Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 04:05
Static task
static1
Behavioral task
behavioral1
Sample
32a151f8ccb7da28ed23fa51c96ac089_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
32a151f8ccb7da28ed23fa51c96ac089_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
32a151f8ccb7da28ed23fa51c96ac089_JaffaCakes118.html
-
Size
30KB
-
MD5
32a151f8ccb7da28ed23fa51c96ac089
-
SHA1
d569081282ba13f13888f1cda2bfc4330022f4b3
-
SHA256
13a21be46634f02a04120cfc9cb90cac8ea90e99dec9439d51496e29aebcd031
-
SHA512
608db88d9911ee3a853b3bf46cf8f13fbc4e8beac740c21dd5d8c47dc7034b838d073e98319814757715508281e0fb2270dab71d24bc08267c2758e3780fc284
-
SSDEEP
768:yRmvwhp9/OqzE02rSkie+GKGhKJuH9CQrejsHZiypv2:yRmvwhp9/OIE0ohigPKJuH9CQrejiYyw
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1560 msedge.exe 1560 msedge.exe 3144 msedge.exe 3144 msedge.exe 5032 identity_helper.exe 5032 identity_helper.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3144 wrote to memory of 2888 3144 msedge.exe 82 PID 3144 wrote to memory of 2888 3144 msedge.exe 82 PID 3144 wrote to memory of 216 3144 msedge.exe 83 PID 3144 wrote to memory of 216 3144 msedge.exe 83 PID 3144 wrote to memory of 216 3144 msedge.exe 83 PID 3144 wrote to memory of 216 3144 msedge.exe 83 PID 3144 wrote to memory of 216 3144 msedge.exe 83 PID 3144 wrote to memory of 216 3144 msedge.exe 83 PID 3144 wrote to memory of 216 3144 msedge.exe 83 PID 3144 wrote to memory of 216 3144 msedge.exe 83 PID 3144 wrote to memory of 216 3144 msedge.exe 83 PID 3144 wrote to memory of 216 3144 msedge.exe 83 PID 3144 wrote to memory of 216 3144 msedge.exe 83 PID 3144 wrote to memory of 216 3144 msedge.exe 83 PID 3144 wrote to memory of 216 3144 msedge.exe 83 PID 3144 wrote to memory of 216 3144 msedge.exe 83 PID 3144 wrote to memory of 216 3144 msedge.exe 83 PID 3144 wrote to memory of 216 3144 msedge.exe 83 PID 3144 wrote to memory of 216 3144 msedge.exe 83 PID 3144 wrote to memory of 216 3144 msedge.exe 83 PID 3144 wrote to memory of 216 3144 msedge.exe 83 PID 3144 wrote to memory of 216 3144 msedge.exe 83 PID 3144 wrote to memory of 216 3144 msedge.exe 83 PID 3144 wrote to memory of 216 3144 msedge.exe 83 PID 3144 wrote to memory of 216 3144 msedge.exe 83 PID 3144 wrote to memory of 216 3144 msedge.exe 83 PID 3144 wrote to memory of 216 3144 msedge.exe 83 PID 3144 wrote to memory of 216 3144 msedge.exe 83 PID 3144 wrote to memory of 216 3144 msedge.exe 83 PID 3144 wrote to memory of 216 3144 msedge.exe 83 PID 3144 wrote to memory of 216 3144 msedge.exe 83 PID 3144 wrote to memory of 216 3144 msedge.exe 83 PID 3144 wrote to memory of 216 3144 msedge.exe 83 PID 3144 wrote to memory of 216 3144 msedge.exe 83 PID 3144 wrote to memory of 216 3144 msedge.exe 83 PID 3144 wrote to memory of 216 3144 msedge.exe 83 PID 3144 wrote to memory of 216 3144 msedge.exe 83 PID 3144 wrote to memory of 216 3144 msedge.exe 83 PID 3144 wrote to memory of 216 3144 msedge.exe 83 PID 3144 wrote to memory of 216 3144 msedge.exe 83 PID 3144 wrote to memory of 216 3144 msedge.exe 83 PID 3144 wrote to memory of 216 3144 msedge.exe 83 PID 3144 wrote to memory of 1560 3144 msedge.exe 84 PID 3144 wrote to memory of 1560 3144 msedge.exe 84 PID 3144 wrote to memory of 3520 3144 msedge.exe 85 PID 3144 wrote to memory of 3520 3144 msedge.exe 85 PID 3144 wrote to memory of 3520 3144 msedge.exe 85 PID 3144 wrote to memory of 3520 3144 msedge.exe 85 PID 3144 wrote to memory of 3520 3144 msedge.exe 85 PID 3144 wrote to memory of 3520 3144 msedge.exe 85 PID 3144 wrote to memory of 3520 3144 msedge.exe 85 PID 3144 wrote to memory of 3520 3144 msedge.exe 85 PID 3144 wrote to memory of 3520 3144 msedge.exe 85 PID 3144 wrote to memory of 3520 3144 msedge.exe 85 PID 3144 wrote to memory of 3520 3144 msedge.exe 85 PID 3144 wrote to memory of 3520 3144 msedge.exe 85 PID 3144 wrote to memory of 3520 3144 msedge.exe 85 PID 3144 wrote to memory of 3520 3144 msedge.exe 85 PID 3144 