Analysis
-
max time kernel
148s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
13-05-2024 16:12
Static task
static1
Behavioral task
behavioral1
Sample
405162d2a2cc5025702d8329ac72735d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
405162d2a2cc5025702d8329ac72735d_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
405162d2a2cc5025702d8329ac72735d_JaffaCakes118.html
-
Size
19KB
-
MD5
405162d2a2cc5025702d8329ac72735d
-
SHA1
77916adb3a06c3b24e78332b7234de0122b841c1
-
SHA256
600f3df1679b42d74435632700a5c79fa39a742a1b17e07bc2f3fdcf802f625d
-
SHA512
d3a10cdf40df2d223002a3d4685101b2e2273dcf2f84355630f744c943528aed4a3a94723688d829e55cc7b4b7376b69e5d23bb992374ec2494e8624ccc8c842
-
SSDEEP
384:NTBEJqs1LjSPh71I6Dkq9/+OaA+Ld895vQHGoHXCgJq+W51zRkIB7iPN:N9se9Dkqo2qHgiV
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2064 msedge.exe 2064 msedge.exe 4976 msedge.exe 4976 msedge.exe 4328 identity_helper.exe 4328 identity_helper.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4976 wrote to memory of 3632 4976 msedge.exe 85 PID 4976 wrote to memory of 3632 4976 msedge.exe 85 PID 4976 wrote to memory of 676 4976 msedge.exe 87 PID 4976 wrote to memory of 676 4976 msedge.exe 87 PID 4976 wrote to memory of 676 4976 msedge.exe 87 PID 4976 wrote to memory of 676 4976 msedge.exe 87 PID 4976 wrote to memory of 676 4976 msedge.exe 87 PID 4976 wrote to memory of 676 4976 msedge.exe 87 PID 4976 wrote to memory of 676 4976 msedge.exe 87 PID 4976 wrote to memory of 676 4976 msedge.exe 87 PID 4976 wrote to memory of 676 4976 msedge.exe 87 PID 4976 wrote to memory of 676 4976 msedge.exe 87 PID 4976 wrote to memory of 676 4976 msedge.exe 87 PID 4976 wrote to memory of 676 4976 msedge.exe 87 PID 4976 wrote to memory of 676 4976 msedge.exe 87 PID 4976 wrote to memory of 676 4976 msedge.exe 87 PID 4976 wrote to memory of 676 4976 msedge.exe 87 PID 4976 wrote to memory of 676 4976 msedge.exe 87 PID 4976 wrote to memory of 676 4976 msedge.exe 87 PID 4976 wrote to memory of 676 4976 msedge.exe 87 PID 4976 wrote to memory of 676 4976 msedge.exe 87 PID 4976 wrote to memory of 676 4976 msedge.exe 87 PID 4976 wrote to memory of 676 4976 msedge.exe 87 PID 4976 wrote to memory of 676 4976 msedge.exe 87 PID 4976 wrote to memory of 676 4976 msedge.exe 87 PID 4976 wrote to memory of 676 4976 msedge.exe 87 PID 4976 wrote to memory of 676 4976 msedge.exe 87 PID 4976 wrote to memory of 676 4976 msedge.exe 87 PID 4976 wrote to memory of 676 4976 msedge.exe 87 PID 4976 wrote to memory of 676 4976 msedge.exe 87 PID 4976 wrote to memory of 676 4976 msedge.exe 87 PID 4976 wrote to memory of 676 4976 msedge.exe 87 PID 4976 wrote to memory of 676 4976 msedge.exe 87 PID 4976 wrote to memory of 676 4976 msedge.exe 87 PID 4976 wrote to memory of 676 4976 msedge.exe 87 PID 4976 wrote to memory of 676 4976 msedge.exe 87 PID 4976 wrote to memory of 676 4976 msedge.exe 87 PID 4976 wrote to memory of 676 4976 msedge.exe 87 PID 4976 wrote to memory of 676 4976 msedge.exe 87 PID 4976 wrote to memory of 676 4976 msedge.exe 87 PID 4976 wrote to memory of 676 4976 msedge.exe 87 PID 4976 wrote to memory of 676 4976 msedge.exe 87 PID 4976 wrote to memory of 2064 4976 msedge.exe 88 PID 4976 wrote to memory of 2064 4976 msedge.exe 88 PID 4976 wrote to memory of 2252 4976 msedge.exe 89 PID 4976 wrote to memory of 2252 4976 msedge.exe 89 PID 4976 wrote to memory of 2252 4976 msedge.exe 89 PID 4976 wrote to memory of 2252 4976 msedge.exe 89 PID 4976 wrote to memory of 2252 4976 msedge.exe 89 PID 4976 wrote to memory of 2252 4976 msedge.exe 89 PID 4976 wrote to memory of 2252 4976 msedge.exe 89 PID 4976 wrote to memory of 2252 4976 msedge.exe 89 PID 4976 wrote to memory of 2252 4976 msedge.exe 89 