Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
12-05-2024 00:34
Static task
static1
Behavioral task
behavioral1
Sample
37547c6fc8b74f0b03fe6fdce426933c_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
37547c6fc8b74f0b03fe6fdce426933c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
37547c6fc8b74f0b03fe6fdce426933c_JaffaCakes118.html
-
Size
461KB
-
MD5
37547c6fc8b74f0b03fe6fdce426933c
-
SHA1
e16123cb545c070d8cdf4afad6d7597dfd3db85c
-
SHA256
77be913b24dbe7cb498ca6a3e805a8656b71cb95a803df8c834d44831bd19657
-
SHA512
7ab7a53bae86d3654d2ed4a9b732c0164770f9df4ac2a60d6fb4f6a6bcfdb0a0734960ffcccf27d0994da67d96514be5c35e05bd995e31f67801a271087e165b
-
SSDEEP
6144:S/sMYod+X3oI+YinsMYod+X3oI+YTsMYod+X3oI+YLsMYod+X3oI+YQ:K5d+X3E5d+X315d+X315d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3412 msedge.exe 3412 msedge.exe 684 msedge.exe 684 msedge.exe 2548 identity_helper.exe 2548 identity_helper.exe 860 msedge.exe 860 msedge.exe 860 msedge.exe 860 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 684 wrote to memory of 1372 684 msedge.exe 82 PID 684 wrote to memory of 1372 684 msedge.exe 82 PID 684 wrote to memory of 3004 684 msedge.exe 83 PID 684 wrote to memory of 3004 684 msedge.exe 83 PID 684 wrote to memory of 3004 684 msedge.exe 83 PID 684 wrote to memory of 3004 684 msedge.exe 83 PID 684 wrote to memory of 3004 684 msedge.exe 83 PID 684 wrote to memory of 3004 684 msedge.exe 83 PID 684 wrote to memory of 3004 684 msedge.exe 83 PID 684 wrote to memory of 3004 684 msedge.exe 83 PID 684 wrote to memory of 3004 684 msedge.exe 83 PID 684 wrote to memory of 3004 684 msedge.exe 83 PID 684 wrote to memory of 3004 684 msedge.exe 83 PID 684 wrote to memory of 3004 684 msedge.exe 83 PID 684 wrote to memory of 3004 684 msedge.exe 83 PID 684 wrote to memory of 3004 684 msedge.exe 83 PID 684 wrote to memory of 3004 684 msedge.exe 83 PID 684 wrote to memory of 3004 684 msedge.exe 83 PID 684 wrote to memory of 3004 684 msedge.exe 83 PID 684 wrote to memory of 3004 684 msedge.exe 83 PID 684 wrote to memory of 3004 684 msedge.exe 83 PID 684 wrote to memory of 3004 684 msedge.exe 83 PID 684 wrote to memory of 3004 684 msedge.exe 83 PID 684 wrote to memory of 3004 684 msedge.exe 83 PID 684 wrote to memory of 3004 684 msedge.exe 83 PID 684 wrote to memory of 3004 684 msedge.exe 83 PID 684 wrote to memory of 3004 684 msedge.exe 83 PID 684 wrote to memory of 3004 684 msedge.exe 83 PID 684 wrote to memory of 3004 684 msedge.exe 83 PID 684 wrote to memory of 3004 684 msedge.exe 83 PID 684 wrote to memory of 3004 684 msedge.exe 83 PID 684 wrote to memory of 3004 684 msedge.exe 83 PID 684 wrote to memory of 3004 684 msedge.exe 83 PID 684 wrote to memory of 3004 684 msedge.exe 83 PID 684 wrote to memory of 3004 684 msedge.exe 83 PID 684 wrote to memory of 3004 684 msedge.exe 83 PID 684 wrote to memory of 3004 684 msedge.exe 83 PID 684 wrote to memory of 3004 684 msedge.exe 83 PID 684 wrote to memory of 3004 684 msedge.exe 83 PID 684 wrote to memory of 3004 684 msedge.exe 83 PID 684 wrote to memory of 3004 684 msedge.exe 83 PID 684 wrote to memory of 3004 684 msedge.exe 83 PID 684 wrote to memory of 3412 684 msedge.exe 84 PID 684 wrote to memory of 3412 684 msedge.exe 84 PID 684 wrote to memory of 4956 684 msedge.exe 85 PID 684 wrote to memory of 4956 684 msedge.exe 85 PID 684 wrote to memory of 4956 684 msedge.exe 85 PID 684 wrote to memory of 4956 684 msedge.exe 85 PID 684 wrote to memory of 4956 684 