wrote to memory of 3520 3144 msedge.exe 85 PID 3144 wrote to memory of 3520 3144 msedge.exe 85 PID 3144 wrote to memory of 3520 3144 msedge.exe 85 PID 3144 wrote to memory of 3520 3144 msedge.exe 85 PID 3144 wrote to memory of 3520 3144 msedge.exe 85 PID 3144 wrote to memory of 3520 3144 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\32a151f8ccb7da28ed23fa51c96ac089_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff561b46f8,0x7fff561b4708,0x7fff561b47182⤵PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,8192447044288169339,18194628481121606374,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,8192447044288169339,18194628481121606374,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,8192447044288169339,18194628481121606374,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8192447044288169339,18194628481121606374,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8192447044288169339,18194628481121606374,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,8192447044288169339,18194628481121606374,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5420 /prefetch:82⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,8192447044288169339,18194628481121606374,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5420 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8192447044288169339,18194628481121606374,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3640 /prefetch:12⤵PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8192447044288169339,18194628481121606374,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2640 /prefetch:12⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8192447044288169339,18194628481121606374,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1840 /prefetch:12⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8192447044288169339,18194628481121606374,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1876 /prefetch:12⤵PID:3300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,8192447044288169339,18194628481121606374,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4908 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2792
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3716
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2124
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD58cdfd6f26987c297bef9fe3b8efa9787
SHA1d16a5030df244f277260c75283885dfee0d29ea8
SHA256108c65b1254f2becf94a8c692df89f22c81362f9fb80b43d80863acdf38c7cf8
SHA5120b2b1e1b24882de7b93597472dd90dac948add1fcc3f61b10bf6b44cf78b79cd0cbde02c702f0d10a5ea3aad6c622dcfb82f0ce34f88807813dcb256500a09f6
-
Filesize
5KB
MD583dde2d4de0689b1900f26787b678896
SHA12502539ac75736ba1829a6b85d6036278096983e
SHA2568d3365e2261ab0fb56874c7bd864a1330bb98b16e956be274cad23be5502e914
SHA5124938f5c6045de187ece5a036af0675fd806a7915e05ab281333fbdcd1689d28739bde4853e2023a1915b9b5a1d687cf1c02b61870a7a8cc59d1e1b9700aafd46
-
Filesize
6KB
MD5bea89f04b1e2f473f715dad3d19dc31c
SHA144f1b9ef19cd619ba20fc9b3d196f10668097361
SHA256c175955bd44ffdec1b64e154575c1e3e41d99ca1bc6518b7aed520224e877d83
SHA5127679a3cce1ae83e89450de9259e74c690f6218c9adcd94bd527d1aca59b95f0b7aae1625a4d3c38b8c84da78ef790b0aad4556f9312b0875c7de6add31449bae
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\d43c9747-79df-4bd9-9518-b362ff5079d6.tmp
Filesize474B
MD57d3597fb253efc125eda475ef476bd77
SHA1a32e757ba0030bf59cb40491da5422c4760f0ee4
SHA256ab4ce43d53fccd40276f3701d6f128508fd605928698d1d822115965204b87ec
SHA51245ea778f24beadbe5f0d99762e529ac8830bfaff623f0377b465a9f12cdff38462535f28d15d6a79bb3dc37fced628b71b3ce1b289f02bd46c00dfdafcb78311
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51773b6f62db59438afc69d2d1f54ef8a
SHA1a8bdc6419bb73941e6e944d47f09e31bbff8c8dc
SHA2564c65ab11409722a1326152868fbbbc6f84122b347e20e87a6ce515e87d0cd8b2
SHA5128c2f1b6bd9a00a6bce27c2483364e07174b55254dcbacf8a560da5baa02cc223ff3f8cd9de6758f1a6c65dab5b053d1ffd1585701695ccecd483cc57ee59df26