PID 4976 wrote to memory of 2252 4976 msedge.exe 89 PID 4976 wrote to memory of 2252 4976 msedge.exe 89 PID 4976 wrote to memory of 2252 4976 msedge.exe 89 PID 4976 wrote to memory of 2252 4976 msedge.exe 89 PID 4976 wrote to memory of 2252 4976 msedge.exe 89 PID 4976 wrote to memory of 2252 4976 msedge.exe 89 PID 4976 wrote to memory of 2252 4976 msedge.exe 89 PID 4976 wrote to memory of 2252 4976 msedge.exe 89 PID 4976 wrote to memory of 2252 4976 msedge.exe 89 PID 4976 wrote to memory of 2252 4976 msedge.exe 89 PID 4976 wrote to memory of 2252 4976 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\405162d2a2cc5025702d8329ac72735d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd150d46f8,0x7ffd150d4708,0x7ffd150d47182⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,523607583945405358,17792062027763123732,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:22⤵PID:676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2016,523607583945405358,17792062027763123732,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2328 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2016,523607583945405358,17792062027763123732,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,523607583945405358,17792062027763123732,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,523607583945405358,17792062027763123732,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,523607583945405358,17792062027763123732,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5400 /prefetch:82⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,523607583945405358,17792062027763123732,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5400 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,523607583945405358,17792062027763123732,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,523607583945405358,17792062027763123732,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,523607583945405358,17792062027763123732,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:12⤵PID:1048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,523607583945405358,17792062027763123732,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:12⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,523607583945405358,17792062027763123732,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5448 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:744
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3144
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
6KB
MD50f8bcab37a917d6cbc9dbeda2f8a7c2b
SHA10349692ef92bd213e414b44e133501e25bf73298
SHA256a548571429c60b60ccf240b00d6918a7ba8ed01a84a00c6a63c4dd6f93db2a3e
SHA5128fffeb78f5454777e7a5dc1f374e0e283bb634e032cd54d7be6e87bfef0facde6a37a7ed58ebc8b433e140835754466f1aa682977259e1a7794c124ffead752e
-
Filesize
6KB
MD5ab6893a8fee7433f43e9fa1a531055dd
SHA1477e04bac292065eff16b2caffec1fd6dc4652f0
SHA256581e6ecd38b4d3cf04bfe732eac3cee37680f87346afb591fbbdc046da269202
SHA512f8128b071401cc38fa557e3a78809b62560278a4746500a2cdcb6f12bc12292a42c508f04ddac3c7866287d10f206c82de6d4a5060c263e5f5c438a3c5d1d732
-
Filesize
6KB
MD5d1a659bedc18fd1432416927d50de8ab
SHA14dd51b1f007917f967ef2bf17d41d6f5f7daac47
SHA256328d695278559b8ce1876b5925a6973bc236345f25479635f6f721c983b8bd43
SHA512eda5e1a983655c85465e206e85fd1ecb6ab9f1b2accbf77cae6afba00114cf9cee230a4a6f21ea1507266a0bf288880b548b88b6377ad8db30232936fc93c071
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD53ea032e0e1df428acc79833875426773
SHA10821e7ebd2dc3eb9e592d7f5ad20a3e7862f8bbe
SHA2569506b69c3170dd8318c00b7494502d8e45ff66ea886444bc9628651ba0aa0af4
SHA512f9e1efc63768bb35a3564bc7e8393ac7413355e3c04627040ee620a0ec50213966b81560ff25d66a89d63013b84abafc0947dba56feac5b85188af118bc3fdb8