Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 21:49
Static task
static1
Behavioral task
behavioral1
Sample
64e26165566363759be66b970afc4424_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
64e26165566363759be66b970afc4424_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
64e26165566363759be66b970afc4424_JaffaCakes118.html
-
Size
4KB
-
MD5
64e26165566363759be66b970afc4424
-
SHA1
d5c660793a1c272c61b9877cd21346291b82399d
-
SHA256
e90647cc3c139d5d19a02d87b07657b087424e97a41edab6c84a758edfe9f4ba
-
SHA512
b709dd415c3bb786f9a2d6dccf24adadfa51fd72f79753c17fa143e62c2df19bffabaa5e5ebf20d38bcede3419d359c1d1e56e8b8326dad9901fb7546f031f10
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8o63Vokjn:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDX
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1320 msedge.exe 1320 msedge.exe 920 msedge.exe 920 msedge.exe 972 identity_helper.exe 972 identity_helper.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 920 wrote to memory of 3612 920 msedge.exe 82 PID 920 wrote to memory of 3612 920 msedge.exe 82 PID 920 wrote to memory of 4552 920 msedge.exe 83 PID 920 wrote to memory of 4552 920 msedge.exe 83 PID 920 wrote to memory of 4552 920 msedge.exe 83 PID 920 wrote to memory of 4552 920 msedge.exe 83 PID 920 wrote to memory of 4552 920 msedge.exe 83 PID 920 wrote to memory of 4552 920 msedge.exe 83 PID 920 wrote to memory of 4552 920 msedge.exe 83 PID 920 wrote to memory of 4552 920 msedge.exe 83 PID 920 wrote to memory of 4552 920 msedge.exe 83 PID 920 wrote to memory of 4552 920 msedge.exe 83 PID 920 wrote to memory of 4552 920 msedge.exe 83 PID 920 wrote to memory of 4552 920 msedge.exe 83 PID 920 wrote to memory of 4552 920 msedge.exe 83 PID 920 wrote to memory of 4552 920 msedge.exe 83 PID 920 wrote to memory of 4552 920 msedge.exe 83 PID 920 wrote to memory of 4552 920 msedge.exe 83 PID 920 wrote to memory of 4552 920 msedge.exe 83 PID 920 wrote to memory of 4552 920 msedge.exe 83 PID 920 wrote to memory of 4552 920 msedge.exe 83 PID 920 wrote to memory of 4552 920 msedge.exe 83 PID 920 wrote to memory of 4552 920 msedge.exe 83 PID 920 wrote to memory of 4552 920 msedge.exe 83 PID 920 wrote to memory of 4552 920 msedge.exe 83 PID 920 wrote to memory of 4552 920 msedge.exe 83 PID 920 wrote to memory of 4552 920 msedge.exe 83 PID 920 wrote to memory of 4552 920 msedge.exe 83 PID 920 wrote to memory of 4552 920 msedge.exe 83 PID 920 wrote to memory of 4552 920 msedge.exe 83 PID 920 wrote to memory of 4552 920 msedge.exe 83 PID 920 wrote to memory of 4552 920 msedge.exe 83 PID 920 wrote to memory of 4552 920 msedge.exe 83 PID 920 wrote to memory of 4552 920 msedge.exe 83 PID 920 wrote to memory of 4552 920 msedge.exe 83 PID 920 wrote to memory of 4552 920 msedge.exe 83 PID 920 wrote to memory of 4552 920 msedge.exe 83 PID 920 wrote to memory of 4552 920 msedge.exe 83 PID 920 wrote to memory of 4552 920 msedge.exe 83 PID 920 wrote to memory of 4552 920 msedge.exe 83 PID 920 wrote to memory of 4552 920 msedge.exe 83 PID 920 wrote to memory of 4552 920 msedge.exe 83 PID 920 wrote to memory of 1320 920 msedge.exe 84 PID 920 wrote to memory of 1320 920 msedge.exe 84 PID 920 wrote to memory of 1676 920 msedge.exe 85 PID 920 wrote to memory of 1676 920 msedge.exe 85 PID 920 wrote to memory of 1676 920 msedge.exe 85 PID 920 wrote to memory of 1676 920 msedge.exe 85 PID 920 wrote to memory of 1676 920 msedge.exe 85 PID 920 wrote to memory of 1676 920 msedge.exe 85 PID 920 wrote to memory of 1676 920 msedge.exe 85 PID 920 wrote