Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 07:58
Static task
static1
Behavioral task
behavioral1
Sample
668eded5858d4ba73bb104f8345bf72d_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
668eded5858d4ba73bb104f8345bf72d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
668eded5858d4ba73bb104f8345bf72d_JaffaCakes118.html
-
Size
4KB
-
MD5
668eded5858d4ba73bb104f8345bf72d
-
SHA1
b82264c79bcd5f196c29f796cac45dd934f4839c
-
SHA256
5a3e9a2ba549a51e5f14c8b7e4e78f0189454cdc82a591f2365712b06d130972
-
SHA512
7b0dc4d257ead5b7cac8a210036c2cb0d23ab2b304567dd34b4771c9c4a3ac8ebd791a6e4254520912a7d0c1d3bd415a8ae2fa9835d4f0e56973b93f4cf537cf
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oJFQOd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDe
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 768 msedge.exe 768 msedge.exe 2732 msedge.exe 2732 msedge.exe 3184 identity_helper.exe 3184 identity_helper.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2732 wrote to memory of 4624 2732 msedge.exe 82 PID 2732 wrote to memory of 4624 2732 msedge.exe 82 PID 2732 wrote to memory of 4224 2732 msedge.exe 83 PID 2732 wrote to memory of 4224 2732 msedge.exe 83 PID 2732 wrote to memory of 4224 2732 msedge.exe 83 PID 2732 wrote to memory of 4224 2732 msedge.exe 83 PID 2732 wrote to memory of 4224 2732 msedge.exe 83 PID 2732 wrote to memory of 4224 2732 msedge.exe 83 PID 2732 wrote to memory of 4224 2732 msedge.exe 83 PID 2732 wrote to memory of 4224 2732 msedge.exe 83 PID 2732 wrote to memory of 4224 2732 msedge.exe 83 PID 2732 wrote to memory of 4224 2732 msedge.exe 83 PID 2732 wrote to memory of 4224 2732 msedge.exe 83 PID 2732 wrote to memory of 4224 2732 msedge.exe 83 PID 2732 wrote to memory of 4224 2732 msedge.exe 83 PID 2732 wrote to memory of 4224 2732 msedge.exe 83 PID 2732 wrote to memory of 4224 2732 msedge.exe 83 PID 2732 wrote to memory of 4224 2732 msedge.exe 83 PID 2732 wrote to memory of 4224 2732 msedge.exe 83 PID 2732 wrote to memory of 4224 2732 msedge.exe 83 PID 2732 wrote to memory of 4224 2732 msedge.exe 83 PID 2732 wrote to memory of 4224 2732 msedge.exe 83 PID 2732 wrote to memory of 4224 2732 msedge.exe 83 PID 2732 wrote to memory of 4224 2732 msedge.exe 83 PID 2732 wrote to memory of 4224 2732 msedge.exe 83 PID 2732 wrote to memory of 4224 2732 msedge.exe 83 PID 2732 wrote to memory of 4224 2732 msedge.exe 83 PID 2732 wrote to memory of 4224 2732 msedge.exe 83 PID 2732 wrote to memory of 4224 2732 msedge.exe 83 PID 2732 wrote to memory of 4224 2732 msedge.exe 83 PID 2732 wrote to memory of 4224 2732 msedge.exe 83 PID 2732 wrote to memory of 4224 2732 msedge.exe 83 PID 2732 wrote to memory of 4224 2732 msedge.exe 83 PID 2732 wrote to memory of 4224 2732 msedge.exe 83 PID 2732 wrote to memory of 4224 2732 msedge.exe 83 PID 2732 wrote to memory of 4224 2732 msedge.exe 83 PID 2732 wrote to memory of 4224 2732 msedge.exe 83 PID 2732 wrote to memory of 4224 2732 msedge.exe 83 PID 2732 wrote to memory of 4224 2732 msedge.exe 83 PID 2732 wrote to memory of 4224 2732 msedge.exe 83 PID 2732 wrote to memory of 4224 2732 msedge.exe 83 PID 2732 wrote to memory of 4224 2732 msedge.exe 83 PID 2732 wrote to memory of 768 2732 msedge.exe 84 PID 2732 wrote to memory of 768 2732 msedge.exe 84 PID 2732 wrote to memory of 3944 2732 msedge.exe 85 PID 2732 wrote to memory of 3944 2732 msedge.exe 85 PID 2732 wrote to memory of 3944 2732 msedge.exe 85 PID 2732 wrote to memory of 3944 2732 msedge.exe 85 PID 2732 wrote to memory of 3944 2732 msedge.exe 85 PID 2732 wrote to memory of 3944 2732 msedge.exe 85 PID 2732 wrote to memory of 3944 2732 msedge.exe 85 PID 2732 wrote to memory of 3944 2732 msedge.exe 85 PID 2732 wrote to memory of 3944 2732 msedge.exe 85 PID 2732 wrote to memory of 3944 2732 msedge.exe 