Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/05/2024, 12:22
Static task
static1
Behavioral task
behavioral1
Sample
3a167075b57c6300157e5d17f82e2361_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
3a167075b57c6300157e5d17f82e2361_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3a167075b57c6300157e5d17f82e2361_JaffaCakes118.html
-
Size
53KB
-
MD5
3a167075b57c6300157e5d17f82e2361
-
SHA1
c17fd058c6f54a6b673c47b362ec7b091f0c8aed
-
SHA256
f468eb45da6e6166661abc576e7321f7d729a6c340012aa363980990eb4d4737
-
SHA512
0bac441afd594589378cd96be39a94140bd78e536a1fe6165df9e948f6f38829ea9a585254e49305fed875fa4524f124b387399e2c84e0d73a4a4d6221195826
-
SSDEEP
1536:bJO+LN0qVtFfZCEq1Bb8IcAp46+CZTrwojBN/Wne5T9KMRhI2q4FE4:tOUNThC3rwojBN/Wne5T9KMRhI2q4FE4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1852 msedge.exe 1852 msedge.exe 744 msedge.exe 744 msedge.exe 3240 identity_helper.exe 3240 identity_helper.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 744 wrote to memory of 4600 744 msedge.exe 82 PID 744 wrote to memory of 4600 744 msedge.exe 82 PID 744 wrote to memory of 1276 744 msedge.exe 83 PID 744 wrote to memory of 1276 744 msedge.exe 83 PID 744 wrote to memory of 1276 744 msedge.exe 83 PID 744 wrote to memory of 1276 744 msedge.exe 83 PID 744 wrote to memory of 1276 744 msedge.exe 83 PID 744 wrote to memory of 1276 744 msedge.exe 83 PID 744 wrote to memory of 1276 744 msedge.exe 83 PID 744 wrote to memory of 1276 744 msedge.exe 83 PID 744 wrote to memory of 1276 744 msedge.exe 83 PID 744 wrote to memory of 1276 744 msedge.exe 83 PID 744 wrote to memory of 1276 744 msedge.exe 83 PID 744 wrote to memory of 1276 744 msedge.exe 83 PID 744 wrote to memory of 1276 744 msedge.exe 83 PID 744 wrote to memory of 1276 744 msedge.exe 83 PID 744 wrote to memory of 1276 744 msedge.exe 83 PID 744 wrote to memory of 1276 744 msedge.exe 83 PID 744 wrote to memory of 1276 744 msedge.exe 83 PID 744 wrote to memory of 1276 744 msedge.exe 83 PID 744 wrote to memory of 1276 744 msedge.exe 83 PID 744 wrote to memory of 1276 744 msedge.exe 83 PID 744 wrote to memory of 1276 744 msedge.exe 83 PID 744 wrote to memory of 1276 744 msedge.exe 83 PID 744 wrote to memory of 1276 744 msedge.exe 83 PID 744 wrote to memory of 1276 744 msedge.exe 83 PID 744 wrote to memory of 1276 744 msedge.exe 83 PID 744 wrote to memory of 1276 744 msedge.exe 83 PID 744 wrote to memory of 1276 744 msedge.exe 83 PID 744 wrote to memory of 1276 744 msedge.exe 83 PID 744 wrote to memory of 1276 744 msedge.exe 83 PID 744 wrote to memory of 1276 744 msedge.exe 83 PID 744 wrote to memory of 1276 744 msedge.exe 83 PID 744 wrote to memory of 1276 744 msedge.exe 83 PID 744 wrote to memory of 1276 744 msedge.exe 83 PID 744 wrote to memory of 1276 744 msedge.exe 83 PID 744 wrote to memory of 1276 744 msedge.exe 83 PID 744 wrote to memory of 1276 744 msedge.exe 83 PID 744 wrote to memory of 1276 744 msedge.exe 83 PID 744 wrote to memory of 1276 744 msedge.exe 83 PID 744 wrote to memory of 1276 744 msedge.exe 83 PID 744 wrote to memory of 1276 744 msedge.exe 83 PID 744 wrote to memory of 1852 744 msedge.exe 84 PID 744 wrote to memory of 1852 744 msedge.exe 84 PID 744 wrote to memory of 1056 744 msedge.exe 85 PID 744 wrote to memory of 1056 744 msedge.exe 85 PID 744 wrote to memory of 1056 744 msedge.exe 85 PID 744 wrote to memory of 1056 744 msedge.exe 85 PID 744 wrote to memory of 1056 744 msedge.exe 85 PID 744 wrote to memory of 1056 744 msedge.exe 85 PID 744 wrote to memory of 1056 744 msedge.exe 85 PID 744 wrote to memory of 1056 744 msedge.exe 85 PID 744 wrote to memory of 1056 744 msedge.exe 85 PID 744 wrote to memory of 1056 744 msedge.exe 85 PID 744 wrote to memory of 1056 744 msedge.exe 85 PID 744 wrote to memory of 1056 744 msedge.exe 85 PID 744 wrote to memory of 1056 744 msedge.exe 85 PID 744 wrote to memory of 1056 744 msedge.exe 85 PID 744 wrote to memory of 1056 744 msedge.exe 85 PID 744 wrote to memory of 1056 744 msedge.exe 85 PID 744 wrote to memory of 1056 744 msedge.exe 85 PID 744 wrote to memory of 1056 744 msedge.exe 85 PID 744 wrote to memory of 1056 744 msedge.exe 85 PID 744 wrote to memory of 1056 744 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3a167075b57c6300157e5d17f82e2361_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe902246f8,0x7ffe90224708,0x7ffe902247182⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,4018716459482423966,4273979708739604185,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,4018716459482423966,4273979708739604185,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,4018716459482423966,4273979708739604185,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:82⤵PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4018716459482423966,4273979708739604185,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4018716459482423966,4273979708739604185,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,4018716459482423966,4273979708739604185,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 /prefetch:82⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,4018716459482423966,4273979708739604185,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4018716459482423966,4273979708739604185,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4018716459482423966,4273979708739604185,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:3328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4018716459482423966,4273979708739604185,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:2164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4018716459482423966,4273979708739604185,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,4018716459482423966,4273979708739604185,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1984 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4572
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4380
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
6KB
MD55893a140bd7342cd1bd1e02457010d52
SHA1150219b2717c6fb8a1967c5236ace4ea73dbc48f
SHA256eafabfb7832b509568fb30eee530e1fba27068712fb5bfd58170c5a1a501843e
SHA5123bc69f8dbe855b04719a7ee87114cb9ad7a9528525fc944b4039ca2b4209f378f8269f770c18abd4805320f48c665e427b82a507944c4de92688087cdea6c5bc
-
Filesize
6KB
MD514027eb222279847d2fa57c672385e9e
SHA14c5c0473d0f89b8beb20f4ee75a7d1b29f845175
SHA256ccd6908e89fa4be34641a9800c5ed8e6106b9f3eee327d98e3505567857ebba2
SHA51206d21d1f92942c77f0117295b7ae42f1af246770a5d8f653282a65f5b01a18efce1cee739795110973eeadaf832a8fb76a93613589a13dc53bb8fb4a1ef8c7bb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5868f213e1be8d67c48d08763dc9ba612
SHA13ea423660ae255e417692d0d02f12199fcd9aa7f
SHA2562b695a019be031605376bee33567ffdeea79b095f634fa43d51df264b3a86305
SHA5126402e979f9ea73966b6f69433575fd6961dee4fe5f5c7c05f2b7e09d554663381909ba46228b2ad7d6e800704977fb1baf52a7823213f2dc54da70b196b2e909