Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 21:45
Static task
static1
Behavioral task
behavioral1
Sample
36b2db8024c98be64cd2c91901746cbd_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
36b2db8024c98be64cd2c91901746cbd_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
36b2db8024c98be64cd2c91901746cbd_JaffaCakes118.html
-
Size
70KB
-
MD5
36b2db8024c98be64cd2c91901746cbd
-
SHA1
e40104b7f55e019c5d93193026552e5b14c11de7
-
SHA256
d06c5d2c036715fad57694c97392bcaec38d0677057dc82213fa1726c4e1c53a
-
SHA512
c30cb9cc23f24ceaf5003c735796ef075070fdb598d8a01be40fdefd83188b8d1884d55ef0f19c4a52d507b7b6e68b2474ba48004b8a1d2f083157cb75ce7dd4
-
SSDEEP
1536:mm8nnHv74qORyYxOsOjOJO1OKj+6Bac3tlktX:mm8nnHT0qLK40Kj+6Bac3tlktX
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 696 msedge.exe 696 msedge.exe 1332 msedge.exe 1332 msedge.exe 3532 identity_helper.exe 3532 identity_helper.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1332 wrote to memory of 448 1332 msedge.exe 82 PID 1332 wrote to memory of 448 1332 msedge.exe 82 PID 1332 wrote to memory of 4988 1332 msedge.exe 83 PID 1332 wrote to memory of 4988 1332 msedge.exe 83 PID 1332 wrote to memory of 4988 1332 msedge.exe 83 PID 1332 wrote to memory of 4988 1332 msedge.exe 83 PID 1332 wrote to memory of 4988 1332 msedge.exe 83 PID 1332 wrote to memory of 4988 1332 msedge.exe 83 PID 1332 wrote to memory of 4988 1332 msedge.exe 83 PID 1332 wrote to memory of 4988 1332 msedge.exe 83 PID 1332 wrote to memory of 4988 1332 msedge.exe 83 PID 1332 wrote to memory of 4988 1332 msedge.exe 83 PID 1332 wrote to memory of 4988 1332 msedge.exe 83 PID 1332 wrote to memory of 4988 1332 msedge.exe 83 PID 1332 wrote to memory of 4988 1332 msedge.exe 83 PID 1332 wrote to memory of 4988 1332 msedge.exe 83 PID 1332 wrote to memory of 4988 1332 msedge.exe 83 PID 1332 wrote to memory of 4988 1332 msedge.exe 83 PID 1332 wrote to memory of 4988 1332 msedge.exe 83 PID 1332 wrote to memory of 4988 1332 msedge.exe 83 PID 1332 wrote to memory of 4988 1332 msedge.exe 83 PID 1332 wrote to memory of 4988 1332 msedge.exe 83 PID 1332 wrote to memory of 4988 1332 msedge.exe 83 PID 1332 wrote to memory of 4988 1332 msedge.exe 83 PID 1332 wrote to memory of 4988 1332 msedge.exe 83 PID 1332 wrote to memory of 4988 1332 msedge.exe 83 PID 1332 wrote to memory of 4988 1332 msedge.exe 83 PID 1332 wrote to memory of 4988 1332 msedge.exe 83 PID 1332 wrote to memory of 4988 1332 msedge.exe 83 PID 1332 wrote to memory of 4988 1332 msedge.exe 83 PID 1332 wrote to memory of 4988 1332 msedge.exe 83 PID 1332 wrote to memory of 4988 1332 msedge.exe 83 PID 1332 wrote to memory of 4988 1332 msedge.exe 83 PID 1332 wrote to memory of 4988 1332 msedge.exe 83 PID 1332 wrote to memory of 4988 1332 msedge.exe 83 PID 1332 wrote to memory of 4988 1332 msedge.exe 83 PID 1332 wrote to memory of 4988 1332 msedge.exe 83 PID 1332 wrote to memory of 4988 1332 msedge.exe 83 PID 1332 wrote to memory of 4988 1332 msedge.exe 83 PID 1332 wrote to memory of 4988 1332 msedge.exe 83 PID 1332 wrote to memory of 4988 1332 msedge.exe 83 PID 1332 wrote to memory of 4988 1332 msedge.exe 83 PID 1332 wrote to memory of 696 1332 msedge.exe 84 PID 1332 wrote to memory of 696 1332 msedge.exe 84 PID 1332 wrote to memory of 4796 1332 msedge.exe 85 PID 1332 wrote to memory of 4796 1332 msedge.exe 85 PID 1332 wrote to memory of 4796 1332 msedge.exe 85 PID 1332 wrote to memory of 4796 1332 msedge.exe 85 PID 1332 wrote to memory of 4796 1332 msedge.exe 85 PID 1332 wrote to memory of 4796 1332 msedge.exe 85 PID 1332 wrote to memory of 4796 1332 msedge.exe 85 PID 1332 wrote to memory of 4796 1332 msedge.exe 85 PID 1332 wrote to memory of 4796 1332 msedge.exe 85 PID 1332 wrote to memory of 4796 1332 msedge.exe 85 PID 1332 wrote to memory of 4796 1332 msedge.exe 85 PID 1332 wrote to memory of 4796 1332 msedge.exe 85 PID 1332 wrote to memory of 4796 1332 msedge.exe 85 PID 1332 wrote to memory of 4796 1332 msedge.exe 85 PID 1332 wrote to memory of 4796 1332 msedge.exe 85 PID 1332 wrote to memory