Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 19:42
Static task
static1
Behavioral task
behavioral1
Sample
30ba4969f2163ce425f7ace51c30b170_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
30ba4969f2163ce425f7ace51c30b170_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
30ba4969f2163ce425f7ace51c30b170_JaffaCakes118.html
-
Size
23KB
-
MD5
30ba4969f2163ce425f7ace51c30b170
-
SHA1
759e277f91bb30ea2e36e4f5ec9234a8ef0764cd
-
SHA256
7b78df6f65a0d6fddf73e2ad65a521d6c88526797927eb34367a373d89179b6a
-
SHA512
5918964c171ff1bf28d8579d5bc3105ae64d1ec9b3fa3b77752aa4ccf68fba560bcb80c3369a89904863a988ff7d1022271d14bc63639cf35aaec512b6a437dc
-
SSDEEP
192:uWTwp4+bb5nkKnQjxn5Q/znQieiNnonQOkEntt5nQTbnNnQECnQtQwMBCqnYnQ7W:sp4+GQ/6wb
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2488 msedge.exe 2488 msedge.exe 4504 msedge.exe 4504 msedge.exe 4664 identity_helper.exe 4664 identity_helper.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4504 wrote to memory of 2356 4504 msedge.exe 82 PID 4504 wrote to memory of 2356 4504 msedge.exe 82 PID 4504 wrote to memory of 1908 4504 msedge.exe 84 PID 4504 wrote to memory of 1908 4504 msedge.exe 84 PID 4504 wrote to memory of 1908 4504 msedge.exe 84 PID 4504 wrote to memory of 1908 4504 msedge.exe 84 PID 4504 wrote to memory of 1908 4504 msedge.exe 84 PID 4504 wrote to memory of 1908 4504 msedge.exe 84 PID 4504 wrote to memory of 1908 4504 msedge.exe 84 PID 4504 wrote to memory of 1908 4504 msedge.exe 84 PID 4504 wrote to memory of 1908 4504 msedge.exe 84 PID 4504 wrote to memory of 1908 4504 msedge.exe 84 PID 4504 wrote to memory of 1908 4504 msedge.exe 84 PID 4504 wrote to memory of 1908 4504 msedge.exe 84 PID 4504 wrote to memory of 1908 4504 msedge.exe 84 PID 4504 wrote to memory of 1908 4504 msedge.exe 84 PID 4504 wrote to memory of 1908 4504 msedge.exe 84 PID 4504 wrote to memory of 1908 4504 msedge.exe 84 PID 4504 wrote to memory of 1908 4504 msedge.exe 84 PID 4504 wrote to memory of 1908 4504 msedge.exe 84 PID 4504 wrote to memory of 1908 4504 msedge.exe 84 PID 4504 wrote to memory of 1908 4504 msedge.exe 84 PID 4504 wrote to memory of 1908 4504 msedge.exe 84 PID 4504 wrote to memory of 1908 4504 msedge.exe 84 PID 4504 wrote to memory of 1908 4504 msedge.exe 84 PID 4504 wrote to memory of 1908 4504 msedge.exe 84 PID 4504 wrote to memory of 1908 4504 msedge.exe 84 PID 4504 wrote to memory of 1908 4504 msedge.exe 84 PID 4504 wrote to memory of 1908 4504 msedge.exe 84 PID 4504 wrote to memory of 1908 4504 msedge.exe 84 PID 4504 wrote to memory of 1908 4504 msedge.exe 84 PID 4504 wrote to memory of 1908 4504 msedge.exe 84 PID 4504 wrote to memory of 1908 4504 msedge.exe 84 PID 4504 wrote to memory of 1908 4504 msedge.exe 84 PID 4504 wrote to memory of 1908 4504 msedge.exe 84 PID 4504 wrote to memory of 1908 4504 msedge.exe 84 PID 4504 wrote to memory of 1908 4504 msedge.exe 84 PID 4504 wrote to memory of 1908 4504 msedge.exe 84 PID 4504 wrote to memory of 1908 4504 msedge.exe 84 PID 4504 wrote to memory of 1908 4504 msedge.exe 84 PID 4504 wrote to memory of 1908 4504 msedge.exe 84 PID 4504 wrote to memory of 1908 4504 msedge.exe 84 PID 4504 wrote to memory of 2488 4504 msedge.exe 85 PID 4504 wrote to memory of 2488 4504 msedge.exe 85 PID 4504 wrote to memory of 2936 4504 msedge.exe 86 PID 4504 wrote to memory of 2936 4504 msedge.exe 86 PID 4504 wrote to memory of 2936 4504 msedge.exe 86 PID 4504 wrote to memory of 2936 4504 msedge.exe 86 PID 4504 wrote to memory of 