Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 05:15
Static task
static1
Behavioral task
behavioral1
Sample
32e6e0b404462418e513b5cf040ae83e_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
32e6e0b404462418e513b5cf040ae83e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
32e6e0b404462418e513b5cf040ae83e_JaffaCakes118.html
-
Size
202KB
-
MD5
32e6e0b404462418e513b5cf040ae83e
-
SHA1
a8c358cbf41798fd896f35e6f46c9613a79dee92
-
SHA256
054f65180731e1c0d169563c0cdb18ff58688b76ee7c2402bb8780f03ee97579
-
SHA512
e0a7445dd1825e3a4b3b91878b208efc1e9141ab47faf4328a067cbba25e6d74be47b2ad9c8db1989d23803ce71c166de113162da467dbf204c47a16c28ff279
-
SSDEEP
6144:/RtjiZT3lSUlvRdZCYx9kblvHP3yqQ0oD:ptjiZT3QcRdZCYx9kblvHP3yqQ0oD
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1036 msedge.exe 1036 msedge.exe 3140 msedge.exe 3140 msedge.exe 3096 identity_helper.exe 3096 identity_helper.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3140 wrote to memory of 1364 3140 msedge.exe 82 PID 3140 wrote to memory of 1364 3140 msedge.exe 82 PID 3140 wrote to memory of 1044 3140 msedge.exe 83 PID 3140 wrote to memory of 1044 3140 msedge.exe 83 PID 3140 wrote to memory of 1044 3140 msedge.exe 83 PID 3140 wrote to memory of 1044 3140 msedge.exe 83 PID 3140 wrote to memory of 1044 3140 msedge.exe 83 PID 3140 wrote to memory of 1044 3140 msedge.exe 83 PID 3140 wrote to memory of 1044 3140 msedge.exe 83 PID 3140 wrote to memory of 1044 3140 msedge.exe 83 PID 3140 wrote to memory of 1044 3140 msedge.exe 83 PID 3140 wrote to memory of 1044 3140 msedge.exe 83 PID 3140 wrote to memory of 1044 3140 msedge.exe 83 PID 3140 wrote to memory of 1044 3140 msedge.exe 83 PID 3140 wrote to memory of 1044 3140 msedge.exe 83 PID 3140 wrote to memory of 1044 3140 msedge.exe 83 PID 3140 wrote to memory of 1044 3140 msedge.exe 83 PID 3140 wrote to memory of 1044 3140 msedge.exe 83 PID 3140 wrote to memory of 1044 3140 msedge.exe 83 PID 3140 wrote to memory of 1044 3140 msedge.exe 83 PID 3140 wrote to memory of 1044 3140 msedge.exe 83 PID 3140 wrote to memory of 1044 3140 msedge.exe 83 PID 3140 wrote to memory of 1044 3140 msedge.exe 83 PID 3140 wrote to memory of 1044 3140 msedge.exe 83 PID 3140 wrote to memory of 1044 3140 msedge.exe 83 PID 3140 wrote to memory of 1044 3140 msedge.exe 83 PID 3140 wrote to memory of 1044 3140 msedge.exe 83 PID 3140 wrote to memory of 1044 3140 msedge.exe 83 PID 3140 wrote to memory of 1044 3140 msedge.exe 83 PID 3140 wrote to memory of 1044 3140 msedge.exe 83 PID 3140 wrote to memory of 1044 3140 msedge.exe 83 PID 3140 wrote to memory of 1044 3140 msedge.exe 83 PID 3140 wrote to memory of 1044 3140 msedge.exe 83 PID 3140 wrote to memory of 1044 3140 msedge.exe 83 PID 3140 wrote to memory of 1044 3140 msedge.exe 83 PID 3140 wrote to memory of 1044 3140 msedge.exe 83 PID 3140 wrote to memory of 1044 3140 msedge.exe 83 PID 3140 wrote to memory of 1044 3140 msedge.exe 83 PID 3140 wrote to memory of 1044 3140 msedge.exe 83 PID 3140 wrote to memory of 1044 3140 msedge.exe 83 PID 3140 wrote to memory of 1044 3140 msedge.exe 83 PID 3140 wrote to memory of 1044 3140 msedge.exe 83 PID 3140 wrote to memory of 1036 3140 msedge.exe 84 PID 3140 wrote to memory of 1036 3140 msedge.exe 84 PID 3140 wrote to memory of 4960 3140 msedge.exe 85 PID 3140 wrote to memory of 4960 3140 msedge.exe 85 PID 3140 wrote to memory of 4960 3140 msedge.exe 85 PID 3140 wrote to memory of 4960 3140 msedge.exe 85 PID 3140 wrote to memory of 4960 3140 msedge.exe 85 PID 3140 wrote to memory of 4960 3140 msedge.exe 85 PID 3140 wrote to memory of 4960 3140 msedge.exe 85 PID 3140 wrote to memory of 4960 3140 msedge.exe 85 PID 3140 wrote to memory of 4960 3140 msedge.exe 85 PID 3140 wrote to memory of 4960 3140 msedge.exe 85 PID 3140 wrote to memory of 4960 3140 msedge.exe 85 PID 3140 wrote to memory of 4960 3140 msedge.exe 85 PID 3140 wrote to memory of 4960 3140 msedge.exe 85 PID 3140 wrote to memory of 4960 3140 msedge.exe 85 PID 3140 wrote to memory of 4960 3140 msedge.exe 85 PID 3140 wrote to memory of 4960 3140 msedge.exe 85 PID 3140 wrote to memory of 4960 3140 msedge.exe 85 PID 3140 wrote to memory of 4960 3140 msedge.exe 85 PID 3140 wrote to memory of 4960 3140 msedge.exe 85 PID 3140 wrote to memory of 4960 3140 