85 PID 2732 wrote to memory of 3944 2732 msedge.exe 85 PID 2732 wrote to memory of 3944 2732 msedge.exe 85 PID 2732 wrote to memory of 3944 2732 msedge.exe 85 PID 2732 wrote to memory of 3944 2732 msedge.exe 85 PID 2732 wrote to memory of 3944 2732 msedge.exe 85 PID 2732 wrote to memory of 3944 2732 msedge.exe 85 PID 2732 wrote to memory of 3944 2732 msedge.exe 85 PID 2732 wrote to memory of 3944 2732 msedge.exe 85 PID 2732 wrote to memory of 3944 2732 msedge.exe 85 PID 2732 wrote to memory of 3944 2732 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\668eded5858d4ba73bb104f8345bf72d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9e5e046f8,0x7ff9e5e04708,0x7ff9e5e047182⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2296,3401110564059666103,18057699019171757520,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2316 /prefetch:22⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2296,3401110564059666103,18057699019171757520,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2360 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2296,3401110564059666103,18057699019171757520,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:82⤵PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2296,3401110564059666103,18057699019171757520,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2296,3401110564059666103,18057699019171757520,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2296,3401110564059666103,18057699019171757520,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:82⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2296,3401110564059666103,18057699019171757520,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2296,3401110564059666103,18057699019171757520,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4892 /prefetch:12⤵PID:2532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2296,3401110564059666103,18057699019171757520,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:12⤵PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2296,3401110564059666103,18057699019171757520,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2296,3401110564059666103,18057699019171757520,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2296,3401110564059666103,18057699019171757520,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1456 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2416
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4532
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3256
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
292B
MD5b3256a50f1a8274569db44b843aafd17
SHA1c370987e74b995a6d5444e21130738b0115ddbf2
SHA256b72c9c6f4e5ac26ed18235f515de7af13238703e127642d7a86a6c99fa0a7a14
SHA512500fc94a5e622c65cc6e10b493b082c2cc9355912f6b2bbfa3bc10d4c7452d45a50168bdcdd5040b34f1eb1473ef820f309fa06222872a21f5b4c84c5bae7d41
-
Filesize
5KB
MD54adb1ac070048f6294c68b1a8d03426c
SHA114169b9b1e9b2869ee60d497ad47c83f7fe62355
SHA256daba8e7ee478a3f0df60ec063279689415c1b72b3351e58b7e0e024cba978247
SHA51280b5ea0678360e258a094cf19fb063f504c3d3aa5df3b48c32866005df7a1f95f847cbc2d9f339de37136c21d615d09a3b0a079d57411f39b8e3564df41c11a0
-
Filesize
6KB
MD59f9f0157e061ced14014fb6165cdeb20
SHA1e269edd88f884ec3d32734ebc7fd3692f7c6a706
SHA25645001992854c45d841afaef07859a0bb313f3de9e921166e45e343c7864798d6
SHA5127171420d177ca672936590f66430e7f5d8919c00a842f349522a72155e96c49f6d118d2f764097c6293e367218559fe4f06bd3aa6b9d9f0131e5903b90feecc9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e6ff9eeb731466e3cebce46b53cbf02f
SHA127e8efd354c580eb5c23f05d32c5afd78cb1abb6
SHA2568ecb5543d373fde93436342d13940fbf6a5a6d39a652afdffbe71a6d20b40e20
SHA51252957e6fe34077d3faf616b4788c0ca8dbb8836d559c42fd10226d0ab21f1433349f4b06e8f8cd84be045c6564b00aea5b92af53986252e9a59b893df272822b