Analysis
-
max time kernel
145s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 17:00
Static task
static1
Behavioral task
behavioral1
Sample
301ff702ecd55a6df7bfa9381e33177c_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
301ff702ecd55a6df7bfa9381e33177c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
301ff702ecd55a6df7bfa9381e33177c_JaffaCakes118.html
-
Size
7KB
-
MD5
301ff702ecd55a6df7bfa9381e33177c
-
SHA1
ae180e693b5c23f2dbf676e01f2be00ae9c34318
-
SHA256
812e16730a315b35d46315a5bf12b1eb3bd1609131327f167f18a385affb5b99
-
SHA512
b5470c4f2f37cc9279610c1a6de1968aa00d9964d5b4f6ddf1088203bba76c2a1136509657ee4af2f871f6c414cdb1d5daabb49708fe9898f69e1656bcca858c
-
SSDEEP
192:Id+D7Q1bRV6IUhhwo1rzRC9pbgEQmNcfcqQdruypv2:Id+DU19EIKhbR5EbN+QdFh2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1972 msedge.exe 1972 msedge.exe 4804 msedge.exe 4804 msedge.exe 1888 identity_helper.exe 1888 identity_helper.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4804 wrote to memory of 4212 4804 msedge.exe 82 PID 4804 wrote to memory of 4212 4804 msedge.exe 82 PID 4804 wrote to memory of 1628 4804 msedge.exe 83 PID 4804 wrote to memory of 1628 4804 msedge.exe 83 PID 4804 wrote to memory of 1628 4804 msedge.exe 83 PID 4804 wrote to memory of 1628 4804 msedge.exe 83 PID 4804 wrote to memory of 1628 4804 msedge.exe 83 PID 4804 wrote to memory of 1628 4804 msedge.exe 83 PID 4804 wrote to memory of 1628 4804 msedge.exe 83 PID 4804 wrote to memory of 1628 4804 msedge.exe 83 PID 4804 wrote to memory of 1628 4804 msedge.exe 83 PID 4804 wrote to memory of 1628 4804 msedge.exe 83 PID 4804 wrote to memory of 1628 4804 msedge.exe 83 PID 4804 wrote to memory of 1628 4804 msedge.exe 83 PID 4804 wrote to memory of 1628 4804 msedge.exe 83 PID 4804 wrote to memory of 1628 4804 msedge.exe 83 PID 4804 wrote to memory of 1628 4804 msedge.exe 83 PID 4804 wrote to memory of 1628 4804 msedge.exe 83 PID 4804 wrote to memory of 1628 4804 msedge.exe 83 PID 4804 wrote to memory of 1628 4804 msedge.exe 83 PID 4804 wrote to memory of 1628 4804 msedge.exe 83 PID 4804 wrote to memory of 1628 4804 msedge.exe 83 PID 4804 wrote to memory of 1628 4804 msedge.exe 83 PID 4804 wrote to memory of 1628 4804 msedge.exe 83 PID 4804 wrote to memory of 1628 4804 msedge.exe 83 PID 4804 wrote to memory of 1628 4804 msedge.exe 83 PID 4804 wrote to memory of 1628 4804 msedge.exe 83 PID 4804 wrote to memory of 1628 4804 msedge.exe 83 PID 4804 wrote to memory of 1628 4804 msedge.exe 83 PID 4804 wrote to memory of 1628 4804 msedge.exe 83 PID 4804 wrote to memory of 1628 4804 msedge.exe 83 PID 4804 wrote to memory of 1628 4804 msedge.exe 83 PID 4804 wrote to memory of 1628 4804 msedge.exe 83 PID 4804 wrote to memory of 1628 4804 msedge.exe 83 PID 4804 wrote to memory of 1628 4804 msedge.exe 83 PID 4804 wrote to memory of 1628 4804 msedge.exe 83 PID 4804 wrote to memory of 1628 4804 msedge.exe 83 PID 4804 wrote to memory of 1628 4804 msedge.exe 83 PID 4804 wrote to memory of 1628 4804 msedge.exe 83 PID 4804 wrote to memory of 1628 4804 msedge.exe 83 PID 4804 wrote to memory of 1628 4804 msedge.exe 83 PID 4804 wrote to memory of 1628 4804 msedge.exe 83 PID 4804 wrote to memory of 1972 4804 msedge.exe 84 PID 4804 wrote to memory of 1972 4804 msedge.exe 84 PID 4804 wrote to memory of 4952 4804 msedge.exe 85 PID 4804 wrote to memory of 4952 4804 msedge.exe 85 PID 4804 wrote to memory of 4952 4804 msedge.exe 85 PID 4804 wrote to memory of 4952 4804 msedge.exe 85 PID 4804 wrote to memory of 4952 4804 msedge.exe 85 PID 4804 wrote to