Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 22:46
Static task
static1
Behavioral task
behavioral1
Sample
612ed9e652f441b8f3e352a4c858bf1e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
612ed9e652f441b8f3e352a4c858bf1e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
612ed9e652f441b8f3e352a4c858bf1e_JaffaCakes118.html
-
Size
40KB
-
MD5
612ed9e652f441b8f3e352a4c858bf1e
-
SHA1
0b354121ef159c6d569edcdb721e66ec4300ea99
-
SHA256
53d76286a560ac3a200b6ad531946f675eaec2a3406b1e23b8ad831b8dc3c61d
-
SHA512
8f944af92e5739addb9cf0ac819b751f14cc46e432d2434f16d7c0d9021f82950c55f4d12b35d41e990c09a315a2f1c0ff7aae5e2de9630d49229844a268f174
-
SSDEEP
768:plCC+yfE+3L/euk/CaEa0B/LbiJQZ3/Sf9Ph632tHf3VXb:LCC+yfE+jaYZbiJQZafBhv3J
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1896 msedge.exe 1896 msedge.exe 372 msedge.exe 372 msedge.exe 944 identity_helper.exe 944 identity_helper.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 372 wrote to memory of 548 372 msedge.exe 83 PID 372 wrote to memory of 548 372 msedge.exe 83 PID 372 wrote to memory of 924 372 msedge.exe 84 PID 372 wrote to memory of 924 372 msedge.exe 84 PID 372 wrote to memory of 924 372 msedge.exe 84 PID 372 wrote to memory of 924 372 msedge.exe 84 PID 372 wrote to memory of 924 372 msedge.exe 84 PID 372 wrote to memory of 924 372 msedge.exe 84 PID 372 wrote to memory of 924 372 msedge.exe 84 PID 372 wrote to memory of 924 372 msedge.exe 84 PID 372 wrote to memory of 924 372 msedge.exe 84 PID 372 wrote to memory of 924 372 msedge.exe 84 PID 372 wrote to memory of 924 372 msedge.exe 84 PID 372 wrote to memory of 924 372 msedge.exe 84 PID 372 wrote to memory of 924 372 msedge.exe 84 PID 372 wrote to memory of 924 372 msedge.exe 84 PID 372 wrote to memory of 924 372 msedge.exe 84 PID 372 wrote to memory of 924 372 msedge.exe 84 PID 372 wrote to memory of 924 372 msedge.exe 84 PID 372 wrote to memory of 924 372 msedge.exe 84 PID 372 wrote to memory of 924 372 msedge.exe 84 PID 372 wrote to memory of 924 372 msedge.exe 84 PID 372 wrote to memory of 924 372 msedge.exe 84 PID 372 wrote to memory of 924 372 msedge.exe 84 PID 372 wrote to memory of 924 372 msedge.exe 84 PID 372 wrote to memory of 924 372 msedge.exe 84 PID 372 wrote to memory of 924 372 msedge.exe 84 PID 372 wrote to memory of 924 372 msedge.exe 84 PID 372 wrote to memory of 924 372 msedge.exe 84 PID 372 wrote to memory of 924 372 msedge.exe 84 PID 372 wrote to memory of 924 372 msedge.exe 84 PID 372 wrote to memory of 924 372 msedge.exe 84 PID 372 wrote to memory of 924 372 msedge.exe 84 PID 372 wrote to memory of 924 372 msedge.exe 84 PID 372 wrote to memory of 924 372 msedge.exe 84 PID 372 wrote to memory of 924 372 msedge.exe 84 PID 372 wrote to memory of 924 372 msedge.exe 84 PID 372 wrote to memory of 924 372 msedge.exe 84 PID 372 wrote to memory of 924 372 msedge.exe 84 PID 372 wrote to memory of 924 372 msedge.exe 84 PID 372 wrote to memory of 924 372 msedge.exe 84 PID 372 wrote to memory of 924 372 msedge.exe 84 PID 372 wrote to memory of 1896 372 msedge.exe 85 PID 372 wrote to memory of 1896 372 msedge.exe 85 PID 372 wrote to memory of 884 372 msedge.exe 86 PID 372 wrote to memory of 884 372 msedge.exe 86 PID 372 wrote to memory of 884 372 msedge.exe 86 PID 372 wrote to memory of 884 372 msedge.exe 86 PID 372 wrote to memory of 884 372 msedge.exe 86 PID 372 wrote to memory of 884 372 msedge.exe 86 PID 372 wrote to memory of 884 372 msedge.exe 86 PID 372 wrote to memory of 884 372 msedge.exe 86 PID 372 wrote to memory of 884 372 msedge.exe 86 PID 372 wrote to memory of 884 372 msedge.exe 86 PID 372 wrote to memory of 884 372 msedge.exe 86 PID 372 wrote to memory of 884 372 msedge.exe 86 PID 372 wrote to memory of 884 372 msedge.exe 86 PID 372 wrote to memory of 884 372 msedge.exe 86 PID 372 wrote to memory of 884 372 msedge.exe 86 PID 372 wrote to memory of 884 372 msedge.exe 86 PID 372 