Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 02:09
Static task
static1
Behavioral task
behavioral1
Sample
322ee84be29a9ea56e7a1bf3bbb2959e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
322ee84be29a9ea56e7a1bf3bbb2959e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
322ee84be29a9ea56e7a1bf3bbb2959e_JaffaCakes118.html
-
Size
18KB
-
MD5
322ee84be29a9ea56e7a1bf3bbb2959e
-
SHA1
1e28a366e86837f4c473084481017b678f6d1d4e
-
SHA256
ae4cc54b8d4c1db3384241167b348cc06bd8129619dc829f7e6f03e462db0b5d
-
SHA512
77894d74ce2fb80acaf086148c96f0ba55a402078329f7cc8f4cf315efd2c7450893b448e8725070b509aa59d1a048f040f917df749f79fb38fc0021a052cf8d
-
SSDEEP
192:SIM3t0I5fo9cOQivXQWxZxdkVSoAI+4GzUnjBheg82qDB8:SIMd0I5nO9HNsvejxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1320 msedge.exe 1320 msedge.exe 2528 msedge.exe 2528 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 1012 identity_helper.exe 1012 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2528 wrote to memory of 1660 2528 msedge.exe 82 PID 2528 wrote to memory of 1660 2528 msedge.exe 82 PID 2528 wrote to memory of 1536 2528 msedge.exe 84 PID 2528 wrote to memory of 1536 2528 msedge.exe 84 PID 2528 wrote to memory of 1536 2528 msedge.exe 84 PID 2528 wrote to memory of 1536 2528 msedge.exe 84 PID 2528 wrote to memory of 1536 2528 msedge.exe 84 PID 2528 wrote to memory of 1536 2528 msedge.exe 84 PID 2528 wrote to memory of 1536 2528 msedge.exe 84 PID 2528 wrote to memory of 1536 2528 msedge.exe 84 PID 2528 wrote to memory of 1536 2528 msedge.exe 84 PID 2528 wrote to memory of 1536 2528 msedge.exe 84 PID 2528 wrote to memory of 1536 2528 msedge.exe 84 PID 2528 wrote to memory of 1536 2528 msedge.exe 84 PID 2528 wrote to memory of 1536 2528 msedge.exe 84 PID 2528 wrote to memory of 1536 2528 msedge.exe 84 PID 2528 wrote to memory of 1536 2528 msedge.exe 84 PID 2528 wrote to memory of 1536 2528 msedge.exe 84 PID 2528 wrote to memory of 1536 2528 msedge.exe 84 PID 2528 wrote to memory of 1536 2528 msedge.exe 84 PID 2528 wrote to memory of 1536 2528 msedge.exe 84 PID 2528 wrote to memory of 1536 2528 msedge.exe 84 PID 2528 wrote to memory of 1536 2528 msedge.exe 84 PID 2528 wrote to memory of 1536 2528 msedge.exe 84 PID 2528 wrote to memory of 1536 2528 msedge.exe 84 PID 2528 wrote to memory of 1536 2528 msedge.exe 84 PID 2528 wrote to memory of 1536 2528 msedge.exe 84 PID 2528 wrote to memory of 1536 2528 msedge.exe 84 PID 2528 wrote to memory of 1536 2528 msedge.exe 84 PID 2528 wrote to memory of 1536 2528 msedge.exe 84 PID 2528 wrote to memory of 1536 2528 msedge.exe 84 PID 2528 wrote to memory of 1536 2528 msedge.exe 84 PID 2528 wrote to memory of 1536 2528 msedge.exe 84 PID 2528 wrote to memory of 1536 2528 msedge.exe 84 PID 2528 wrote to memory of 1536 2528 msedge.exe 84 PID 2528 wrote to memory of 1536 2528 msedge.exe 84 PID 2528 wrote to memory of 1536 2528 msedge.exe 84 PID 2528 wrote to memory of 1536 2528 msedge.exe 84 PID 2528 wrote to memory of 1536 2528 msedge.exe 84 PID 2528 wrote to memory of 1536 2528 msedge.exe 84 PID 2528 wrote to memory of 1536 2528 msedge.exe 84 PID 2528 wrote to memory of 1536 2528 msedge.exe 84 PID 2528 wrote to memory of 1320 2528 msedge.exe 85 PID 2528 wrote to memory of 1320 2528 msedge.exe 85 PID 2528 wrote to memory of 644 2528 msedge.exe 86 PID 2528 wrote to memory of 644 2528 msedge.exe 86 PID 2528 wrote to memory of 644 2528 msedge.exe 86 PID 2528 wrote to memory of 644 2528 msedge.exe 86 PID 2528 wrote to memory of 644 2528 msedge.exe 86 PID 2528 wrote to memory of 644 2528 msedge.exe 86 PID 2528 wrote to memory of 644 2528 msedge.exe 86 PID 2528 wrote to memory of 644 