904 /prefetch:12⤵PID:732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7696411629399825033,4688440107990011820,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:12⤵PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7696411629399825033,4688440107990011820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4092 /prefetch:12⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7696411629399825033,4688440107990011820,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:12⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,7696411629399825033,4688440107990011820,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1824 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3596
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1076
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
292B
MD5d45a261e8cb6d8f58aacca5b9889fba7
SHA1c474753278dd03ec17fcf33f3602845e886c3b7c
SHA256406385dffc661485e763729e910fc804ac6b089fa7f18659a2177aa08a1bcb84
SHA51257e48281568b5d1554b694b85888b7ec75700b8e983424208c3a1d8377736b0df0db7445d352e59a17f050f87835624d5778a724f7c818d773f1023f850ff26f
-
Filesize
5KB
MD50cbd6b6d69deea8c594ad56e0e6f5c0a
SHA1860fa13709d95ab06ff15288370bee4f4fd5e754
SHA2568cfded604017c1f3f0c9cf7d45161f51310bc6c36c7e6c7329d46e0fc541d4d1
SHA512c64b063ab1b96332fe19a775f028434b9233559a609a9a6090476e0457e3ecadabd13a3a5a69bc6d40cc4e8c54542c0929912edcf6138af8b510faab7cfb0c7d
-
Filesize
6KB
MD5449885e5c740a21de4cbcd33cffce722
SHA1cf95d7a3544852c329586b753539b0931f3dfa56
SHA256495230cce2911388347312e4bf1bec600cd9b817703069924aacdb80e6a1c692
SHA512802159648ece4eacee32842ba71fe0a2e31e82b9f790f66c7e4ce08394d11613c6eeb3d7c3302b977acf9d4dfef26c71427755a272591b7b1aac8691bd05b6ec
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56e6eed7b2ca3e89346e181a82dc46997
SHA1e8ae7aebd4bda0643f367f6642c77e319abe25ae
SHA2564ddb48b1d79251eb4757fa51330348b9495bd40a5187c842c4366421d8c492c0
SHA512427619e0e231a9d930a1865b16ac3ee0ce321fe9abd33682bdc72cb34b4b6bc0cda8817d1d869081cfe394447fe5f09922895b6332d1a3b409841c1ad6fb58b2