Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 07:36
Static task
static1
Behavioral task
behavioral1
Sample
33781b86dd0468212c29bf4a4b1a9ee3_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
33781b86dd0468212c29bf4a4b1a9ee3_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
33781b86dd0468212c29bf4a4b1a9ee3_JaffaCakes118.html
-
Size
19KB
-
MD5
33781b86dd0468212c29bf4a4b1a9ee3
-
SHA1
97ab82b928768b90fb5c6eb4de7799cb09fc4dd3
-
SHA256
5f2120092e796c3082660c807645967b8e03fa8aff4aed3abdc91864028484be
-
SHA512
d655f26be45bec2f7fcd22cc3432b8099614b429692b39597311afe304f1255c0686d0d04ab6bc1f8f9342a196659a0e9c45158ba2037402a030978a1fa69914
-
SSDEEP
384:26pxuzFS1Anh3m9svnjutWf7Zo5Fl3YBq98ojjkEXnn:26pQzF5hrnjuM7ZQFlcqyoV
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1780 msedge.exe 1780 msedge.exe 3736 msedge.exe 3736 msedge.exe 5080 identity_helper.exe 5080 identity_helper.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3736 wrote to memory of 4524 3736 msedge.exe 82 PID 3736 wrote to memory of 4524 3736 msedge.exe 82 PID 3736 wrote to memory of 2484 3736 msedge.exe 83 PID 3736 wrote to memory of 2484 3736 msedge.exe 83 PID 3736 wrote to memory of 2484 3736 msedge.exe 83 PID 3736 wrote to memory of 2484 3736 msedge.exe 83 PID 3736 wrote to memory of 2484 3736 msedge.exe 83 PID 3736 wrote to memory of 2484 3736 msedge.exe 83 PID 3736 wrote to memory of 2484 3736 msedge.exe 83 PID 3736 wrote to memory of 2484 3736 msedge.exe 83 PID 3736 wrote to memory of 2484 3736 msedge.exe 83 PID 3736 wrote to memory of 2484 3736 msedge.exe 83 PID 3736 wrote to memory of 2484 3736 msedge.exe 83 PID 3736 wrote to memory of 2484 3736 msedge.exe 83 PID 3736 wrote to memory of 2484 3736 msedge.exe 83 PID 3736 wrote to memory of 2484 3736 msedge.exe 83 PID 3736 wrote to memory of 2484 3736 msedge.exe 83 PID 3736 wrote to memory of 2484 3736 msedge.exe 83 PID 3736 wrote to memory of 2484 3736 msedge.exe 83 PID 3736 wrote to memory of 2484 3736 msedge.exe 83 PID 3736 wrote to memory of 2484 3736 msedge.exe 83 PID 3736 wrote to memory of 2484 3736 msedge.exe 83 PID 3736 wrote to memory of 2484 3736 msedge.exe 83 PID 3736 wrote to memory of 2484 3736 msedge.exe 83 PID 3736 wrote to memory of 2484 3736 msedge.exe 83 PID 3736 wrote to memory of 2484 3736 msedge.exe 83 PID 3736 wrote to memory of 2484 3736 msedge.exe 83 PID 3736 wrote to memory of 2484 3736 msedge.exe 83 PID 3736 wrote to memory of 2484 3736 msedge.exe 83 PID 3736 wrote to memory of 2484 3736 msedge.exe 83 PID 3736 wrote to memory of 2484 3736 msedge.exe 83 PID 3736 wrote to memory of 2484 3736 msedge.exe 83 PID 3736 wrote to memory of 2484 3736 msedge.exe 83 PID 3736 wrote to memory of 2484 3736 msedge.exe 83 PID 3736 wrote to memory of 2484 3736 msedge.exe 83 PID 3736 wrote to memory of 2484 3736 msedge.exe 83 PID 3736 wrote to memory of 2484 3736 msedge.exe 83 PID 3736 wrote to memory of 2484 3736 msedge.exe 83 PID 3736 wrote to memory of 2484 3736 msedge.exe 83 PID 3736 wrote to memory of 2484 3736 msedge.exe 83 PID 3736 wrote to memory of 2484 3736 msedge.exe 83 PID 3736 wrote to memory of 2484 3736 msedge.exe 83 PID 3736 wrote to memory of 1780 3736 msedge.exe 84 PID 3736 wrote to memory of 1780 3736 msedge.exe 84 PID 3736 wrote to memory of 3596 3736 msedge.exe 85 PID 3736 wrote to memory of 3596 3736 msedge.exe 85 PID 3736 wrote to memory of 3596 3736 msedge.exe 85 PID 3736 wrote to memory of 3596 3736 msedge.exe 85 PID 3736 wrote to memory of 3596 3736 msedge.exe 85 PID 3736 wrote to memory of 3596 3736 msedge.exe 85 PID 3736 wrote to memory of 3596 3736 msedge.exe 85 PID 3736 wrote to memory of 3596 3736 msedge.exe 85 PID 3736 wrote to memory of 3596 3736 msedge.exe 85 PID 3736 wrote to memory of 3596 3736 msedge.exe 85 PID 3736 wrote to memory of 3596 3736 msedge.exe 85 PID 3736 wrote to memory of 3596 3736 