Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2024, 23:05
Static task
static1
Behavioral task
behavioral1
Sample
43780e5c9b15abcbd287bc68146c0476_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
43780e5c9b15abcbd287bc68146c0476_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
43780e5c9b15abcbd287bc68146c0476_JaffaCakes118.html
-
Size
148KB
-
MD5
43780e5c9b15abcbd287bc68146c0476
-
SHA1
035e357f65746e53ca2a504a704dba8b3da25d24
-
SHA256
5ff34489e0f1debb49109f46747d7853f78963afaa3ef0330ca03902067bfc3f
-
SHA512
d86c9b170d408b476e81131ae4e15e2baffc7979257338a4f53f22923c814e3ed23521f0e73f56d3b0fb6dc3e0c2e615158f2e6d1fa57409838a6a330c383ad6
-
SSDEEP
3072:wc7/yMohCq0OpxQryfkMY+BES09JXAnyrZalI+YQ:wcwsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5036 msedge.exe 5036 msedge.exe 1524 msedge.exe 1524 msedge.exe 3552 identity_helper.exe 3552 identity_helper.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1524 wrote to memory of 1852 1524 msedge.exe 81 PID 1524 wrote to memory of 1852 1524 msedge.exe 81 PID 1524 wrote to memory of 4936 1524 msedge.exe 82 PID 1524 wrote to memory of 4936 1524 msedge.exe 82 PID 1524 wrote to memory of 4936 1524 msedge.exe 82 PID 1524 wrote to memory of 4936 1524 msedge.exe 82 PID 1524 wrote to memory of 4936 1524 msedge.exe 82 PID 1524 wrote to memory of 4936 1524 msedge.exe 82 PID 1524 wrote to memory of 4936 1524 msedge.exe 82 PID 1524 wrote to memory of 4936 1524 msedge.exe 82 PID 1524 wrote to memory of 4936 1524 msedge.exe 82 PID 1524 wrote to memory of 4936 1524 msedge.exe 82 PID 1524 wrote to memory of 4936 1524 msedge.exe 82 PID 1524 wrote to memory of 4936 1524 msedge.exe 82 PID 1524 wrote to memory of 4936 1524 msedge.exe 82 PID 1524 wrote to memory of 4936 1524 msedge.exe 82 PID 1524 wrote to memory of 4936 1524 msedge.exe 82 PID 1524 wrote to memory of 4936 1524 msedge.exe 82 PID 1524 wrote to memory of 4936 1524 msedge.exe 82 PID 1524 wrote to memory of 4936 1524 msedge.exe 82 PID 1524 wrote to memory of 4936 1524 msedge.exe 82 PID 1524 wrote to memory of 4936 1524 msedge.exe 82 PID 1524 wrote to memory of 4936 1524 msedge.exe 82 PID 1524 wrote to memory of 4936 1524 msedge.exe 82 PID 1524 wrote to memory of 4936 1524 msedge.exe 82 PID 1524 wrote to memory of 4936 1524 msedge.exe 82 PID 1524 wrote to memory of 4936 1524 msedge.exe 82 PID 1524 wrote to memory of 4936 1524 msedge.exe 82 PID 1524 wrote to memory of 4936 1524 msedge.exe 82 PID 1524 wrote to memory of 4936 1524 msedge.exe 82 PID 1524 wrote to memory of 4936 1524 msedge.exe 82 PID 1524 wrote to memory of 4936 1524 msedge.exe 82 PID 1524 wrote to memory of 4936 1524 msedge.exe 82 PID 1524 wrote to memory of 4936 1524 msedge.exe 82 PID 1524 wrote to memory of 4936 1524 msedge.exe 82 PID 1524 wrote to memory of 4936 1524 msedge.exe 82 PID 1524 wrote to memory of 4936 1524 msedge.exe 82 PID 1524 wrote to memory of 4936 1524 msedge.exe 82 PID 1524 wrote to memory of 4936 1524 msedge.exe 82 PID 1524 wrote to memory of 4936 1524 msedge.exe 82 PID 1524 wrote to memory of 4936 1524 msedge.exe 82 PID 1524 wrote to memory of 4936 1524 msedge.exe 82 PID 1524 wrote to memory of 5036 1524 msedge.exe 83 PID 1524 wrote to memory of 5036 1524 msedge.exe 83 PID 1524 wrote to memory of 2936 1524 msedge.exe 84 PID 1524 wrote to memory of 2936 1524 msedge.exe 84 PID 1524 wrote to memory of 2936 1524 msedge.exe 84 PID 1524 wrote to memory of 2936 1524 msedge.exe 84 PID 1524 wrote to memory of 2936 1524 msedge.exe 84 PID 1524 wrote to memory of 2936 1524 