msedge.exe 85 PID 684 wrote to memory of 4956 684 msedge.exe 85 PID 684 wrote to memory of 4956 684 msedge.exe 85 PID 684 wrote to memory of 4956 684 msedge.exe 85 PID 684 wrote to memory of 4956 684 msedge.exe 85 PID 684 wrote to memory of 4956 684 msedge.exe 85 PID 684 wrote to memory of 4956 684 msedge.exe 85 PID 684 wrote to memory of 4956 684 msedge.exe 85 PID 684 wrote to memory of 4956 684 msedge.exe 85 PID 684 wrote to memory of 4956 684 msedge.exe 85 PID 684 wrote to memory of 4956 684 msedge.exe 85 PID 684 wrote to memory of 4956 684 msedge.exe 85 PID 684 wrote to memory of 4956 684 msedge.exe 85 PID 684 wrote to memory of 4956 684 msedge.exe 85 PID 684 wrote to memory of 4956 684 msedge.exe 85 PID 684 wrote to memory of 4956 684 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\37547c6fc8b74f0b03fe6fdce426933c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffaf0346f8,0x7fffaf034708,0x7fffaf0347182⤵PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,3288884697997102442,7754487398385730817,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,3288884697997102442,7754487398385730817,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2592 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,3288884697997102442,7754487398385730817,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,3288884697997102442,7754487398385730817,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,3288884697997102442,7754487398385730817,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,3288884697997102442,7754487398385730817,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 /prefetch:82⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,3288884697997102442,7754487398385730817,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,3288884697997102442,7754487398385730817,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:12⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,3288884697997102442,7754487398385730817,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:1848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,3288884697997102442,7754487398385730817,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,3288884697997102442,7754487398385730817,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,3288884697997102442,7754487398385730817,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3576 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:860
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4748
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
5KB
MD53d8056a8fb4ac844aa3f3e5a442896af
SHA11b740fe8b83e7a8e644ceb3c0b22fc4021e548d8
SHA256650b339d181e4403c249e5727d81eccbed96967d0cd0aca86ffc8abb7e48ae78
SHA512e3211e2f4415a5cbbce68d1e0df3c45989af3dacfdc9b2293e915ef967314365ad65e40373ff69c2bf03f9972a9385a1fc05fe9db52d3f104e7635f035cf2fe3
-
Filesize
6KB
MD5e50d8df233fc9f1aebe644c750c2db5c
SHA16db0a1f4ea973307bad40653926a0e1c5f140105
SHA256d1092808d2e9ba83317f05831bad628dd9014b8c992cec8131639389e2acc54e
SHA512bd9022a6c8dfd7a0d32a97e9a0a424f9edc443d3c417b89b6d2d2d16367b3ad1ef0c840e8956c5c21c16daa6a0f1447c63e741dfd955107e40e2da3182ac1527
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD549edbe1fbde9fa251286373835cdc9ab
SHA145aea0e9917588cee411c34011498202d77bf511
SHA25646d76e4b5b503e172b7face37419b4300287c7ec1801029df1a4d8242d873c3d
SHA512da363013d8946532649815105c3a6fbfbd356f32f2ea3464a88ab2df7ccb31733a06e83170a3ed1f9be2543f07426929be89d2e659eed3194118890ac2af7db3