2528 msedge.exe 86 PID 2528 wrote to memory of 644 2528 msedge.exe 86 PID 2528 wrote to memory of 644 2528 msedge.exe 86 PID 2528 wrote to memory of 644 2528 msedge.exe 86 PID 2528 wrote to memory of 644 2528 msedge.exe 86 PID 2528 wrote to memory of 644 2528 msedge.exe 86 PID 2528 wrote to memory of 644 2528 msedge.exe 86 PID 2528 wrote to memory of 644 2528 msedge.exe 86 PID 2528 wrote to memory of 644 2528 msedge.exe 86 PID 2528 wrote to memory of 644 2528 msedge.exe 86 PID 2528 wrote to memory of 644 2528 msedge.exe 86 PID 2528 wrote to memory of 644 2528 msedge.exe 86 PID 2528 wrote to memory of 644 2528 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\322ee84be29a9ea56e7a1bf3bbb2959e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff12b746f8,0x7fff12b74708,0x7fff12b747182⤵PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,4713576682501094821,9448468901880929538,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,4713576682501094821,9448468901880929538,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2376 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,4713576682501094821,9448468901880929538,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:82⤵PID:644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4713576682501094821,9448468901880929538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4713576682501094821,9448468901880929538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,4713576682501094821,9448468901880929538,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4748 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,4713576682501094821,9448468901880929538,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:82⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,4713576682501094821,9448468901880929538,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4713576682501094821,9448468901880929538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3936 /prefetch:12⤵PID:1092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4713576682501094821,9448468901880929538,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4713576682501094821,9448468901880929538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4713576682501094821,9448468901880929538,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:12⤵PID:2588
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4984
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
6KB
MD51967b238c06d4880f498b458b6f2020e
SHA137595394d75c7d4775349eed437b4b1c5d19b412
SHA25624834e71f37875615ecb819d55d5dfe55a2859a32ff0408c128ebdbf1e9b1c61
SHA5125ed1fe88faf53b155c44834aa6908fa9acc235ddaa7f2637bfe1a75b547fd822e1b6d1c655e943cad4b26a45810f0c8b0d40d800da2a4190e583b66552b302d1
-
Filesize
6KB
MD579d233f1862daf2bed3b487f6dde6070
SHA1864ad96f9d4965bf1298d91df4348dff695449a3
SHA256aa2a5e09c2fccbadf5ef1dce7f57f0e6a962f0cc605a1c332cf4af03b0fe5d74
SHA512bc8becea6eec7d8a0350178e9e7296c103b140da63988aa65b14bff40998ef5252af740d60ff024b8ffdb997b122ffe145a77c22857a433e59397e31fd5d34f0
-
Filesize
6KB
MD58a3fd41c71643de6f7af0c673b539bed
SHA16bf78f66229dc4125bc4eda232903d8a64c6e08b
SHA256a0ffbee5631564f5d085bfaec31d92b23baf45b32fe75b1d4c2d30591ddac0b8
SHA5124a9ddb4d92f70a434e734ad1bc8501308173da22968930e67b71ec590ad494bfa239b6ff8df1eda1100e9e360a51fadc5b5e0796e530ca2e37bdf8d705e45177
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e65e4978df48229377ffb219353dc5cc
SHA1349a5a1466436e120aa0ae7f55e8f9ff3ec421c7
SHA2569d4e71f0d2afa116788e6b1641e397227c3119c1877caf33c9689dbb3088a70d
SHA512a8019851c56aece201900c68319f1dbd98aaaf8bb6668ead0875f7dcbb352755eda492e466a6140e6eaaa88634e5eac677da264c5aa8f0bb685d9242d58b32c1