Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 06:30
Static task
static1
Behavioral task
behavioral1
Sample
33369f4e35f7e366e4aa89aa63f5c997_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
33369f4e35f7e366e4aa89aa63f5c997_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
33369f4e35f7e366e4aa89aa63f5c997_JaffaCakes118.html
-
Size
18KB
-
MD5
33369f4e35f7e366e4aa89aa63f5c997
-
SHA1
0cddf4220970b874d686fe1e9afe069e7e4de29f
-
SHA256
00f4f8ed5edabf43a81de75ac99246722ae4d8b9e4ef2289628eb4d1bd656c47
-
SHA512
c15cb333fd3bbddd4cee447c879f95eabff5ebc61b0f833f1e9e2b60ea05e4d89dedbca83acb3dbf25663e34e36030bd662d66bc72353828c3d30a8431a64a6c
-
SSDEEP
384:gUgXs1E4unP+PEtvEyzapTDTyd3/NQ2LEMHrRrpacNjz/pMye4JsiGzwHoHIOPEE:ah+cdYN/ghl81/u9ln6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 996 msedge.exe 996 msedge.exe 1660 msedge.exe 1660 msedge.exe 4016 identity_helper.exe 4016 identity_helper.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1660 wrote to memory of 3844 1660 msedge.exe 86 PID 1660 wrote to memory of 3844 1660 msedge.exe 86 PID 1660 wrote to memory of 4156 1660 msedge.exe 87 PID 1660 wrote to memory of 4156 1660 msedge.exe 87 PID 1660 wrote to memory of 4156 1660 msedge.exe 87 PID 1660 wrote to memory of 4156 1660 msedge.exe 87 PID 1660 wrote to memory of 4156 1660 msedge.exe 87 PID 1660 wrote to memory of 4156 1660 msedge.exe 87 PID 1660 wrote to memory of 4156 1660 msedge.exe 87 PID 1660 wrote to memory of 4156 1660 msedge.exe 87 PID 1660 wrote to memory of 4156 1660 msedge.exe 87 PID 1660 wrote to memory of 4156 1660 msedge.exe 87 PID 1660 wrote to memory of 4156 1660 msedge.exe 87 PID 1660 wrote to memory of 4156 1660 msedge.exe 87 PID 1660 wrote to memory of 4156 1660 msedge.exe 87 PID 1660 wrote to memory of 4156 1660 msedge.exe 87 PID 1660 wrote to memory of 4156 1660 msedge.exe 87 PID 1660 wrote to memory of 4156 1660 msedge.exe 87 PID 1660 wrote to memory of 4156 1660 msedge.exe 87 PID 1660 wrote to memory of 4156 1660 msedge.exe 87 PID 1660 wrote to memory of 4156 1660 msedge.exe 87 PID 1660 wrote to memory of 4156 1660 msedge.exe 87 PID 1660 wrote to memory of 4156 1660 msedge.exe 87 PID 1660 wrote to memory of 4156 1660 msedge.exe 87 PID 1660 wrote to memory of 4156 1660 msedge.exe 87 PID 1660 wrote to memory of 4156 1660 msedge.exe 87 PID 1660 wrote to memory of 4156 1660 msedge.exe 87 PID 1660 wrote to memory of 4156 1660 msedge.exe 87 PID 1660 wrote to memory of 4156 1660 msedge.exe 87 PID 1660 wrote to memory of 4156 1660 msedge.exe 87 PID 1660 wrote to memory of 4156 1660 msedge.exe 87 PID 1660 wrote to memory of 4156 1660 msedge.exe 87 PID 1660 wrote to memory of 4156 1660 msedge.exe 87 PID 1660 wrote to memory of 4156 1660 msedge.exe 87 PID 1660 wrote to memory of 4156 1660 msedge.exe 87 PID 1660 wrote to memory of 4156 1660 msedge.exe 87 PID 1660 wrote to memory of 4156 1660 msedge.exe 87 PID 1660 wrote to memory of 4156 1660 msedge.exe 87 PID 1660 wrote to memory of 4156 1660 msedge.exe 87 PID 1660 wrote to memory of 4156 1660 msedge.exe 87 PID 1660 wrote to memory of 4156 1660 msedge.exe 87 PID 1660 wrote to memory of 4156 1660 msedge.exe 87 PID 1660 wrote to memory of 996 1660 msedge.exe 88 PID 1660 wrote to memory of 996 1660 msedge.exe 88 PID 1660 wrote to memory of 2612 1660 msedge.exe 89 PID 1660 wrote to memory of 2612 1660 msedge.exe 89 PID 1660 wrote to memory of 2612 1660 msedge.exe 89 PID 1660 wrote to memory of 2612 1660 msedge.exe 89 PID 1660 wrote to memory of 2612 1660 msedge.exe 89 PID 1660 wrote to memory of 2612 1660 msedge.exe 89 PID 1660 wrote to memory of 2612 1660 msedge.exe 89 PID 1660 wrote to memory of 2612 1660 msedge.exe 89 PID 1660 wrote to memory of 2612 1660 msedge.exe 89 PID 1660 wrote to memory of 2612 1660 msedge.exe 89 PID 1660 wrote to memory of 2612 1660 msedge.exe 89 PID 1660 wrote to memory of 2612 1660 msedge.exe 89 PID 1660 wrote to memory of 