Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 01:34
Static task
static1
Behavioral task
behavioral1
Sample
320ebacd8de36f554b892647ad4954db_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
320ebacd8de36f554b892647ad4954db_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
320ebacd8de36f554b892647ad4954db_JaffaCakes118.html
-
Size
25KB
-
MD5
320ebacd8de36f554b892647ad4954db
-
SHA1
c041969f80eb6b75f83b80df4cc26032aab18fc6
-
SHA256
4785c6ad6ffdcf810f663bbfb0b3f0587a17b1ed2f0b160384d49b44941f7786
-
SHA512
e35012dea9dc3647e2a4211de326c0fef034c0590dc7d756b01615a2ca63b4da9a17d336684b9f8eb6d6d0a80cf4ed604ba0e30e48b16b9f4d408f488088d542
-
SSDEEP
768:IRdqBj81S5a5WgiwG+Tj4BTsHMzrTpGhEYOoz:FUn9iwG+Tj4FsHM7oiYT
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2912 msedge.exe 2912 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 3160 identity_helper.exe 3160 identity_helper.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4052 wrote to memory of 4664 4052 msedge.exe 83 PID 4052 wrote to memory of 4664 4052 msedge.exe 83 PID 4052 wrote to memory of 3580 4052 msedge.exe 84 PID 4052 wrote to memory of 3580 4052 msedge.exe 84 PID 4052 wrote to memory of 3580 4052 msedge.exe 84 PID 4052 wrote to memory of 3580 4052 msedge.exe 84 PID 4052 wrote to memory of 3580 4052 msedge.exe 84 PID 4052 wrote to memory of 3580 4052 msedge.exe 84 PID 4052 wrote to memory of 3580 4052 msedge.exe 84 PID 4052 wrote to memory of 3580 4052 msedge.exe 84 PID 4052 wrote to memory of 3580 4052 msedge.exe 84 PID 4052 wrote to memory of 3580 4052 msedge.exe 84 PID 4052 wrote to memory of 3580 4052 msedge.exe 84 PID 4052 wrote to memory of 3580 4052 msedge.exe 84 PID 4052 wrote to memory of 3580 4052 msedge.exe 84 PID 4052 wrote to memory of 3580 4052 msedge.exe 84 PID 4052 wrote to memory of 3580 4052 msedge.exe 84 PID 4052 wrote to memory of 3580 4052 msedge.exe 84 PID 4052 wrote to memory of 3580 4052 msedge.exe 84 PID 4052 wrote to memory of 3580 4052 msedge.exe 84 PID 4052 wrote to memory of 3580 4052 msedge.exe 84 PID 4052 wrote to memory of 3580 4052 msedge.exe 84 PID 4052 wrote to memory of 3580 4052 msedge.exe 84 PID 4052 wrote to memory of 3580 4052 msedge.exe 84 PID 4052 wrote to memory of 3580 4052 msedge.exe 84 PID 4052 wrote to memory of 3580 4052 msedge.exe 84 PID 4052 wrote to memory of 3580 4052 msedge.exe 84 PID 4052 wrote to memory of 3580 4052 msedge.exe 84 PID 4052 wrote to memory of 3580 4052 msedge.exe 84 PID 4052 wrote to memory of 3580 4052 msedge.exe 84 PID 4052 wrote to memory of 3580 4052 msedge.exe 84 PID 4052 wrote to memory of 3580 4052 msedge.exe 84 PID 4052 wrote to memory of 3580 4052 msedge.exe 84 PID 4052 wrote to memory of 3580 4052 msedge.exe 84 PID 4052 wrote to memory of 3580 4052 msedge.exe 84 PID 4052 wrote to memory of 3580 4052 msedge.exe 84 PID 4052 wrote to memory of 3580 4052 msedge.exe 84 PID 4052 wrote to memory of 3580 4052 msedge.exe 84 PID 4052 wrote to memory of 3580 4052 msedge.exe 84 PID 4052 wrote to memory of 3580 4052 msedge.exe 84 PID 4052 wrote to memory of 3580 4052 msedge.exe 84 PID 4052 wrote to memory of 3580 4052 msedge.exe 84 PID 4052 wrote to memory of 2912 4052 msedge.exe 85 PID 4052 wrote to memory of 2912 4052 msedge.exe 85 PID 4052 wrote to memory of 4824 4052 msedge.exe 86 PID 4052 wrote to memory of 4824 4052 msedge.exe 86 PID 4052 wrote to memory of 4824 4052 msedge.exe 86 PID 4052 wrote to memory of 4824 4052 msedge.exe 86 PID 4052 wrote to memory of 4824 4052 msedge.exe 86 PID 4052 wrote to memory of 4824 4052 msedge.exe 86 PID 4052 wrote to memory of 4824 4052 msedge.exe 86 PID 4052 wrote to memory of 4824 4052 msedge.exe 86 PID 4052 wrote to memory of 4824 4052 msedge.exe 86 PID 4052 wrote to memory of 4824 4052 msedge.exe 86 PID 4052 wrote to memory of 4824 4052 msedge.exe 86 PID 4052 wrote to memory of 4824 4052 msedge.exe 86 PID 4052 wrote to memory of 