msedge.exe 85 PID 3736 wrote to memory of 3596 3736 msedge.exe 85 PID 3736 wrote to memory of 3596 3736 msedge.exe 85 PID 3736 wrote to memory of 3596 3736 msedge.exe 85 PID 3736 wrote to memory of 3596 3736 msedge.exe 85 PID 3736 wrote to memory of 3596 3736 msedge.exe 85 PID 3736 wrote to memory of 3596 3736 msedge.exe 85 PID 3736 wrote to memory of 3596 3736 msedge.exe 85 PID 3736 wrote to memory of 3596 3736 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\33781b86dd0468212c29bf4a4b1a9ee3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffae94e46f8,0x7ffae94e4708,0x7ffae94e47182⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,136415463034955763,8067112867879289024,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:2484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,136415463034955763,8067112867879289024,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,136415463034955763,8067112867879289024,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:82⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,136415463034955763,8067112867879289024,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:2660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,136415463034955763,8067112867879289024,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,136415463034955763,8067112867879289024,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5956 /prefetch:82⤵PID:1264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,136415463034955763,8067112867879289024,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5956 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,136415463034955763,8067112867879289024,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,136415463034955763,8067112867879289024,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,136415463034955763,8067112867879289024,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:12⤵PID:3336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,136415463034955763,8067112867879289024,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,136415463034955763,8067112867879289024,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4852 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1580
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3924
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
467B
MD554fa411bb2ca2bba3b4598d019553c9e
SHA137e3e5cf1381bc559f8d77cc873dd8409665e3a2
SHA256554738c72805ffe0a3d0e12d623153d23ae6027eda3261bf61a4d85a9e42f00a
SHA5120dfcc73a6565b9f7ea5df7f1b3627b38cc6920586a06471ae9cada9edab2fbd3984b8c7d3a49f16554058a9cc0240ec66d890f767c052e9ecf408cdc2873acdf
-
Filesize
6KB
MD58c45c2116f2e0d98364677aed3509955
SHA1311a0a361a46594361ece5b20e24ae3b706ef73a
SHA25687aaf82895a6ebb9d73f777304a3a3e56baab4a11d243fc4045c7c54457f096d
SHA5123be98ae8ba3193678a8d87f9f669a7500cbb053012ae81c69fe4ae4c81ff7239d21e25138f8e8618ad963d57268160bd417f0021955a24cfdde1c3a0d7c31f46
-
Filesize
6KB
MD5cb54257095ebd9cc213106bb698c5d73
SHA1fbc051fc2c32e4a12eb4b9df2926f42ad95fcfe5
SHA256024ccacbef83eed685bf0372395fab5f52ab479cae2a7ee0101cee3ebef15fec
SHA512e911d82382a5cae47ca632fdd1185aa0bbfbe32b198b12dedbe0784e3990c2dc16f6f8aeb32577e3af179283b7edfb6a189050bcc9a64ede85a513d94928be71
-
Filesize
6KB
MD5be54854bfc1814d8ac119819a6aa8618
SHA19223b309632c6b32402ea64d6db719c8a7d812eb
SHA25656f428a3a14ff2c12d265c83e32d638024a74bd33067b887708f23b9f606bd0f
SHA5122777e9bc1cc513e957cb582eaeedc30895da81f2b57dedf6b930e48ba2607f2a109c3e08c93d1cebff6c364fefd0efd98cd572b91ba408acee5d6a46aedf9c48
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b76297a2bea320c082536f7e4612e218
SHA1b89eb04556969cb24bd59b8079644864064136f7
SHA2568e189dee7618081298784c9542e71469b33431795256b53ac5270c3b2c12c262
SHA5127c39c2ad00dcfda1bfa7d3e2dd053a9559ffe8cf46283590b39377e1d54486c25abd8754937f9182cd5a91c3089d860c0cf945204e846de6784ed2ceecdba06b