wrote to memory of 884 372 msedge.exe 86 PID 372 wrote to memory of 884 372 msedge.exe 86 PID 372 wrote to memory of 884 372 msedge.exe 86 PID 372 wrote to memory of 884 372 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\612ed9e652f441b8f3e352a4c858bf1e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa05d646f8,0x7ffa05d64708,0x7ffa05d647182⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,1824709931912114992,10191067993432404085,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,1824709931912114992,10191067993432404085,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,1824709931912114992,10191067993432404085,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,1824709931912114992,10191067993432404085,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:1288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,1824709931912114992,10191067993432404085,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,1824709931912114992,10191067993432404085,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6092 /prefetch:12⤵PID:2960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,1824709931912114992,10191067993432404085,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5876 /prefetch:12⤵PID:932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,1824709931912114992,10191067993432404085,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5904 /prefetch:12⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,1824709931912114992,10191067993432404085,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 /prefetch:82⤵PID:696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,1824709931912114992,10191067993432404085,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,1824709931912114992,10191067993432404085,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:12⤵PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,1824709931912114992,10191067993432404085,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6060 /prefetch:12⤵PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,1824709931912114992,10191067993432404085,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5292 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5060
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3920
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5f9ad3958f299bfe382aad7724d34c5fd
SHA1afe5342c59d77d2594c7994586a95164e762e67a
SHA256a7f963fe7c1fc85ab370fd2e052733da63489dd35d2e95281932c53313126bf0
SHA5121620fa9208a5de0e36a165a1b5a80aec9d45162298cbede1b734597b03e4f68e2ed36ab2e5a0ea1ecc72272a0a9b314d8c01d306b97cd0a9c0b0e79c72185875
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
988B
MD543fa83486e7c7cf70ad375a8033908fc
SHA1a3697cfb5eca3c767587e6832eabe44fbf270c35
SHA25689246f061d26767beabd099e54d4e7f0a2eff056f69ffdd384927371356f4f7e
SHA5121842280294be7c1ff291c64fa7f8daa3cce5195a042671d875434ef83bdb7c7cfe4268ec510a1bcb8456ad8a0df534b8c8fd41fcde61f4f1654da0b44fbe18dd
-
Filesize
5KB
MD536a4f899d3a8ac5e9c71fcb191ab3eac
SHA1b749e37142f7487503d432c95c337fb5a5c0cf67
SHA2565cd2060cfc1291f9fffc92fda7c59b4719c3619dccef9115af297c064656a2ee
SHA512faf680dc1a8fc41c595c9738c872f6a86725b404d80c063a36eb7af929f38332d50869438925cd7cda449dff7982c0e752bf4d8265048fb3504ad2500d16793d
-
Filesize
7KB
MD511cfb1456de342e0efc0e747971bc8a6
SHA10987cdb6a3bb0b8376bc33775dc68888af406078
SHA2566c4d706680db4176a0f0d3c1f11f90da7dd0638747dcd0c1cd59bc37e3bffa63
SHA512a95db1e2a32f2cd5e907b6086afa44886c13373c63f58b40088e32a35a5a45fd1ec19d7556e25ec64c239bbdf39ca014cacc1fa5c6e1b39ba1fcde41e9c69b7e
-
Filesize
6KB
MD50cf60b9e8d68be5277f33bad6c807993
SHA1cbbd76e240b7f38e9ee0fa9e30ca0cc95d4f7528
SHA256235812b1e12308816d651d5d376559f29c98e801724bacc4e69004e3ed2932d0
SHA5125d78e4c798cf7f39c10877b9210fb63a20c2b7a54e78165f97988e8142313816d47c679947de619481ab2b09c3232806f8bfb9473fedb34f598d22bdd1903cc2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389