2612 1660 msedge.exe 89 PID 1660 wrote to memory of 2612 1660 msedge.exe 89 PID 1660 wrote to memory of 2612 1660 msedge.exe 89 PID 1660 wrote to memory of 2612 1660 msedge.exe 89 PID 1660 wrote to memory of 2612 1660 msedge.exe 89 PID 1660 wrote to memory of 2612 1660 msedge.exe 89 PID 1660 wrote to memory of 2612 1660 msedge.exe 89 PID 1660 wrote to memory of 2612 1660 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\33369f4e35f7e366e4aa89aa63f5c997_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa439e46f8,0x7ffa439e4708,0x7ffa439e47182⤵PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1952,9763225992113825426,2046428887756284191,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1952,9763225992113825426,2046428887756284191,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1952,9763225992113825426,2046428887756284191,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,9763225992113825426,2046428887756284191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,9763225992113825426,2046428887756284191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1952,9763225992113825426,2046428887756284191,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 /prefetch:82⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1952,9763225992113825426,2046428887756284191,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,9763225992113825426,2046428887756284191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,9763225992113825426,2046428887756284191,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:1496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,9763225992113825426,2046428887756284191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,9763225992113825426,2046428887756284191,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1952,9763225992113825426,2046428887756284191,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3104 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2360
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2700
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
520B
MD5959d356d5a407ab792c5b242f8af6821
SHA14ad625a31fe457a594e0f316d8131a6e20d48d84
SHA25602b7544ed296e98a6d754c640558941d96f0faba05b72524b6933f805bcd7fbb
SHA5123ca9dfd089c2da1b24f2bbd1d6a3d5922973afb6567ff60fe75f31e3ac412d0f2097672e0f1bcdd22138efbae8452ae8b217c6091b93bee931ea047f0f153c66
-
Filesize
5KB
MD5c2b58b73e077fdb29f3d801cdb7a2d55
SHA1057b335ac0223999f9ea39a7fd8a99d1c714e595
SHA25663b802bd79a3d87b5a2328f56ba0a73071601e031d4af3a7a8a03ba4ee066a4c
SHA5125ecbbb2b27a132c20453a109efe95c61dc17007f6b3b085f5dae2bbbadfbc7f852c828fe4f154dcc6c9678bd2fcfbdeeec7f2fd618e7e1da8506c52bfdc253c0
-
Filesize
6KB
MD5061cb71ffa32e54a2867fdbf31cee603
SHA14ce6d1a36b6d9b1486da3b2417ac93178a0e5629
SHA25623f46de1bffb686996dad90f7f73a7703700cdfa830da5f9b9270c6a120ff8e2
SHA512bc107e048e23125f4bb895c30f486f10e000b63801b62c1db499a4f274c70b0f3b743559b465f97ae3965b5fcb45469a65c037ee44532a310b0811f4e0f99e0a
-
Filesize
539B
MD5cd530d7dfe667ae25de04515b210f34b
SHA1f075ea7b8a48725367149faff54f02042c4a2d8c
SHA2565340a759194eafebe72ea099b292c405db4b661e79be760a8a57f375ef5c02fc
SHA512f8c89876ab0d4944159735c213efa8aa1a920affeb0a0d75ce6fe502bf481b3c92a1b7e08e27b1881a98a47d9e2627f787c1ee23e4558cddd2e84a35ea768040
-
Filesize
539B
MD505e7e374694782e81d1c13c8526e98eb
SHA1da0408aab2bd4adf16c50b5e510537853032672f
SHA2560d874717927ad9a009300b96d7533e762e5c4dda6c9ec07adec17c2ebb8b766c
SHA5124f120a669c8f02166b3b1be60008cc5abfdce87f025c89516bcde6c0c0277647fb00b11301636f5b448890c5d730f31dd446f187098f68260740cd7670b1fef4
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD55af86d9aea9968bef28df2d7eda3380d
SHA1ff1d7b0cbcee61600b3b08706a4bc21648beba75
SHA256588ef9db1e86c88b1c573e11e8a31d8ea5ef2ef3cf2767d878f6cfadda3b16a2
SHA51248568f7f68f2b7fed803f265959b315cb8ecc3e6f299b3b676594aac6528d72fc18502ade5b25b649fe04b43e8a957ffc9b685382d0e215c0cd3ab4b976d5e10