Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2024, 21:19
Static task
static1
Behavioral task
behavioral1
Sample
431eca746a8e273ac5d83f258c315bde_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
431eca746a8e273ac5d83f258c315bde_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
431eca746a8e273ac5d83f258c315bde_JaffaCakes118.html
-
Size
461KB
-
MD5
431eca746a8e273ac5d83f258c315bde
-
SHA1
e7110a2f1c497c95c607dd76b4030ced706f3491
-
SHA256
fd37113c3dffb3b06c72518d6800bffbebafe78c31ad70685c8f0ddded6b4417
-
SHA512
230ed978623d234c282a4c8091e9e88a9f7a5a71c3765b01a1d451b968a2ee2f63b76d73a4617876ff8b045c09f7daa06ddd1d35b49d8ac2ba50f2cddb8783d2
-
SSDEEP
6144:S5sMYod+X3oI+YSQ/sMYod+X3oI+Y2sMYod+X3oI+YLsMYod+X3oI+YQ:Y5d+X3j5d+X3i5d+X315d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3468 msedge.exe 3468 msedge.exe 804 msedge.exe 804 msedge.exe 2852 identity_helper.exe 2852 identity_helper.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 804 wrote to memory of 2876 804 msedge.exe 82 PID 804 wrote to memory of 2876 804 msedge.exe 82 PID 804 wrote to memory of 768 804 msedge.exe 85 PID 804 wrote to memory of 768 804 msedge.exe 85 PID 804 wrote to memory of 768 804 msedge.exe 85 PID 804 wrote to memory of 768 804 msedge.exe 85 PID 804 wrote to memory of 768 804 msedge.exe 85 PID 804 wrote to memory of 768 804 msedge.exe 85 PID 804 wrote to memory of 768 804 msedge.exe 85 PID 804 wrote to memory of 768 804 msedge.exe 85 PID 804 wrote to memory of 768 804 msedge.exe 85 PID 804 wrote to memory of 768 804 msedge.exe 85 PID 804 wrote to memory of 768 804 msedge.exe 85 PID 804 wrote to memory of 768 804 msedge.exe 85 PID 804 wrote to memory of 768 804 msedge.exe 85 PID 804 wrote to memory of 768 804 msedge.exe 85 PID 804 wrote to memory of 768 804 msedge.exe 85 PID 804 wrote to memory of 768 804 msedge.exe 85 PID 804 wrote to memory of 768 804 msedge.exe 85 PID 804 wrote to memory of 768 804 msedge.exe 85 PID 804 wrote to memory of 768 804 msedge.exe 85 PID 804 wrote to memory of 768 804 msedge.exe 85 PID 804 wrote to memory of 768 804 msedge.exe 85 PID 804 wrote to memory of 768 804 msedge.exe 85 PID 804 wrote to memory of 768 804 msedge.exe 85 PID 804 wrote to memory of 768 804 msedge.exe 85 PID 804 wrote to memory of 768 804 msedge.exe 85 PID 804 wrote to memory of 768 804 msedge.exe 85 PID 804 wrote to memory of 768 804 msedge.exe 85 PID 804 wrote to memory of 768 804 msedge.exe 85 PID 804 wrote to memory of 768 804 msedge.exe 85 PID 804 wrote to memory of 768 804 msedge.exe 85 PID 804 wrote to memory of 768 804 msedge.exe 85 PID 804 wrote to memory of 768 804 msedge.exe 85 PID 804 wrote to memory of 768 804 msedge.exe 85 PID 804 wrote to memory of 768 804 msedge.exe 85 PID 804 wrote to memory of 768 804 msedge.exe 85 PID 804 wrote to memory of 768 804 msedge.exe 85 PID 804 wrote to memory of 768 804 msedge.exe 85 PID 804 wrote to memory of 768 804 msedge.exe 85 PID 804 wrote to memory of 768 804 msedge.exe 85 PID 804 wrote to memory of 768 804 msedge.exe 85 PID 804 wrote to memory of 3468 804 msedge.exe 86 PID 804 wrote to memory of 3468 804 msedge.exe 86 PID 804 wrote to memory of 1540 804 msedge.exe 87 PID 804 wrote to memory of 1540 804 msedge.exe 87 PID 804 wrote to memory of 1540 804 msedge.exe 87 PID 804 wrote to memory of 1540 804 msedge.exe 87 PID 804 wrote to memory of 1540 804 msedge.exe 87 PID 804 wrote to memory of 1540 804 msedge.exe 87 PID 804 wrote to memory of 1540 804 msedge.exe 87 PID 804 wrote to memory of 1540 804 msedge.exe 87 PID 804 wrote to memory of 1540 804 msedge.exe 87 PID 804 wrote to memory of 1540 804 msedge.exe 87 PID 804 wrote to memory of 1540 804 msedge.exe 87 PID 804 wrote to memory of 1540 804 msedge.exe 87 PID 804 wrote to memory of 1540 804 msedge.exe 87 PID 804 wrote to memory of 1540 804 msedge.exe 87 PID 804 wrote to memory of 1540 804 msedge.exe 87 PID 804 wrote to memory of 1540 804 msedge.exe 87 PID 804 wrote to memory of 1540 804 msedge.exe 87 PID 804 wrote to memory of 1540 804 msedge.exe 87 PID 804 wrote to memory of 1540 804 msedge.exe 87 PID 804 wrote to memory of 1540 804 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\431eca746a8e273ac5d83f258c315bde_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbbb3b46f8,0x7ffbbb3b4708,0x7ffbbb3b47182⤵PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,11172521898179156832,8522735006280061057,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,11172521898179156832,8522735006280061057,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2340 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,11172521898179156832,8522735006280061057,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11172521898179156832,8522735006280061057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11172521898179156832,8522735006280061057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,11172521898179156832,8522735006280061057,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4128 /prefetch:82⤵PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,11172521898179156832,8522735006280061057,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4128 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11172521898179156832,8522735006280061057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:1256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11172521898179156832,8522735006280061057,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11172521898179156832,8522735006280061057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11172521898179156832,8522735006280061057,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:12⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,11172521898179156832,8522735006280061057,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2980
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1532
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2444
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
5KB
MD5df14a2ff33734523df93bdcb68ba1672
SHA1ea29424e1f32ae4516066d6c0bbde0255d569b6a
SHA256a334a5db6ef80535600fd761626812668e8aafdd4acd7db7117e0bbd47ba361b
SHA512ea0d986170ef7ce1872e48175756eda3c22fa572de7bf91400aa6b3c016649a37812cbace7c82452067ab9522d1c62d50a350c40d446a663d1c1997466b7f162
-
Filesize
6KB
MD51a57a9b8f239e4d5db7ef8046efbcce4
SHA14d149cc7d432efd15321ec578b418eaf2331a57d
SHA2561761f8a784491e6dd5749f6b6a6b44b960317585d9ac4aa18c39451599fdf0ba
SHA5123277a788f41f28e58a4db88aeb35cc5a7ac6268988d84fb8d66874c543e51b1fccc332ea4c1c90fee31a6c74780b743695a72c860f487321e0868dea6a088c1d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d0e56f58dd7f9f6db976e903160b9b61
SHA1b0a9515cf1e843381c3e94cd99a870d8d788aeb4
SHA256a0b26dab98135344bf0b0693a9e833a54b17b7528432a5dba063600bcf9a328d
SHA512d121edb71e31085a81111be29c0b176b2ea06e227953db1c2f4c8ee770ce757db4a07fcca3f3e27a91956d46116d2a6153c3c84c6ddb1d1ca4010866a251dbc5