memory of 4952 4804 msedge.exe 85 PID 4804 wrote to memory of 4952 4804 msedge.exe 85 PID 4804 wrote to memory of 4952 4804 msedge.exe 85 PID 4804 wrote to memory of 4952 4804 msedge.exe 85 PID 4804 wrote to memory of 4952 4804 msedge.exe 85 PID 4804 wrote to memory of 4952 4804 msedge.exe 85 PID 4804 wrote to memory of 4952 4804 msedge.exe 85 PID 4804 wrote to memory of 4952 4804 msedge.exe 85 PID 4804 wrote to memory of 4952 4804 msedge.exe 85 PID 4804 wrote to memory of 4952 4804 msedge.exe 85 PID 4804 wrote to memory of 4952 4804 msedge.exe 85 PID 4804 wrote to memory of 4952 4804 msedge.exe 85 PID 4804 wrote to memory of 4952 4804 msedge.exe 85 PID 4804 wrote to memory of 4952 4804 msedge.exe 85 PID 4804 wrote to memory of 4952 4804 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\301ff702ecd55a6df7bfa9381e33177c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa682d46f8,0x7ffa682d4708,0x7ffa682d47182⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,16084429579697481983,14940897304248023494,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,16084429579697481983,14940897304248023494,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,16084429579697481983,14940897304248023494,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16084429579697481983,14940897304248023494,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:5708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16084429579697481983,14940897304248023494,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:5608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,16084429579697481983,14940897304248023494,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4960 /prefetch:82⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,16084429579697481983,14940897304248023494,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4960 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16084429579697481983,14940897304248023494,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16084429579697481983,14940897304248023494,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16084429579697481983,14940897304248023494,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16084429579697481983,14940897304248023494,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,16084429579697481983,14940897304248023494,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2444 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4924
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3860
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4128
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
5KB
MD542ef1e96c079aef00d00cd98377e56b3
SHA1bd8fb5c0c89315875872f45eae390ebf4d99e8ee
SHA256d4e0cd89a75fb289ee0acbdd0a82c66617efa1c8d889e7b1ab67105451774545
SHA5124985d1f4cc8ab047a7262d3f24df3597f2e5cb492eddd976db615a4b5bd83cccb892983dfd2bc26245dc20ee1aa9d14ffa781c33d8541a31da6adb744d439299
-
Filesize
6KB
MD5b1fe8e5d9f28e89872c7007d8bb9de99
SHA1c7aa320b26165421b1f518cf85f98bf091a40782
SHA256caab430f4a854f0144ae72d18f1fdfd8b45c6623e218392580931b505f0e9676
SHA5121755b3792e9af72c5cd0a91952d95321f8d1c968854e44152dff7fe5adebf4edbc167f07ac0f7a5174a165a0e31f9efe8197de0ad52146a9b398cb39e467d1db
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD544b297f4a9c0dd7d52e85c3b981b1e83
SHA17a46b0ec0d884f3501f23d59ff0fa18dd9f5ef26
SHA2566457011fa63b49e03f6aafe5f739bf9675da6d5e52bef482afa3f8715cd17e9e
SHA5121f0ed3737b0e0b5eb4d36c12fa2d71d26caaa81112fc090954ee817cb5041a7b1ee252d6ee701f1ebd57d70860b1aeb7d76f94869a0975136a6d720f12ef4c22