Analysis
-
max time kernel
100s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 13:19
Static task
static1
Behavioral task
behavioral1
Sample
34c643c2b1065d76f4bcb5265f0721c3_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
34c643c2b1065d76f4bcb5265f0721c3_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
34c643c2b1065d76f4bcb5265f0721c3_JaffaCakes118.html
-
Size
14KB
-
MD5
34c643c2b1065d76f4bcb5265f0721c3
-
SHA1
6a95f94a5c3563013f494f4497364aeb0159df5b
-
SHA256
81ba98b07053752dd107b71bb76cd8f94656e93c9f36f03af78aeef7dfd8f2c4
-
SHA512
eb7434734b97207ad310fe4b851f79416ad5774c5e94d03086a0a126b79f354dff1b0916c0f627c37035c9d2e31856932f5ffaabcec9d102d036edea83651ea4
-
SSDEEP
384:SG5sUZS+DY0/eUzNpNpN9juEQAxZXaMNaJaX4zyHLJUkLJYZFOn5Q9:Suh5Y02ybbYOn5c
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 440 msedge.exe 440 msedge.exe 4584 msedge.exe 4584 msedge.exe 1356 identity_helper.exe 1356 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4584 wrote to memory of 1760 4584 msedge.exe 83 PID 4584 wrote to memory of 1760 4584 msedge.exe 83 PID 4584 wrote to memory of 4920 4584 msedge.exe 84 PID 4584 wrote to memory of 4920 4584 msedge.exe 84 PID 4584 wrote to memory of 4920 4584 msedge.exe 84 PID 4584 wrote to memory of 4920 4584 msedge.exe 84 PID 4584 wrote to memory of 4920 4584 msedge.exe 84 PID 4584 wrote to memory of 4920 4584 msedge.exe 84 PID 4584 wrote to memory of 4920 4584 msedge.exe 84 PID 4584 wrote to memory of 4920 4584 msedge.exe 84 PID 4584 wrote to memory of 4920 4584 msedge.exe 84 PID 4584 wrote to memory of 4920 4584 msedge.exe 84 PID 4584 wrote to memory of 4920 4584 msedge.exe 84 PID 4584 wrote to memory of 4920 4584 msedge.exe 84 PID 4584 wrote to memory of 4920 4584 msedge.exe 84 PID 4584 wrote to memory of 4920 4584 msedge.exe 84 PID 4584 wrote to memory of 4920 4584 msedge.exe 84 PID 4584 wrote to memory of 4920 4584 msedge.exe 84 PID 4584 wrote to memory of 4920 4584 msedge.exe 84 PID 4584 wrote to memory of 4920 4584 msedge.exe 84 PID 4584 wrote to memory of 4920 4584 msedge.exe 84 PID 4584 wrote to memory of 4920 4584 msedge.exe 84 PID 4584 wrote to memory of 4920 4584 msedge.exe 84 PID 4584 wrote to memory of 4920 4584 msedge.exe 84 PID 4584 wrote to memory of 4920 4584 msedge.exe 84 PID 4584 wrote to memory of 4920 4584 msedge.exe 84 PID 4584 wrote to memory of 4920 4584 msedge.exe 84 PID 4584 wrote to memory of 4920 4584 msedge.exe 84 PID 4584 wrote to memory of 4920 4584 msedge.exe 84 PID 4584 wrote to memory of 4920 4584 msedge.exe 84 PID 4584 wrote to memory of 4920 4584 msedge.exe 84 PID 4584 wrote to memory of 4920 4584 msedge.exe 84 PID 4584 wrote to memory of 4920 4584 msedge.exe 84 PID 4584 wrote to memory of 4920 4584 msedge.exe 84 PID 4584 wrote to memory of 4920 4584 msedge.exe 84 PID 4584 wrote to memory of 4920 4584 msedge.exe 84 PID 4584 wrote to memory of 4920 4584 msedge.exe 84 PID 4584 wrote to memory of 4920 4584 msedge.exe 84 PID 4584 wrote to memory of 4920 4584 msedge.exe 84 PID 4584 wrote to memory of 4920 4584 msedge.exe 84 PID 4584 wrote to memory of 4920 4584 msedge.exe 84 PID 4584 wrote to memory of 4920 4584 msedge.exe 84 PID 4584 wrote to memory of 440 4584 msedge.exe 85 PID 4584 wrote to memory of 440 4584 msedge.exe 85 PID 4584 wrote to memory of 1268 4584 msedge.exe 86 PID 4584 wrote to memory of 1268 4584 msedge.exe 86 PID 4584 wrote to memory of 1268 4584 msedge.exe 86 PID 4584 wrote to memory of 1268 4584 msedge.exe 86 PID 4584 wrote to memory of 1268 4584 msedge.exe 86 PID 4584 wrote to memory of 1268 4584 msedge.exe 86 PID 4584 wrote to memory of 1268 4584 msedge.exe 86 PID 4584 wrote to memory of 1268 4584 msedge.exe 86 PID 4584 wrote to memory of 1268 4584 msedge.exe 86 PID 4584 wrote to memory of 1268 4584 msedge.exe 86 PID 4584 wrote to memory of 1268 4584 msedge.exe 86 PID 4584 wrote to memory of 1268 4584 msedge.exe 86 PID 4584 wrote to memory of 1268 4584 msedge.exe 86 PID 4584 wrote to