Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 05:57
Static task
static1
Behavioral task
behavioral1
Sample
3311ee093c3790d9cae30f8c892622ac_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3311ee093c3790d9cae30f8c892622ac_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3311ee093c3790d9cae30f8c892622ac_JaffaCakes118.html
-
Size
2KB
-
MD5
3311ee093c3790d9cae30f8c892622ac
-
SHA1
40061a72d777bbfb8822f2a8c6f5906a655f42d2
-
SHA256
4d66ccd57834701e00292fa420a59fd1a0946a2cc18dfc202bdff5a03ebf7c5b
-
SHA512
48fb193a21b587e6be2647a7d5ce952b721364c7ed03c3284b5c04e8837cd12d1e335a6309bc949c98cb33aa92bc3ccc7b25e6897a44f59ad82b6ca73665dda9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4064 msedge.exe 4064 msedge.exe 4568 msedge.exe 4568 msedge.exe 952 identity_helper.exe 952 identity_helper.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4568 wrote to memory of 4504 4568 msedge.exe 81 PID 4568 wrote to memory of 4504 4568 msedge.exe 81 PID 4568 wrote to memory of 372 4568 msedge.exe 82 PID 4568 wrote to memory of 372 4568 msedge.exe 82 PID 4568 wrote to memory of 372 4568 msedge.exe 82 PID 4568 wrote to memory of 372 4568 msedge.exe 82 PID 4568 wrote to memory of 372 4568 msedge.exe 82 PID 4568 wrote to memory of 372 4568 msedge.exe 82 PID 4568 wrote to memory of 372 4568 msedge.exe 82 PID 4568 wrote to memory of 372 4568 msedge.exe 82 PID 4568 wrote to memory of 372 4568 msedge.exe 82 PID 4568 wrote to memory of 372 4568 msedge.exe 82 PID 4568 wrote to memory of 372 4568 msedge.exe 82 PID 4568 wrote to memory of 372 4568 msedge.exe 82 PID 4568 wrote to memory of 372 4568 msedge.exe 82 PID 4568 wrote to memory of 372 4568 msedge.exe 82 PID 4568 wrote to memory of 372 4568 msedge.exe 82 PID 4568 wrote to memory of 372 4568 msedge.exe 82 PID 4568 wrote to memory of 372 4568 msedge.exe 82 PID 4568 wrote to memory of 372 4568 msedge.exe 82 PID 4568 wrote to memory of 372 4568 msedge.exe 82 PID 4568 wrote to memory of 372 4568 msedge.exe 82 PID 4568 wrote to memory of 372 4568 msedge.exe 82 PID 4568 wrote to memory of 372 4568 msedge.exe 82 PID 4568 wrote to memory of 372 4568 msedge.exe 82 PID 4568 wrote to memory of 372 4568 msedge.exe 82 PID 4568 wrote to memory of 372 4568 msedge.exe 82 PID 4568 wrote to memory of 372 4568 msedge.exe 82 PID 4568 wrote to memory of 372 4568 msedge.exe 82 PID 4568 wrote to memory of 372 4568 msedge.exe 82 PID 4568 wrote to memory of 372 4568 msedge.exe 82 PID 4568 wrote to memory of 372 4568 msedge.exe 82 PID 4568 wrote to memory of 372 4568 msedge.exe 82 PID 4568 wrote to memory of 372 4568 msedge.exe 82 PID 4568 wrote to memory of 372 4568 msedge.exe 82 PID 4568 wrote to memory of 372 4568 msedge.exe 82 PID 4568 wrote to memory of 372 4568 msedge.exe 82 PID 4568 wrote to memory of 372 4568 msedge.exe 82 PID 4568 wrote to memory of 372 4568 msedge.exe 82 PID 4568 wrote to memory of 372 4568 msedge.exe 82 PID 4568 wrote to memory of 372 4568 msedge.exe 82 PID 4568 wrote to memory of 372 4568 msedge.exe 82 PID 4568 wrote to memory of 4064 4568 msedge.exe 83 PID 4568 wrote to memory of 4064 4568 msedge.exe 83 PID 4568 wrote to memory of 2056 4568 msedge.exe 84 PID 4568 wrote to memory of 2056 4568 msedge.exe 84 PID 4568 wrote to memory of 2056 4568 msedge.exe 84 PID 4568 wrote to memory of 2056 4568 msedge.exe 84 PID 4568 wrote to memory of 2056 4568 msedge.exe 84 PID 4568 wrote to memory of 2056 4568 msedge.exe 84 PID 4568 wrote to memory of 2056 4568 msedge.exe 84 PID 4568 wrote to memory of 2056 4568 msedge.exe 84 PID 4568 wrote to memory of 2056 4568 msedge.exe 84 PID 4568 wrote to memory of 2056 4568 msedge.exe 84 PID 4568 wrote to memory