of 4796 1332 msedge.exe 85 PID 1332 wrote to memory of 4796 1332 msedge.exe 85 PID 1332 wrote to memory of 4796 1332 msedge.exe 85 PID 1332 wrote to memory of 4796 1332 msedge.exe 85 PID 1332 wrote to memory of 4796 1332 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\36b2db8024c98be64cd2c91901746cbd_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcc53246f8,0x7ffcc5324708,0x7ffcc53247182⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,17685896813580467421,9749382698378080333,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,17685896813580467421,9749382698378080333,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,17685896813580467421,9749382698378080333,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,17685896813580467421,9749382698378080333,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,17685896813580467421,9749382698378080333,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,17685896813580467421,9749382698378080333,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,17685896813580467421,9749382698378080333,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:12⤵PID:2812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,17685896813580467421,9749382698378080333,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,17685896813580467421,9749382698378080333,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5408 /prefetch:82⤵PID:2588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,17685896813580467421,9749382698378080333,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5408 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,17685896813580467421,9749382698378080333,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4168 /prefetch:12⤵PID:2600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,17685896813580467421,9749382698378080333,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:12⤵PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,17685896813580467421,9749382698378080333,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4204 /prefetch:12⤵PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,17685896813580467421,9749382698378080333,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:12⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,17685896813580467421,9749382698378080333,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1800 /prefetch:12⤵PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,17685896813580467421,9749382698378080333,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4020 /prefetch:12⤵PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,17685896813580467421,9749382698378080333,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3516
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1068
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
498B
MD59216f28da18f181dedbd1ab9ce99349f
SHA128765d53a1badf8528728f4d26758f6f5abe67ea
SHA25671d25dd86f6ee008613e2a3aabe29cb90d04c3ae84f13993c50671e595a1ea68
SHA51220a2e6000322804d451649f2b850e504fe7259bbb3cc5f387cdb5deb475d1235406a8f1bf15bc21317d80940593751b59def70d4ffa8dc4dc31ca8e239032b1d
-
Filesize
5KB
MD58c3670e971deb8d1c1b4da4e62d42592
SHA1f2ff66bfab12133ec29f67867e8fba09725a66dd
SHA2569b59abfb4c4013e289e629b67f0925a13b5a820b431e161ddf897ad185fd426e
SHA512899bdd4dff2fb6cafa53ca3304bdd9d1fcee92d30ce58f8f957f40910e9574d1dc8d635453e231eb5fa0ac0bd144854b9eced2acfac594eb2477747e7462e22f
-
Filesize
6KB
MD530ea6c30b4b4a0dfdc46c7c490753dd6
SHA12410555e89e1e11ce74fe41785d0649f7ec206ea
SHA256a3e647a3c906473cb6ac5b6f258cabda7f5aa208d8a828b2238faeeba064248b
SHA512f2b60c930e7bf422f1ac02048d8102ca9ebd7fc8726a7c9528e5ed5e7f4e71144b5ffee88d895ebac747efafa0c572282adbec4fa27cb8e56d25c9e13317bdfe
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD598b45714ad712ea2777523414e8b8f17
SHA199ca749f1facb9f12b8138871276c07ad82c2861
SHA256f4a93706914d7b939af4529deb72ae342a0d6dd1b99658618e309d6f0bc8a5f0
SHA512973c6b59cd9952a8956cf0ea24470bcf627ffcd032f3e72c434a85ff26ecc5f3f1e342a67f60824e718023f5b35d7aa8e06e8aa11ca6b68858039c0722857670