4824 4052 msedge.exe 86 PID 4052 wrote to memory of 4824 4052 msedge.exe 86 PID 4052 wrote to memory of 4824 4052 msedge.exe 86 PID 4052 wrote to memory of 4824 4052 msedge.exe 86 PID 4052 wrote to memory of 4824 4052 msedge.exe 86 PID 4052 wrote to memory of 4824 4052 msedge.exe 86 PID 4052 wrote to memory of 4824 4052 msedge.exe 86 PID 4052 wrote to memory of 4824 4052 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\320ebacd8de36f554b892647ad4954db_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff968ca46f8,0x7ff968ca4708,0x7ff968ca47182⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,18035882083605119261,13989730243418455353,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2036,18035882083605119261,13989730243418455353,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2408 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2036,18035882083605119261,13989730243418455353,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,18035882083605119261,13989730243418455353,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,18035882083605119261,13989730243418455353,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,18035882083605119261,13989730243418455353,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5492 /prefetch:82⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,18035882083605119261,13989730243418455353,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5492 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,18035882083605119261,13989730243418455353,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:3584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,18035882083605119261,13989730243418455353,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,18035882083605119261,13989730243418455353,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,18035882083605119261,13989730243418455353,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:3748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,18035882083605119261,13989730243418455353,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1864 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:924
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3560
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3188
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\3c19e1bb-6232-42f5-8c05-ca381eb2948e.tmp
Filesize5KB
MD5b4e49ab6a1aeec7438b1eddf6e4e0e90
SHA1595e36cc69bfd8e9a42bc993858d274a6d8e0b0b
SHA25674a3933f25d48f3e43dce1ad6afa568d2fe5519d03cd5b32bff853fe38cd5e91
SHA512e7a8ce61c6b369b376179ecae35989ce1d837b26acd4b00eaf36bc379e5e6f7104b36ff77239436ad85d6a70b1ba54372391d1e14e46a2b528d7e9e03b4b99ed
-
Filesize
189B
MD5443319881835b14fda88caab9945e84c
SHA1adb420bd20774e8eabc4d3d53ecfccb20ae7cb54
SHA256fd79d0831e92ccbffc20eed3a0d07b39a121b4f3be4f720d2981fdd2e7b5b8da
SHA51239c2c7fd638c04ce244473831d3dc8175e8e9ecb9a0df38370300233202d7d7fa9166912b8d97b34efd7b90eab6da376191e1c5c9ce253e96c9686b886ab29fb
-
Filesize
6KB
MD50fc81818e023a0e3d942c8fa17ad2c18
SHA108046c01abb406fa211bdf0c4fbfb39b80053cc8
SHA2566da3c25d76a547cbdfb2e39e2aaf7ec0042f1e4647ce17797b6ecf7f0b519676
SHA512cdedfaed62bc40995c50db3a42d0955a1a7500d37828d01b238a34425f5be0ccd06cdf63ba976b36018cba1f90bb8a454dbdb4dd8eb364495fd57fcbc25d56a3
-
Filesize
6KB
MD5f03d76f28d44850727af37502f680ab0
SHA113ea7da15b3fe233f3ab40d3b08c28132e8e1571
SHA256832df85564f81ee605f2cd1c29cab5940b4d9dee61a72ffaf5dd173aead264d4
SHA512fbaaff077230ca5546ec1363c3b04b48bab32ea85e5a41ea464c4285244aa1c8a6c9401385784f06198dbb00ec32fec9c128506a107219a8640b37e076f0694b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ced2375585b4dee4ceb3c80a32c75aa1
SHA1bf96df7d76c54d4e80143e25cc4e7dcb752ffb01
SHA25624792273b20731d699143bf4472b2cd8d73d496e1ef515b75dd12b23dd53d61c
SHA5123bbccea679b2ff416929cf349c4005cd57e796f27992625cae664d9d782e783f366b3edfa2a11129defe261ee2472416d11a7dd2410c51ca55579b5b549e7bd1