Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 09:14
Static task
static1
Behavioral task
behavioral1
Sample
33d9133db658023c9307939451d8bb4e_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
33d9133db658023c9307939451d8bb4e_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
33d9133db658023c9307939451d8bb4e_JaffaCakes118.html
-
Size
461KB
-
MD5
33d9133db658023c9307939451d8bb4e
-
SHA1
31fc7b4a5da82852cc539833af12b5fb76ef5fb8
-
SHA256
2d7df77f3c77157d14714998ad7567095495cef75532a418a381384ce7bf25ef
-
SHA512
d13544757b041c2861bb91e5e52208b58d2dc65513b9b697cbc8283df61727c47de9a66c5d6a4fb94f0b57275b2fadcae2287f947778ff657cd4dd022dd51f3c
-
SSDEEP
6144:SkesMYod+X3oI+Y1QpsMYod+X3oI+YCsMYod+X3oI+YLsMYod+X3oI+YQ:65d+X3e5d+X3q5d+X315d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4668 msedge.exe 4668 msedge.exe 2344 msedge.exe 2344 msedge.exe 4556 identity_helper.exe 4556 identity_helper.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2344 wrote to memory of 216 2344 msedge.exe 83 PID 2344 wrote to memory of 216 2344 msedge.exe 83 PID 2344 wrote to memory of 2812 2344 msedge.exe 84 PID 2344 wrote to memory of 2812 2344 msedge.exe 84 PID 2344 wrote to memory of 2812 2344 msedge.exe 84 PID 2344 wrote to memory of 2812 2344 msedge.exe 84 PID 2344 wrote to memory of 2812 2344 msedge.exe 84 PID 2344 wrote to memory of 2812 2344 msedge.exe 84 PID 2344 wrote to memory of 2812 2344 msedge.exe 84 PID 2344 wrote to memory of 2812 2344 msedge.exe 84 PID 2344 wrote to memory of 2812 2344 msedge.exe 84 PID 2344 wrote to memory of 2812 2344 msedge.exe 84 PID 2344 wrote to memory of 2812 2344 msedge.exe 84 PID 2344 wrote to memory of 2812 2344 msedge.exe 84 PID 2344 wrote to memory of 2812 2344 msedge.exe 84 PID 2344 wrote to memory of 2812 2344 msedge.exe 84 PID 2344 wrote to memory of 2812 2344 msedge.exe 84 PID 2344 wrote to memory of 2812 2344 msedge.exe 84 PID 2344 wrote to memory of 2812 2344 msedge.exe 84 PID 2344 wrote to memory of 2812 2344 msedge.exe 84 PID 2344 wrote to memory of 2812 2344 msedge.exe 84 PID 2344 wrote to memory of 2812 2344 msedge.exe 84 PID 2344 wrote to memory of 2812 2344 msedge.exe 84 PID 2344 wrote to memory of 2812 2344 msedge.exe 84 PID 2344 wrote to memory of 2812 2344 msedge.exe 84 PID 2344 wrote to memory of 2812 2344 msedge.exe 84 PID 2344 wrote to memory of 2812 2344 msedge.exe 84 PID 2344 wrote to memory of 2812 2344 msedge.exe 84 PID 2344 wrote to memory of 2812 2344 msedge.exe 84 PID 2344 wrote to memory of 2812 2344 msedge.exe 84 PID 2344 wrote to memory of 2812 2344 msedge.exe 84 PID 2344 wrote to memory of 2812 2344 msedge.exe 84 PID 2344 wrote to memory of 2812 2344 msedge.exe 84 PID 2344 wrote to memory of 2812 2344 msedge.exe 84 PID 2344 wrote to memory of 2812 2344 msedge.exe 84 PID 2344 wrote to memory of 2812 2344 msedge.exe 84 PID 2344 wrote to memory of 2812 2344 msedge.exe 84 PID 2344 wrote to memory of 2812 2344 msedge.exe 84 PID 2344 wrote to memory of 2812 2344 msedge.exe 84 PID 2344 wrote to memory of 2812 2344 msedge.exe 84 PID 2344 wrote to memory of 2812 2344 msedge.exe 84 PID 2344 wrote to memory of 2812 2344 msedge.exe 84 PID 2344 wrote to memory of 4668 2344 msedge.exe 85 PID 2344 wrote to memory of 4668 2344 msedge.exe 85 PID 2344 wrote to memory of 2092 2344 msedge.exe 86 PID 2344 wrote to memory of 2092 2344 msedge.exe 86 PID 2344 wrote to memory of 2092 2344 msedge.exe 86 PID 2344 wrote to memory of 2092 2344 msedge.exe 86 PID 2344 wrote to memory of 2092 2344 msedge.exe 86 PID 2344 wrote to memory of 2092 2344 msedge.exe 86 PID 2344 