Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 15:59
Static task
static1
Behavioral task
behavioral1
Sample
3564161b8bbf8d73ba1d481675722423_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
3564161b8bbf8d73ba1d481675722423_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3564161b8bbf8d73ba1d481675722423_JaffaCakes118.html
-
Size
258KB
-
MD5
3564161b8bbf8d73ba1d481675722423
-
SHA1
6effde513fb74370956bf89dc235419f950e2bed
-
SHA256
a2f2c5021dabab352cd98087bb0bb707a2851b4ac25e952a194961a647c90718
-
SHA512
5775ef1e5cef93346c269330c864d98dc4d274f4a2f6c5784a2613d16ed6263dc0ecb42c889fd07eff329d60a38191f482fcf62a7807eb92f01a1d72f366dbdc
-
SSDEEP
3072:XMpHtnA/MrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJ/:4HUUz9VxLY7iAVLTBQJl/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3884 msedge.exe 3884 msedge.exe 4592 msedge.exe 4592 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4592 wrote to memory of 1836 4592 msedge.exe 82 PID 4592 wrote to memory of 1836 4592 msedge.exe 82 PID 4592 wrote to memory of 3352 4592 msedge.exe 83 PID 4592 wrote to memory of 3352 4592 msedge.exe 83 PID 4592 wrote to memory of 3352 4592 msedge.exe 83 PID 4592 wrote to memory of 3352 4592 msedge.exe 83 PID 4592 wrote to memory of 3352 4592 msedge.exe 83 PID 4592 wrote to memory of 3352 4592 msedge.exe 83 PID 4592 wrote to memory of 3352 4592 msedge.exe 83 PID 4592 wrote to memory of 3352 4592 msedge.exe 83 PID 4592 wrote to memory of 3352 4592 msedge.exe 83 PID 4592 wrote to memory of 3352 4592 msedge.exe 83 PID 4592 wrote to memory of 3352 4592 msedge.exe 83 PID 4592 wrote to memory of 3352 4592 msedge.exe 83 PID 4592 wrote to memory of 3352 4592 msedge.exe 83 PID 4592 wrote to memory of 3352 4592 msedge.exe 83 PID 4592 wrote to memory of 3352 4592 msedge.exe 83 PID 4592 wrote to memory of 3352 4592 msedge.exe 83 PID 4592 wrote to memory of 3352 4592 msedge.exe 83 PID 4592 wrote to memory of 3352 4592 msedge.exe 83 PID 4592 wrote to memory of 3352 4592 msedge.exe 83 PID 4592 wrote to memory of 3352 4592 msedge.exe 83 PID 4592 wrote to memory of 3352 4592 msedge.exe 83 PID 4592 wrote to memory of 3352 4592 msedge.exe 83 PID 4592 wrote to memory of 3352 4592 msedge.exe 83 PID 4592 wrote to memory of 3352 4592 msedge.exe 83 PID 4592 wrote to memory of 3352 4592 msedge.exe 83 PID 4592 wrote to memory of 3352 4592 msedge.exe 83 PID 4592 wrote to memory of 3352 4592 msedge.exe 83 PID 4592 wrote to memory of 3352 4592 msedge.exe 83 PID 4592 wrote to memory of 3352 4592 msedge.exe 83 PID 4592 wrote to memory of 3352 4592 msedge.exe 83 PID 4592 wrote to memory of 3352 4592 msedge.exe 83 PID 4592 wrote to memory of 3352 4592 msedge.exe 83 PID 4592 wrote to memory of 3352 4592 msedge.exe 83 PID 4592 wrote to memory of 3352 4592 msedge.exe 83 PID 4592 wrote to memory of 3352 4592 msedge.exe 83 PID 4592 wrote to memory of 3352 4592 msedge.exe 83 PID 4592 wrote to memory of 3352 4592 msedge.exe 83 PID 4592 wrote to memory of 3352 4592 msedge.exe 83 PID 4592 wrote to memory of 3352 4592 msedge.exe 83 PID 4592 wrote to memory of 3352 4592 msedge.exe 83 PID 4592 wrote to memory of 3884 4592 msedge.exe 84 PID 4592 wrote to memory of 3884 4592 msedge.exe 84 PID 4592 wrote to memory of 408 4592 msedge.exe 85 PID 4592 wrote to memory of 408 4592 msedge.exe 85 PID 4592 wrote to memory of 408 4592 msedge.exe 85 PID 4592 wrote to memory of 408 4592 msedge.exe 85 PID 4592 wrote to memory of 408 4592 msedge.exe 85 PID 4592 wrote to memory