Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 14:33
Static task
static1
Behavioral task
behavioral1
Sample
350f5c5fb4139e322fa13db19df2e65d_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
350f5c5fb4139e322fa13db19df2e65d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
350f5c5fb4139e322fa13db19df2e65d_JaffaCakes118.html
-
Size
461KB
-
MD5
350f5c5fb4139e322fa13db19df2e65d
-
SHA1
150191a50c43277fa57e2364079292097d33ee2e
-
SHA256
d9052e1f9930ca1f7bcd6afc11e5abfced2f2427bb3f0de7c7f3746720e09d15
-
SHA512
b0753a39c0616e50dc5f4afd2e333a4ac138f6bf8d828754e3e19c266fa0f92a93d8f672cdbc5a847db03ba8d831b8ca34e73fb8b235dc2fd0858e93682f14fa
-
SSDEEP
6144:SusMYod+X3oI+YXQqsMYod+X3oI+Ym+sMYod+X3oI+YLsMYod+X3oI+YQ:55d+X3T5d+X3z5d+X315d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4544 msedge.exe 4544 msedge.exe 468 msedge.exe 468 msedge.exe 3404 identity_helper.exe 3404 identity_helper.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 468 wrote to memory of 4304 468 msedge.exe 82 PID 468 wrote to memory of 4304 468 msedge.exe 82 PID 468 wrote to memory of 644 468 msedge.exe 83 PID 468 wrote to memory of 644 468 msedge.exe 83 PID 468 wrote to memory of 644 468 msedge.exe 83 PID 468 wrote to memory of 644 468 msedge.exe 83 PID 468 wrote to memory of 644 468 msedge.exe 83 PID 468 wrote to memory of 644 468 msedge.exe 83 PID 468 wrote to memory of 644 468 msedge.exe 83 PID 468 wrote to memory of 644 468 msedge.exe 83 PID 468 wrote to memory of 644 468 msedge.exe 83 PID 468 wrote to memory of 644 468 msedge.exe 83 PID 468 wrote to memory of 644 468 msedge.exe 83 PID 468 wrote to memory of 644 468 msedge.exe 83 PID 468 wrote to memory of 644 468 msedge.exe 83 PID 468 wrote to memory of 644 468 msedge.exe 83 PID 468 wrote to memory of 644 468 msedge.exe 83 PID 468 wrote to memory of 644 468 msedge.exe 83 PID 468 wrote to memory of 644 468 msedge.exe 83 PID 468 wrote to memory of 644 468 msedge.exe 83 PID 468 wrote to memory of 644 468 msedge.exe 83 PID 468 wrote to memory of 644 468 msedge.exe 83 PID 468 wrote to memory of 644 468 msedge.exe 83 PID 468 wrote to memory of 644 468 msedge.exe 83 PID 468 wrote to memory of 644 468 msedge.exe 83 PID 468 wrote to memory of 644 468 msedge.exe 83 PID 468 wrote to memory of 644 468 msedge.exe 83 PID 468 wrote to memory of 644 468 msedge.exe 83 PID 468 wrote to memory of 644 468 msedge.exe 83 PID 468 wrote to memory of 644 468 msedge.exe 83 PID 468 wrote to memory of 644 468 msedge.exe 83 PID 468 wrote to memory of 644 468 msedge.exe 83 PID 468 wrote to memory of 644 468 msedge.exe 83 PID 468 wrote to memory of 644 468 msedge.exe 83 PID 468 wrote to memory of 644 468 msedge.exe 83 PID 468 wrote to memory of 644 468 msedge.exe 83 PID 468 wrote to memory of 644 468 msedge.exe 83 PID 468 wrote to memory of 644 468 msedge.exe 83 PID 468 wrote to memory of 644 468 msedge.exe 83 PID 468 wrote to memory of 644 468 msedge.exe 83 PID 468 wrote to memory of 644 468 msedge.exe 83 PID 468 wrote to memory of 644 468 msedge.exe 83 PID 468 wrote to memory of 4544 468 msedge.exe 84 PID 468 wrote to memory of 4544 468 msedge.exe 84 PID 468 wrote to memory of 2076 468 msedge.exe 85 PID 468 wrote to memory of 2076 468 msedge.exe 85 PID 468 wrote to memory of 2076 468 msedge.exe 85 PID 468 wrote to memory of 2076 468 msedge.exe 85 PID 468 wrote to memory of 2076 468 msedge.exe 85 PID 468 wrote to memory of 2076 468 msedge.exe 85 PID 468 wrote to memory of 2076 468 msedge.exe 85 PID 468 wrote to memory of 2076 468 msedge.exe 85 PID 468 wrote to memory of 2076 468 msedge.exe 85 PID 468 wrote to memory of 2076 468 msedge.exe 85 PID 468 wrote to memory of 2076 468 msedge.exe 85 PID 468 wrote to memory of 2076 468 msedge.exe 85 PID 468 wrote to memory of 2076 468 msedge.exe 85 PID 468 wrote to memory of 2076 468 msedge.exe 85 PID 468 wrote to memory of 2076 468 msedge.exe 85 PID 468 wrote to memory of 2076 468 msedge.exe 85 PID 468 wrote to memory of 2076 468 msedge.exe 85 PID 468 wrote to memory of 2076 468 msedge.exe 85 PID 468 wrote to memory of 2076 468 msedge.exe 85 PID 468 wrote to memory of 2076 468 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\350f5c5fb4139e322fa13db19df2e65d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff12b746f8,0x7fff12b74708,0x7fff12b747182⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,1822703628424501832,14358138983120593776,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2328 /prefetch:22⤵PID:644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1984,1822703628424501832,14358138983120593776,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2384 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1984,1822703628424501832,14358138983120593776,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:2076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,1822703628424501832,14358138983120593776,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,1822703628424501832,14358138983120593776,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1984,1822703628424501832,14358138983120593776,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1984,1822703628424501832,14358138983120593776,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,1822703628424501832,14358138983120593776,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,1822703628424501832,14358138983120593776,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,1822703628424501832,14358138983120593776,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4016 /prefetch:12⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,1822703628424501832,14358138983120593776,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3496 /prefetch:12⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,1822703628424501832,14358138983120593776,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1916
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4056
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
6KB
MD59b0911425761b00227832de008df5096
SHA1e3fff2ea526d9e342740ebe68ae1259bb219f4ff
SHA25648c362f449d647ac84af4525dd8e01d561b14fe794b480697a54d50dc3d7797c
SHA5124c58939f7b919645df9821c35b0a95a7af18bc2bdb2f40108e69c0822ca944e39a05b7249526692ee71af639a662a9e4de0d74accd61eb30eb87cc5291690f98
-
Filesize
6KB
MD5ce61179570bda86528186f3420f7e99b
SHA1866861c10f23ae6d01ea5860b9029d80a892ab76
SHA25612bda7361ce2e9ecdb423d127e914bc3d5abc7cecee0a1f6fc18b7b0697c3dd6
SHA512220ead15b4e05351deed819fda868d1c910b72a9f2bb152a99450e4825aad5c42abc4cc6ed9885393453e96ec071813692ae7f4d99b91612c96c60cc96124e6b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5370a1ef291780da6fa4fcdc208d0778d
SHA1a8b2749ec19467b4b3db01bb833fc7ce798e47c4
SHA256afcd8e5dc68e67bef80b70fedbbb076628f09419656c4a887d10fee6d8054051
SHA51265398809a04cf53842896af59e0929268789aaff8e8601fee6be0f670dba6b120dbaa8160184e4313daf799d0b873c053ef45ae63e7086fb93b2dc5815985194