to memory of 1676 920 msedge.exe 85 PID 920 wrote to memory of 1676 920 msedge.exe 85 PID 920 wrote to memory of 1676 920 msedge.exe 85 PID 920 wrote to memory of 1676 920 msedge.exe 85 PID 920 wrote to memory of 1676 920 msedge.exe 85 PID 920 wrote to memory of 1676 920 msedge.exe 85 PID 920 wrote to memory of 1676 920 msedge.exe 85 PID 920 wrote to memory of 1676 920 msedge.exe 85 PID 920 wrote to memory of 1676 920 msedge.exe 85 PID 920 wrote to memory of 1676 920 msedge.exe 85 PID 920 wrote to memory of 1676 920 msedge.exe 85 PID 920 wrote to memory of 1676 920 msedge.exe 85 PID 920 wrote to memory of 1676 920 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\64e26165566363759be66b970afc4424_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9903a46f8,0x7ff9903a4708,0x7ff9903a47182⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,11979924336351157305,18172640840950027721,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,11979924336351157305,18172640840950027721,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,11979924336351157305,18172640840950027721,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11979924336351157305,18172640840950027721,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11979924336351157305,18172640840950027721,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,11979924336351157305,18172640840950027721,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 /prefetch:82⤵PID:1336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,11979924336351157305,18172640840950027721,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11979924336351157305,18172640840950027721,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11979924336351157305,18172640840950027721,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11979924336351157305,18172640840950027721,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11979924336351157305,18172640840950027721,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:12⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,11979924336351157305,18172640840950027721,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2628 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3660
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3780
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
292B
MD5ced668c5622f20db6aaca1b56923db44
SHA1aac39248357b73a902fac9b76b33a096f9b0a955
SHA2569e4cdc14585e4be0e9c495005d0639083af6fb6196eddf3087ec528290e72c2f
SHA5127fb3fb575634ddc3b1992322053951ec75bdc66237201e3a8cdae19ee77ac5d91f6538d8e43e2c1643bd20e2b9d287e37ef7f676cbda4214c91d99576e7dccd5
-
Filesize
5KB
MD57cb5f4e35ed89ace3480cc467168306d
SHA14dde09bf61112e2c006821876598f22552354c60
SHA256b90cdc98bbcfbda15d949b5a6cf12cd41e9d0b866e6a9a4076ad513a84066015
SHA512324397b486f128ba6ebf92cb2d44c65a2a7a6447e3d7980a0cd8e60ef2a451d2ebe54e0865f5a6e09bf879da863b57be34020f63463390f63c46e150f3052b4c
-
Filesize
6KB
MD5a993cea13ebbdf8bcd36f3e5b2278a51
SHA1acc1a9cf1257bdcc232f8d5edd0b44906557120f
SHA256a77c75024a4dc2f4129e686230219f812d5fe1223281f62dd4a50049bedcba36
SHA512f065a29967465970228c8c614dc936ecd52283e6d612f76350e8d800a34cbbbdcf49d097ab9a2caa5fdcc7bd6ff19eafbb2e88820690e75725f5524e30b6cdc9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51d9396c327f004629badab553e703ac3
SHA142bdf959792f060297b33c7289f016ac2eb53e39
SHA2568ad3dbe90fae783c5a4479a4487e8801130d5b743b479e279018eb73dbf63b20
SHA512d7bc958029cd8576987b7082968c8ff34cf12405387d0bd8b2a54ab48016aaf4a03373a2da880a0dd6133a94c9a0b4dc96b2a21e07dba0cababbfeb13adbdebf