Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/05/2024, 00:56
Static task
static1
Behavioral task
behavioral1
Sample
376a5731f49cc45c71f2fd1a58e4b6dd_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
376a5731f49cc45c71f2fd1a58e4b6dd_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
376a5731f49cc45c71f2fd1a58e4b6dd_JaffaCakes118.html
-
Size
129KB
-
MD5
376a5731f49cc45c71f2fd1a58e4b6dd
-
SHA1
e265f65c09e36cfe5b38591689adb5aae88d927f
-
SHA256
a0aecded8fee92978a86184dae3ce78776494fec2740507d4373f0e19ecd7cfe
-
SHA512
819230833a9c708231f1fd9b1c0fba29296f5d9092bf246037483d41cf2b31b3b602d4ac0888dd862cac8e572df509f015de704dce124ed9441e3f3d43253f74
-
SSDEEP
1536:HHchmcWZlyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOZ:HHch5WZlyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2864 msedge.exe 2864 msedge.exe 1516 msedge.exe 1516 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1516 wrote to memory of 1572 1516 msedge.exe 82 PID 1516 wrote to memory of 1572 1516 msedge.exe 82 PID 1516 wrote to memory of 392 1516 msedge.exe 83 PID 1516 wrote to memory of 392 1516 msedge.exe 83 PID 1516 wrote to memory of 392 1516 msedge.exe 83 PID 1516 wrote to memory of 392 1516 msedge.exe 83 PID 1516 wrote to memory of 392 1516 msedge.exe 83 PID 1516 wrote to memory of 392 1516 msedge.exe 83 PID 1516 wrote to memory of 392 1516 msedge.exe 83 PID 1516 wrote to memory of 392 1516 msedge.exe 83 PID 1516 wrote to memory of 392 1516 msedge.exe 83 PID 1516 wrote to memory of 392 1516 msedge.exe 83 PID 1516 wrote to memory of 392 1516 msedge.exe 83 PID 1516 wrote to memory of 392 1516 msedge.exe 83 PID 1516 wrote to memory of 392 1516 msedge.exe 83 PID 1516 wrote to memory of 392 1516 msedge.exe 83 PID 1516 wrote to memory of 392 1516 msedge.exe 83 PID 1516 wrote to memory of 392 1516 msedge.exe 83 PID 1516 wrote to memory of 392 1516 msedge.exe 83 PID 1516 wrote to memory of 392 1516 msedge.exe 83 PID 1516 wrote to memory of 392 1516 msedge.exe 83 PID 1516 wrote to memory of 392 1516 msedge.exe 83 PID 1516 wrote to memory of 392 1516 msedge.exe 83 PID 1516 wrote to memory of 392 1516 msedge.exe 83 PID 1516 wrote to memory of 392 1516 msedge.exe 83 PID 1516 wrote to memory of 392 1516 msedge.exe 83 PID 1516 wrote to memory of 392 1516 msedge.exe 83 PID 1516 wrote to memory of 392 1516 msedge.exe 83 PID 1516 wrote to memory of 392 1516 msedge.exe 83 PID 1516 wrote to memory of 392 1516 msedge.exe 83 PID 1516 wrote to memory of 392 1516 msedge.exe 83 PID 1516 wrote to memory of 392 1516 msedge.exe 83 PID 1516 wrote to memory of 392 1516 msedge.exe 83 PID 1516 wrote to memory of 392 1516 msedge.exe 83 PID 1516 wrote to memory of 392 1516 msedge.exe 83 PID 1516 wrote to memory of 392 1516 msedge.exe 83 PID 1516 wrote to memory of 392 1516 msedge.exe 83 PID 1516 wrote to memory of 392 1516 msedge.exe 83 PID 1516 wrote to memory of 392 1516 msedge.exe 83 PID 1516 wrote to memory of 392 1516 msedge.exe 83 PID 1516 wrote to memory of 392 1516 msedge.exe 83 PID 1516 wrote to memory of 392 1516 msedge.exe 83 PID 1516 wrote to memory of 2864 1516 msedge.exe 84 PID 1516 wrote to memory of 2864 1516 msedge.exe 84 PID 1516 wrote to memory of 2608 1516 msedge.exe 85 PID 1516 wrote to memory of 2608 1516 msedge.exe 85 PID 1516 wrote to memory of 2608 1516 msedge.exe 85 PID 1516 wrote to memory of 2608 1516 msedge.exe 85 PID 1516 wrote to memory of 2608 1516 msedge.exe 85 PID 1516 wrote to memory of 2608 1516 msedge.exe 85 PID 1516 wrote to memory of 2608 1516 msedge.exe 85 PID 1516 wrote to memory of 2608 1516 msedge.exe 85 PID 1516 wrote to memory of 2608 1516 msedge.exe 85 PID 1516 wrote to memory of 2608 1516 msedge.exe 85 PID 1516 wrote to memory of 2608 1516 msedge.exe 85 PID 1516 wrote to memory of 2608 1516 msedge.exe 85 PID 1516 wrote to memory of 2608 1516 msedge.exe 85 PID 1516 wrote to memory of 2608 1516 msedge.exe 85 PID 1516 wrote to memory of 2608 1516 msedge.exe 85 PID 1516 wrote to memory of 2608 1516 msedge.exe 85 PID 1516 wrote to memory of 2608 1516 msedge.exe 85 PID 1516 wrote to memory of 2608 1516 msedge.exe 85 PID 1516 wrote to memory of 2608 1516 msedge.exe 85 PID 1516 wrote to memory of 2608 1516 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\376a5731f49cc45c71f2fd1a58e4b6dd_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff631e46f8,0x7fff631e4708,0x7fff631e47182⤵PID:1572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2292,16945611892061932336,11411164347001649909,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2296 /prefetch:22⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2292,16945611892061932336,11411164347001649909,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2352 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2292,16945611892061932336,11411164347001649909,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2292,16945611892061932336,11411164347001649909,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2292,16945611892061932336,11411164347001649909,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2292,16945611892061932336,11411164347001649909,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2292,16945611892061932336,11411164347001649909,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5084 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1384
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4832
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
6KB
MD5ad7fd4b91a29c4718d4402925cc62160
SHA1ee8e17cd8c48818a8212e282a7d4d6354a7cc358
SHA256d7bd9ba35731783b13a0369420acd27974c2a0900cb5bc946a8c82b06debe358
SHA512db0563e063851fa41a9777f9fa45845b6bbf75c8940c597c2aba876c58d39507ee8177ff033d3242a3627854a3528b24389c91a7505eb662d8a531708182f7e9
-
Filesize
6KB
MD52451418863e6650d2ee051b3c1dac445
SHA1e7545574940cbfd7bb84d346f471df4ecd5b2425
SHA2565bcd69f116fd7614c1567a27b96e884b9d0e36745dbcf81547dcaf56393ebf85
SHA512a8fa56dea81816ab8cdc73de107b07748c5eaa1e0048f4d29d5f63ee0c3e6503d1a0f92aba8ffdf3455b66feecbd2939042eaa620823e0d55bd586a3331582cd
-
Filesize
11KB
MD51bee8af9d841000b35b5bb4ec4bb4edb
SHA17c38e5146c57283a2871fd2174f52fd50aaa17d1
SHA256caf96c6c4328c1788b7b1b8e684122f5d3fd5d19c8e83df226d9e407f18c1519
SHA512f0588abdb28eb76d2c0bc80133331a91b23406b7bb8fbda08b7707ed232f4243b449c2a3a387ce568909d199452ce9f9675d25efe3f598625d087d87800a960a