memory of 1268 4584 msedge.exe 86 PID 4584 wrote to memory of 1268 4584 msedge.exe 86 PID 4584 wrote to memory of 1268 4584 msedge.exe 86 PID 4584 wrote to memory of 1268 4584 msedge.exe 86 PID 4584 wrote to memory of 1268 4584 msedge.exe 86 PID 4584 wrote to memory of 1268 4584 msedge.exe 86 PID 4584 wrote to memory of 1268 4584 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\34c643c2b1065d76f4bcb5265f0721c3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed44d46f8,0x7ffed44d4708,0x7ffed44d47182⤵PID:1760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,14257848138569327585,8864911620352518408,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1976,14257848138569327585,8864911620352518408,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2524 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1976,14257848138569327585,8864911620352518408,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:1268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,14257848138569327585,8864911620352518408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,14257848138569327585,8864911620352518408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1976,14257848138569327585,8864911620352518408,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 /prefetch:82⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1976,14257848138569327585,8864911620352518408,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,14257848138569327585,8864911620352518408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,14257848138569327585,8864911620352518408,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,14257848138569327585,8864911620352518408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3996 /prefetch:12⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,14257848138569327585,8864911620352518408,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:12⤵PID:700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,14257848138569327585,8864911620352518408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3648 /prefetch:12⤵PID:1152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,14257848138569327585,8864911620352518408,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2616 /prefetch:12⤵PID:4152
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3288
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3796
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
6KB
MD535a29958b1757a273667b35b28f34da6
SHA154ae9b39ea5acf13e373a6c0c51f0c73808b39b4
SHA2563b096c3ccf261baa2ac729ec8e1ae49549f100876451b6066c59d304947e219d
SHA51297d854ae4c47afa7acf298326f2f92df4b73dafc7cc4adcbe16645f7e7db63f8760678a6aaacbbdf58c6819303580e860f05de7ce169c7586916f6c41b7e7f39
-
Filesize
6KB
MD51fabb6b703a3db57ca4f2552b641289c
SHA171476d3094b797fb537e4efc519f8d941f37d35f
SHA256d1c4d7df7b11957cb327b944c8ad2a13526c2a237ba6a04f19aef271373d8ba2
SHA512960897a83bd75437a2597801e98ae25740d948962a3237ac90cc79758bbb0d65cc1589b72b973ce5971a6c4f54b59c0ae0f4f19882ed34204c4f58951f6a73ed
-
Filesize
6KB
MD51738f21cc7f3740c6cbb8cbf0ca31bff
SHA18127ce311b1d2054aed2da8856d21013fbdf3718
SHA2566b50ab3e67d47a74529491d9f9b71b1abac5f9bad755d95ae2cf3fc20e9e65f7
SHA51230461091e8614905d64225c89ec8e3a5f249cc61ba06b6b31a6a81258dc6e3cf8a270dd12214bd062404d721b1099e544b9af2f9df31093443c296ff27ff20fa
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d6029a9004cdd340b2b50d72b2b3fd15
SHA15dc42713681a5fde0b8c28ad1d2fab5e54bae11f
SHA25639ab160debf5fc6234ca9fe06a2251380da330071f6e0b804d73872c3b7682c0
SHA5123c3a2f0d997b1cf5f848ed0d6af7453578947838ff7365e51a4924e645d8c6bb7af9f2fda20fe7f6d591dc471bace03d0c3cefe0b0cb3b6039dadcd4f650b503
-
Filesize
12KB
MD5df2dc3324552b6d939ad64041bde7ed5
SHA14edafbb1faa0e3b2ac497ed6e168a62c93211c5d
SHA2565d8ee350eb9ecbacc5088d0603a1a3de0131855109ae946baa0dbebc1baf1719
SHA5122f56d35b639a3430f73673bbf77eb219979805e47f7d8f890628e258389516557d4013e18103a2a015f3f5678b2f1155c83291fd5d995196aac12e2b6b32c0fc