Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 09:27
Static task
static1
Behavioral task
behavioral1
Sample
33e5fc617aafd6f3679b4a474968c87e_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
33e5fc617aafd6f3679b4a474968c87e_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
33e5fc617aafd6f3679b4a474968c87e_JaffaCakes118.html
-
Size
4KB
-
MD5
33e5fc617aafd6f3679b4a474968c87e
-
SHA1
081eb3b72a120b3ef3c09a8afc837d51fdf8fb32
-
SHA256
d35d785f268df71aea67e873d156e1a2317d0bf8f727f0183d64a262cd91883a
-
SHA512
0be148daaaa54df85531f5b48061ac9f14406dcd62563955294603b1bea3c4c6c5f25d74f6fd92a537b053b1aa9911f48b979b276d35660a0c34eccdc2c544f8
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oM+l3d:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDw
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3536 msedge.exe 3536 msedge.exe 4416 msedge.exe 4416 msedge.exe 4604 identity_helper.exe 4604 identity_helper.exe 1836 msedge.exe 1836 msedge.exe 1836 msedge.exe 1836 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4416 wrote to memory of 4000 4416 msedge.exe 82 PID 4416 wrote to memory of 4000 4416 msedge.exe 82 PID 4416 wrote to memory of 2936 4416 msedge.exe 83 PID 4416 wrote to memory of 2936 4416 msedge.exe 83 PID 4416 wrote to memory of 2936 4416 msedge.exe 83 PID 4416 wrote to memory of 2936 4416 msedge.exe 83 PID 4416 wrote to memory of 2936 4416 msedge.exe 83 PID 4416 wrote to memory of 2936 4416 msedge.exe 83 PID 4416 wrote to memory of 2936 4416 msedge.exe 83 PID 4416 wrote to memory of 2936 4416 msedge.exe 83 PID 4416 wrote to memory of 2936 4416 msedge.exe 83 PID 4416 wrote to memory of 2936 4416 msedge.exe 83 PID 4416 wrote to memory of 2936 4416 msedge.exe 83 PID 4416 wrote to memory of 2936 4416 msedge.exe 83 PID 4416 wrote to memory of 2936 4416 msedge.exe 83 PID 4416 wrote to memory of 2936 4416 msedge.exe 83 PID 4416 wrote to memory of 2936 4416 msedge.exe 83 PID 4416 wrote to memory of 2936 4416 msedge.exe 83 PID 4416 wrote to memory of 2936 4416 msedge.exe 83 PID 4416 wrote to memory of 2936 4416 msedge.exe 83 PID 4416 wrote to memory of 2936 4416 msedge.exe 83 PID 4416 wrote to memory of 2936 4416 msedge.exe 83 PID 4416 wrote to memory of 2936 4416 msedge.exe 83 PID 4416 wrote to memory of 2936 4416 msedge.exe 83 PID 4416 wrote to memory of 2936 4416 msedge.exe 83 PID 4416 wrote to memory of 2936 4416 msedge.exe 83 PID 4416 wrote to memory of 2936 4416 msedge.exe 83 PID 4416 wrote to memory of 2936 4416 msedge.exe 83 PID 4416 wrote to memory of 2936 4416 msedge.exe 83 PID 4416 wrote to memory of 2936 4416 msedge.exe 83 PID 4416 wrote to memory of 2936 4416 msedge.exe 83 PID 4416 wrote to memory of 2936 4416 msedge.exe 83 PID 4416 wrote to memory of 2936 4416 msedge.exe 83 PID 4416 wrote to memory of 2936 4416 msedge.exe 83 PID 4416 wrote to memory of 2936 4416 msedge.exe 83 PID 4416 wrote to memory of 2936 4416 msedge.exe 83 PID 4416 wrote to memory of 2936 4416 msedge.exe 83 PID 4416 wrote to memory of 2936 4416 msedge.exe 83 PID 4416 wrote to memory of 2936 4416 msedge.exe 83 PID 4416 wrote to memory of 2936 4416 msedge.exe 83 PID 4416 wrote to memory of 2936 4416 msedge.exe 83 PID 4416 wrote to memory of 2936 4416 msedge.exe 83 PID 4416 wrote to memory of 3536 4416 msedge.exe 84 PID 4416 wrote to memory of 3536 4416 msedge.exe 84 PID 4416 wrote to memory of 5004 4416 msedge.exe 85 PID 4416 wrote to memory of 5004 4416 msedge.exe 85 PID 4416 wrote to memory of 5004 4416 msedge.exe 85 PID 4416 wrote to memory of 5004 4416 msedge.exe 85 PID 4416 wrote to memory of 5004 4416 msedge.exe 85 PID 4416 wrote to memory of 5004 4416 msedge.exe 85 PID 4416 wrote to memory of 5004 4416 msedge.exe 85 PID 4416 wrote to memory of 5004 