of 2056 4568 msedge.exe 84 PID 4568 wrote to memory of 2056 4568 msedge.exe 84 PID 4568 wrote to memory of 2056 4568 msedge.exe 84 PID 4568 wrote to memory of 2056 4568 msedge.exe 84 PID 4568 wrote to memory of 2056 4568 msedge.exe 84 PID 4568 wrote to memory of 2056 4568 msedge.exe 84 PID 4568 wrote to memory of 2056 4568 msedge.exe 84 PID 4568 wrote to memory of 2056 4568 msedge.exe 84 PID 4568 wrote to memory of 2056 4568 msedge.exe 84 PID 4568 wrote to memory of 2056 4568 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3311ee093c3790d9cae30f8c892622ac_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe676e46f8,0x7ffe676e4708,0x7ffe676e47182⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,13949014458457464131,4497712425588073328,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2244 /prefetch:22⤵PID:372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,13949014458457464131,4497712425588073328,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,13949014458457464131,4497712425588073328,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,13949014458457464131,4497712425588073328,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:32
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,13949014458457464131,4497712425588073328,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,13949014458457464131,4497712425588073328,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 /prefetch:82⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,13949014458457464131,4497712425588073328,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,13949014458457464131,4497712425588073328,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:3300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,13949014458457464131,4497712425588073328,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,13949014458457464131,4497712425588073328,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4616 /prefetch:12⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,13949014458457464131,4497712425588073328,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,13949014458457464131,4497712425588073328,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2384 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2892
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4524
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1580
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
386B
MD566572fa6ee817bcaf7f255bc1cc29252
SHA18ad3e66c62a9c075c874496df88e1ea8d71811dd
SHA256762a7d92f04117ae3d36f69f7ae628523aed3276f8efc9ed2a00b4a74f3795f4
SHA512c5b5954c467e9569229acc3aa4f9d7b0ec4c32f54c152fd96e3a7bde0fbddb903c83de401520cd29fda09f230bdd2b74d545e546c42ca3c5383664cc13d41b22
-
Filesize
6KB
MD55106ae830a7542f3622d82611b2e9c03
SHA12a521654f7d1f161f0d68ed7dc5b9a17f2adf2c6
SHA256cea276cd6b664cb1a9cf3a522cdfadc1ddaaf5d9c2520bd7ff91a17f6d2795a2
SHA51273983fa4d4c2630fc50060ff5bf85521e86bc634ffb077db458f902e5f634f9cb1ecfb5b20e241913f80533049def71548e531c27fdcf6df6cfa0a1ee77da12e
-
Filesize
6KB
MD5b928f0441be40dc01591742dfa2aa08a
SHA1f2aabc87cf3754749a1878c3a9f4e15530119be3
SHA25681afaa91632c57958477ed6e210d74548853d62d3a7441272bd4ef1a020fc8cd
SHA5125fce5bdfd1bb0da5260359307317283ecfba4757ae26e1ef2ef0aa4fd42e13f9d68b7a8447f5fba781fb85d325887ce448e3b745a1224decbead79cc00f02414
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ed896c475886e2fce44be30acc868614
SHA197130ec1abe4e7ebd93a0cd2be6e441210212f26
SHA2564b7145ded93bb06950e108e4fd538e3d1bd1c3d1ac81c41859a8566a7dc0710b
SHA512c26227829f97ffb22c27311cda399bc45deffdd2c9905da705ee7fe827e323dc09bb3afe210a600b29ce04d6652c74c6c8cc3e594469b07c4e349e72e43464ad