2936 4504 msedge.exe 86 PID 4504 wrote to memory of 2936 4504 msedge.exe 86 PID 4504 wrote to memory of 2936 4504 msedge.exe 86 PID 4504 wrote to memory of 2936 4504 msedge.exe 86 PID 4504 wrote to memory of 2936 4504 msedge.exe 86 PID 4504 wrote to memory of 2936 4504 msedge.exe 86 PID 4504 wrote to memory of 2936 4504 msedge.exe 86 PID 4504 wrote to memory of 2936 4504 msedge.exe 86 PID 4504 wrote to memory of 2936 4504 msedge.exe 86 PID 4504 wrote to memory of 2936 4504 msedge.exe 86 PID 4504 wrote to memory of 2936 4504 msedge.exe 86 PID 4504 wrote to memory of 2936 4504 msedge.exe 86 PID 4504 wrote to memory of 2936 4504 msedge.exe 86 PID 4504 wrote to memory of 2936 4504 msedge.exe 86 PID 4504 wrote to memory of 2936 4504 msedge.exe 86 PID 4504 wrote to memory of 2936 4504 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\30ba4969f2163ce425f7ace51c30b170_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffae94e46f8,0x7ffae94e4708,0x7ffae94e47182⤵PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,13916294441831940752,8915226649562759837,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,13916294441831940752,8915226649562759837,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2372 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,13916294441831940752,8915226649562759837,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,13916294441831940752,8915226649562759837,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,13916294441831940752,8915226649562759837,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,13916294441831940752,8915226649562759837,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 /prefetch:82⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,13916294441831940752,8915226649562759837,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,13916294441831940752,8915226649562759837,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,13916294441831940752,8915226649562759837,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,13916294441831940752,8915226649562759837,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,13916294441831940752,8915226649562759837,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3520 /prefetch:12⤵PID:784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,13916294441831940752,8915226649562759837,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5448 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4008
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2352
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
6KB
MD53e58bcc76c3f4089e59ad58b4c629a2e
SHA1e546d13c3580c0c0a40b6eee23ef581b44e5f14f
SHA2567814572e19e7e5bf5c3d92ca494ef1d32dd3937df19cef33b95130c7e70751ea
SHA5122309fd15b297ed4993858bdbe6156cfe9b66df5302f74fc5a873506857fd3bc05ee6787940c45ff3be6e08d1e909581dbf21d6976408e76d26fa0f793af2aa7c
-
Filesize
6KB
MD549b336d6aff4739cb04a7771720c0568
SHA1f49f4eefdf1690e7d90d73dab49af0d4a95591f2
SHA2565f592628f8f5e37d3316357e0bcfa5adb8e0e1365ccce4e5ac4dba9913b6846d
SHA51283c3e34fae23720724933d45b4060f25cd3c0e8192610714243b07377295dd983948b8c4cfc77216d4ee7034b470c5d9172168d94aa1c1a0f6d0cf2d73b76800
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56adbff24b39089da6f240c811313890e
SHA1b9bcbc2d6575c39b207ff8d95477d1b53c46e290
SHA2569364157b1edc948a2be456e14b666fd14c8f3215d9897ec4ad99fdfefe357e91
SHA5120686a98b4f47385bf6056bbad08071e6c581caae426aa376c0ebd655d39ad2ab4256803e88d5bcf62fd76e9a2fc2fa28fb47122e5b3b8f9bf11e564054d07f97