wrote to memory of 2092 2344 msedge.exe 86 PID 2344 wrote to memory of 2092 2344 msedge.exe 86 PID 2344 wrote to memory of 2092 2344 msedge.exe 86 PID 2344 wrote to memory of 2092 2344 msedge.exe 86 PID 2344 wrote to memory of 2092 2344 msedge.exe 86 PID 2344 wrote to memory of 2092 2344 msedge.exe 86 PID 2344 wrote to memory of 2092 2344 msedge.exe 86 PID 2344 wrote to memory of 2092 2344 msedge.exe 86 PID 2344 wrote to memory of 2092 2344 msedge.exe 86 PID 2344 wrote to memory of 2092 2344 msedge.exe 86 PID 2344 wrote to memory of 2092 2344 msedge.exe 86 PID 2344 wrote to memory of 2092 2344 msedge.exe 86 PID 2344 wrote to memory of 2092 2344 msedge.exe 86 PID 2344 wrote to memory of 2092 2344 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\33d9133db658023c9307939451d8bb4e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff16cc46f8,0x7fff16cc4708,0x7fff16cc47182⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,14633804273053370007,13896902270750838717,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:2812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,14633804273053370007,13896902270750838717,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,14633804273053370007,13896902270750838717,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14633804273053370007,13896902270750838717,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14633804273053370007,13896902270750838717,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,14633804273053370007,13896902270750838717,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:82⤵PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,14633804273053370007,13896902270750838717,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14633804273053370007,13896902270750838717,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14633804273053370007,13896902270750838717,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:12⤵PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14633804273053370007,13896902270750838717,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5532 /prefetch:12⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14633804273053370007,13896902270750838717,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4088 /prefetch:12⤵PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,14633804273053370007,13896902270750838717,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4940 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3064
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1800
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4556
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
5KB
MD5137b1ab6fa6f2f2cb13b02ac060f43e5
SHA18692457ce2dd3cb1e318e4bae480033e6dc57f89
SHA25653c90eb35e1054cd5f114805fce6ab4aa38c0b7964e7c13a30b7a28bd6e94ea2
SHA512d6337b4f28b173a0cc8bfbc66908cb5de3f693e6eb0b61f41e3ee9848cd97fa0600433a32311a46eb7e4b452ec726ec76da8261a7a8eb89b792ab971d9642bff
-
Filesize
6KB
MD5efa3cf9ec68e0bfc82ea9a69d5a26f7a
SHA14f0c164ce01100c963d4996e16309f44031cd98f
SHA2562889e5b073e07196e8c706f075860bcb764873589ce7ad759b934e7f98b5d78f
SHA512840c4156a4290092a1263fe03f093f5e1b15cd30cfa961ae4ebabc08d4b129cfc3fe293358e16d6626ae49cf8ea08a3e105607f6bcb99d938631aa853a65f82e
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5954ea6503cc368f0842067caef907922
SHA1622e8ce06584085f9cded0e8756a137eb701609d
SHA2564d5ee3f14908e6b2267eeb17f3d01c1bcfaab3a8e8694a5bb4dc70c0eed2bdec
SHA512fd377788b1b0788f583af97408388667b97560aa6112e7a6692e82895587aa9dc00b649f01807ef5c2ee86edeae25df4d638003070367ec4cae1f9d0d62edde1