4416 msedge.exe 85 PID 4416 wrote to memory of 5004 4416 msedge.exe 85 PID 4416 wrote to memory of 5004 4416 msedge.exe 85 PID 4416 wrote to memory of 5004 4416 msedge.exe 85 PID 4416 wrote to memory of 5004 4416 msedge.exe 85 PID 4416 wrote to memory of 5004 4416 msedge.exe 85 PID 4416 wrote to memory of 5004 4416 msedge.exe 85 PID 4416 wrote to memory of 5004 4416 msedge.exe 85 PID 4416 wrote to memory of 5004 4416 msedge.exe 85 PID 4416 wrote to memory of 5004 4416 msedge.exe 85 PID 4416 wrote to memory of 5004 4416 msedge.exe 85 PID 4416 wrote to memory of 5004 4416 msedge.exe 85 PID 4416 wrote to memory of 5004 4416 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\33e5fc617aafd6f3679b4a474968c87e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb820c46f8,0x7ffb820c4708,0x7ffb820c47182⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,13398856457636496438,1254425107213581269,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,13398856457636496438,1254425107213581269,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2404 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,13398856457636496438,1254425107213581269,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2504 /prefetch:82⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13398856457636496438,1254425107213581269,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13398856457636496438,1254425107213581269,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,13398856457636496438,1254425107213581269,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:82⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,13398856457636496438,1254425107213581269,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13398856457636496438,1254425107213581269,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2236 /prefetch:12⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13398856457636496438,1254425107213581269,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13398856457636496438,1254425107213581269,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13398856457636496438,1254425107213581269,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,13398856457636496438,1254425107213581269,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2520 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1836
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4732
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4120
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
292B
MD54157945a42719d78d1eeb9ba454e4b7d
SHA1b41b1c3db557a6874cebec45e38343f15b2ea67d
SHA25635b8270dc102268a23baf4b482b09676d2b9db7511f1bf4031ef40ab876b72e9
SHA512968d929e5414356542b5512d410abd858a09f31cd2b928397505501e7bab2d1cdbd37ae92675617549c0f0ffcd4ede7889312930494a72b041e9cf13153aa3be
-
Filesize
5KB
MD5bfbbd8755439443ccc2de1ea533f5104
SHA190be460d9e1fee3322fd216b92f682680fe6d59e
SHA256fda2587fbb5caa43e0c5ea96fd3dd8a515748971c8c7728bbf994fde792c4e44
SHA512be7734c9e6650bdcd833ecf4c0b4af6ba0100cd5177d9c4c39a4bad5fd761891aa1ccba6c1342a72afdc61ae94d0bf01b73f8615faaf77cc0216887192f6dfba
-
Filesize
6KB
MD50ce09ba45e6db5ed76dc56f0132ceba5
SHA166af34ebb524704eec3e7a66d85beddf2a538f87
SHA25614dbdcf8b006f212c8bfdd1cfbe6e6318291ac7448465e8bbb3e73ef6a891663
SHA512b5545948c2e0744356dcd7811e3818be14672251168a8c765d1d2bb83d03926eab5229a10f813b98a4c0ef7ca0c5c995e9779e27d5e52c8dd5f2814219cf726b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5386a6d86ba61bd85b0532c96ae54ac21
SHA1c85f2d897a13436c984c473d4df5f1a014de7083
SHA2560bcaf2fafd6eae9094ef07f88364c7cbf3c03888cac3646b1cc8bfe7a385c451
SHA51259d2e6692a69878968d5839a206dfa7252071a8614ff0cc4becf5d93f32a731d99c4f91efb36ea874f90208fcda1a2a82fce9f2faafef87185acfc5e96bfc195