of 408 4592 msedge.exe 85 PID 4592 wrote to memory of 408 4592 msedge.exe 85 PID 4592 wrote to memory of 408 4592 msedge.exe 85 PID 4592 wrote to memory of 408 4592 msedge.exe 85 PID 4592 wrote to memory of 408 4592 msedge.exe 85 PID 4592 wrote to memory of 408 4592 msedge.exe 85 PID 4592 wrote to memory of 408 4592 msedge.exe 85 PID 4592 wrote to memory of 408 4592 msedge.exe 85 PID 4592 wrote to memory of 408 4592 msedge.exe 85 PID 4592 wrote to memory of 408 4592 msedge.exe 85 PID 4592 wrote to memory of 408 4592 msedge.exe 85 PID 4592 wrote to memory of 408 4592 msedge.exe 85 PID 4592 wrote to memory of 408 4592 msedge.exe 85 PID 4592 wrote to memory of 408 4592 msedge.exe 85 PID 4592 wrote to memory of 408 4592 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3564161b8bbf8d73ba1d481675722423_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffea6ed46f8,0x7ffea6ed4708,0x7ffea6ed47182⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,1109670190041309010,7409968560574327772,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,1109670190041309010,7409968560574327772,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2472 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,1109670190041309010,7409968560574327772,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1109670190041309010,7409968560574327772,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1109670190041309010,7409968560574327772,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:2204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1109670190041309010,7409968560574327772,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5860 /prefetch:12⤵PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,1109670190041309010,7409968560574327772,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1908 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3716
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2548
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
479B
MD560a078f321c0bd04288cb59a5c9265eb
SHA18d6a3f1581257582eb1db1c1f878d8604cb9c4e2
SHA256dc9fbd3872ffaff11fc2c7813f388c0d9b7e3fe1edf3dbb73752763dd2304df9
SHA512fa9abdf490717acd17eb8daf79a8f6694dd10a9147a69a0ed27568a602f034ca9b1eba448d92d8c55e315ee5ea5c9fddab3fca26d2a28243627e37246f968ba6
-
Filesize
6KB
MD5969acad9583abb2da983663dcdbfa6d3
SHA1f5f18d7059e1340ff5df44faabc169700599cb61
SHA256743e23a7c7839b3f813bc0f09f090b5742a13b13f54cfe6700a65a58cffbc063
SHA5128551dbf2b5d6e830e655edb0110efce6d7d2d70abc46e4d90f7d801e5087d843912e5f70cb85d19d2ed36ff20ac0be7d600b3f74f973683c2aa547983215e47e
-
Filesize
6KB
MD5207f3d2eeef103069c49f997264dc9b8
SHA1539c79bb8d2f58a8afb308d6ee01bfda71422cff
SHA256292fd9b0c91aa51b7217a1200918a0fd4dc7474a6e857a66b5b69a93ed0a5bbb
SHA51230674ca601d9e599caa1d6a0e3ab98878b5347a827504f83782315aac7386e10d96d43d51f3c666e56db883672e1d2a8f137e80b610e0515814bfdb44ef167af
-
Filesize
6KB
MD52b00807bc6c57c028579ebac4720a20d
SHA14d536331f5188d591f1d34d918923fb521c6d620
SHA256a928cca3855822af048fa094bf6e08636199dbe75c5ee458645fa6abcce7feda
SHA51267a76eb52b81f727acf8f2fd50cdf0bad482c40f4e332f27973accf173240a5df129799ec7c2b7223587b16bf792421aef5a0b477abb69c0b3bd4a49398f48a3
-
Filesize
11KB
MD52de4a136bdb0e45e7970b3ebd1fc25ca
SHA1b4bf544ad7f7bfc1de3ead13fb2ad37cf8f307f2
SHA2566e7a9ed5db379c101cab7f2a4bafefcf664c9e9c65fd0c4cc5cbfab40f885532
SHA512d37d7f12a32a0c0181a887f28f7d500e15c8c40ade25c39ab41c9111e8abfc17e3e1587d4c8187b0ca2590801fbd40e02d3ee2950423c9c96d7da9e377d0a28d