msedge.exe 84 PID 1524 wrote to memory of 2936 1524 msedge.exe 84 PID 1524 wrote to memory of 2936 1524 msedge.exe 84 PID 1524 wrote to memory of 2936 1524 msedge.exe 84 PID 1524 wrote to memory of 2936 1524 msedge.exe 84 PID 1524 wrote to memory of 2936 1524 msedge.exe 84 PID 1524 wrote to memory of 2936 1524 msedge.exe 84 PID 1524 wrote to memory of 2936 1524 msedge.exe 84 PID 1524 wrote to memory of 2936 1524 msedge.exe 84 PID 1524 wrote to memory of 2936 1524 msedge.exe 84 PID 1524 wrote to memory of 2936 1524 msedge.exe 84 PID 1524 wrote to memory of 2936 1524 msedge.exe 84 PID 1524 wrote to memory of 2936 1524 msedge.exe 84 PID 1524 wrote to memory of 2936 1524 msedge.exe 84 PID 1524 wrote to memory of 2936 1524 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\43780e5c9b15abcbd287bc68146c0476_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd6a4b46f8,0x7ffd6a4b4708,0x7ffd6a4b47182⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,14716256847252322459,2802422245127670744,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:22⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,14716256847252322459,2802422245127670744,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2360 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,14716256847252322459,2802422245127670744,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,14716256847252322459,2802422245127670744,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,14716256847252322459,2802422245127670744,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,14716256847252322459,2802422245127670744,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5096 /prefetch:82⤵PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,14716256847252322459,2802422245127670744,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5096 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,14716256847252322459,2802422245127670744,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,14716256847252322459,2802422245127670744,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,14716256847252322459,2802422245127670744,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3956 /prefetch:12⤵PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,14716256847252322459,2802422245127670744,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,14716256847252322459,2802422245127670744,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3152 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3800
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4024
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
6KB
MD5e60153dc666c2b848602201ae231198b
SHA17d468435e79e21ef0d80de75c686e0e209436593
SHA25675fe23714893f0d8e464868dfc8dc12c7fdb493f3ba0cc16a4d8d2889d79f770
SHA5123de726837d5069445de2ee16dc4a56350a6714de5d5fb7b45bf88ebda9357465363df3ac964c18d013390f901e972db358e122ffca832df2f742fc548b901d73
-
Filesize
6KB
MD5da6718fdc761d95b247a9f4ab2484c56
SHA1fda0e31e99f6c3b79a78ea1d95a7f08f33e25461
SHA256f246a6969248dca4a145ea7d1bb07687caef72160c56084b893cc8bd4e67ea82
SHA512bfd010c4533f7856ac564f98d924b15002b7a30c448bb92f8c59cb6d9ffe467109f0580be059fcc215949a697a0bf67619cc1cb987d4c4bf4ae9d359422e0c52
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5098ac8e9a6547d017a589af2b3e0ac22
SHA1444abb59d965202c47e8ba94a68251aa51a3ba40
SHA256ff118a5ee4312c2a7a29b2f3406b2f610f363254ad282eee1d16591ee88d0229
SHA512c506fa706bbefdd00758e7f4effc5576b15a3bc70d7dcaa61523dfbcb6c575d4e2d66b6236dc8161f08c4b773916778667bde6ab7341060aad3f233e971ca197