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\32e6e0b404462418e513b5cf040ae83e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa05d646f8,0x7ffa05d64708,0x7ffa05d647182⤵PID:1364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,6737843538281124301,5230032518621048551,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1996 /prefetch:22⤵PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1976,6737843538281124301,5230032518621048551,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1976,6737843538281124301,5230032518621048551,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3004 /prefetch:82⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,6737843538281124301,5230032518621048551,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,6737843538281124301,5230032518621048551,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,6737843538281124301,5230032518621048551,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1976,6737843538281124301,5230032518621048551,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5704 /prefetch:82⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1976,6737843538281124301,5230032518621048551,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5704 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,6737843538281124301,5230032518621048551,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1280 /prefetch:12⤵PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,6737843538281124301,5230032518621048551,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,6737843538281124301,5230032518621048551,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4176 /prefetch:12⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,6737843538281124301,5230032518621048551,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4040 /prefetch:12⤵PID:736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,6737843538281124301,5230032518621048551,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4948 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3648
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2628
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
409B
MD5a56945db3509f728cf23ef5da9fe64fd
SHA183675e030a48f1fbdbec98a8b9b29089ee1c5856
SHA25612f8d8b06c1b00e308d542218e5e6ec7100e62a317175f2313a6552247766b80
SHA51280fdc077d0841b4b8cbd605f39e56901d81b213db91820c108e2057d862d686d133503f6bffcfd16dbed46d298d4c38285ff518ed806de4684cf374d2ba03456
-
Filesize
6KB
MD589d7b23df54b86e4f5c8f26916a27ea6
SHA13cbb222f53c97f92129a013731244d2f172e5ff2
SHA256238fed8b5ee9ba1886047d00767fe7f630e77514e13320c9d8a2a5fd484dad3d
SHA512c5b9ae308a6441a72805fe38d3bcc59638cadbf8daa17f5efd0fd7e61f432e88ea23be1eef9bbe5ab1058731576e61ae88edcb016817e0e439624a91416a32a7
-
Filesize
7KB
MD532addd0e98e63d6f0b43782fac26ea73
SHA1c87f78d50600874bc634a9b984713686862af8c2
SHA256c1492b3a82f7ed3b894aaf5a3016832eb99abb0ec0d122cfe72b9e672c9578a7
SHA51227dcb5084c50072e6e7abfc1519d7e049f918e0e4dca3c448772d573515a8f332fe407e4c98bbbc0bf4daf01a2c779e81ebada47e24bb9e1f77bf97a41292d0c
-
Filesize
6KB
MD5e499a4b3aded8d8f970f24e50764ca68
SHA1a7390ffbc79d5a878c2058e910b25159612c1062
SHA256be24cc0cb20628a3e40e2d027db583b237164059c5b2866fd7fc546d929b826c
SHA51241845f976e31f3f0c78057ef357d255c6fa1f36a775f082752d695a5be482b345a98c6275bc5ef5b33913632e1eb377387e88a04fe1e49afd1a34faa9ee777c7
-
Filesize
1KB
MD591d8e50de196c53e83e4de3140d57d43
SHA17649da7715cc31e6283a96ef6bd814f29fedec77
SHA256b115c4636cd24dc19bb5e61411c579df8170f1853e2c417e1ad87396e56940ba
SHA51224257b509931b109e3039a51c09790c9bd315c34058e1f687e2829b82b1dd7107ae2bdc81fd7a07ccd5d304713e90c1385613dd1bff5905395f58da1639b8278
-
Filesize
1KB
MD5ebf56077548d52618dee6e806e4ccf6a
SHA109f602a011624bc18e2a99b40eba49c17d2d8e31
SHA25694a2ce1f2d2700b97dcd2674da2d9cfd2fe07b59cd9380823a8cbc31c5846a4e
SHA512681dd1eec79ea88ea1c56027cb0f920c9f55e4db6985f2564806203bf88c32171c95bb96bb4254875805eb213eb9770888ac6174b7abea15a1a82bd3e05ab045
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD540ddb0ef22c326e7f03dd5da5d8aefe3
SHA1a6225f8e4353ecd63df2518eb18f3264eb06a320
SHA256c408c118771611aba35b801c8857f66a97ee0c2072de29b6dd8831fb07e430d0
SHA512ee58d05ac1828c747534a166e906e76ec2d55710f01a05c8b0815dac38e4e921c745574a395ea78d2f8303cb9fb32249eef3a302e098d3fa0f9ac11008a2d507