Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2024, 13:13
Static task
static1
Behavioral task
behavioral1
Sample
675f3881ed08fb95d6031a8a108b46cc_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
675f3881ed08fb95d6031a8a108b46cc_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
675f3881ed08fb95d6031a8a108b46cc_JaffaCakes118.html
-
Size
132KB
-
MD5
675f3881ed08fb95d6031a8a108b46cc
-
SHA1
85f13d52451c1b3e587a12d79d6f8905b84f2139
-
SHA256
27ce2f412d5b9489394cc3df65c4c69ab23e3f10c8a75889778c37285094120f
-
SHA512
de32623235eae2e87765b43190e2f44a930f1488d37186ae77bfcd9ef91929153090adfe677e746e26bfbdc8cc44aaf705462074f6f986eb41c6a72469cf8df4
-
SSDEEP
1536:pqDohUooppWWBBkkaazzKKII66MMKKlljjFFNNllQQHHQQjjEECChh66xxxx++BS:ADoF
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1100 msedge.exe 1100 msedge.exe 3500 msedge.exe 3500 msedge.exe 4516 identity_helper.exe 4516 identity_helper.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3500 wrote to memory of 1228 3500 msedge.exe 82 PID 3500 wrote to memory of 1228 3500 msedge.exe 82 PID 3500 wrote to memory of 3484 3500 msedge.exe 83 PID 3500 wrote to memory of 3484 3500 msedge.exe 83 PID 3500 wrote to memory of 3484 3500 msedge.exe 83 PID 3500 wrote to memory of 3484 3500 msedge.exe 83 PID 3500 wrote to memory of 3484 3500 msedge.exe 83 PID 3500 wrote to memory of 3484 3500 msedge.exe 83 PID 3500 wrote to memory of 3484 3500 msedge.exe 83 PID 3500 wrote to memory of 3484 3500 msedge.exe 83 PID 3500 wrote to memory of 3484 3500 msedge.exe 83 PID 3500 wrote to memory of 3484 3500 msedge.exe 83 PID 3500 wrote to memory of 3484 3500 msedge.exe 83 PID 3500 wrote to memory of 3484 3500 msedge.exe 83 PID 3500 wrote to memory of 3484 3500 msedge.exe 83 PID 3500 wrote to memory of 3484 3500 msedge.exe 83 PID 3500 wrote to memory of 3484 3500 msedge.exe 83 PID 3500 wrote to memory of 3484 3500 msedge.exe 83 PID 3500 wrote to memory of 3484 3500 msedge.exe 83 PID 3500 wrote to memory of 3484 3500 msedge.exe 83 PID 3500 wrote to memory of 3484 3500 msedge.exe 83 PID 3500 wrote to memory of 3484 3500 msedge.exe 83 PID 3500 wrote to memory of 3484 3500 msedge.exe 83 PID 3500 wrote to memory of 3484 3500 msedge.exe 83 PID 3500 wrote to memory of 3484 3500 msedge.exe 83 PID 3500 wrote to memory of 3484 3500 msedge.exe 83 PID 3500 wrote to memory of 3484 3500 msedge.exe 83 PID 3500 wrote to memory of 3484 3500 msedge.exe 83 PID 3500 wrote to memory of 3484 3500 msedge.exe 83 PID 3500 wrote to memory of 3484 3500 msedge.exe 83 PID 3500 wrote to memory of 3484 3500 msedge.exe 83 PID 3500 wrote to memory of 3484 3500 msedge.exe 83 PID 3500 wrote to memory of 3484 3500 msedge.exe 83 PID 3500 wrote to memory of 3484 3500 msedge.exe 83 PID 3500 wrote to memory of 3484 3500 msedge.exe 83 PID 3500 wrote to memory of 3484 3500 msedge.exe 83 PID 3500 wrote to memory of 3484 3500 msedge.exe 83 PID 3500 wrote to memory of 3484 3500 msedge.exe 83 PID 3500 wrote to memory of 3484 3500 msedge.exe 83 PID 3500 wrote to memory of 3484 3500 msedge.exe 83 PID 3500 wrote to memory of 3484 3500 msedge.exe 83 PID 3500 wrote to memory of 3484 3500 msedge.exe 83 PID 3500 wrote to memory of 1100 3500 msedge.exe 84 PID 3500 wrote to memory of 1100 3500 msedge.exe 84 PID 3500 wrote to memory of 3124 3500 msedge.exe 85 PID 3500 wrote to memory of 3124 3500 msedge.exe 85 PID 3500 wrote to memory of 3124 3500 msedge.exe 85 PID 3500 wrote to memory of 3124 3500 msedge.exe 85 PID 3500 wrote to memory of 3124 3500 msedge.exe 85 PID 3500 wrote to memory of 3124 3500 msedge.exe 85 PID 3500 wrote to memory of 3124 3500 msedge.exe 85 PID 3500 wrote to memory of 3124 3500 msedge.exe 85 PID 3500 wrote to memory of 3124 3500 msedge.exe 85 PID 3500 wrote to memory of 3124 3500 msedge.exe 85 PID 3500 wrote to memory of 3124 3500 msedge.exe 85 PID 3500 wrote to memory of 3124 3500 msedge.exe 85 PID 3500 wrote to memory of 3124 3500 msedge.exe 85 PID 3500 wrote to memory of 3124 3500 msedge.exe 85 PID 3500 wrote to memory of 3124 3500 msedge.exe 85 PID 3500 wrote to memory of 3124 3500 msedge.exe 85 PID 3500 wrote to memory of 3124 3500 msedge.exe 85 PID 3500 wrote to memory of 3124 3500 msedge.exe 85 PID 3500 wrote to memory of 3124 3500 msedge.exe 85 PID 3500 wrote to memory of 3124 3500 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\675f3881ed08fb95d6031a8a108b46cc_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd521f46f8,0x7ffd521f4708,0x7ffd521f47182⤵PID:1228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,11950582235398574294,2724188896242222114,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,11950582235398574294,2724188896242222114,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2476 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,11950582235398574294,2724188896242222114,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,11950582235398574294,2724188896242222114,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,11950582235398574294,2724188896242222114,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,11950582235398574294,2724188896242222114,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5432 /prefetch:82⤵PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,11950582235398574294,2724188896242222114,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5432 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,11950582235398574294,2724188896242222114,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,11950582235398574294,2724188896242222114,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,11950582235398574294,2724188896242222114,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4076 /prefetch:12⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,11950582235398574294,2724188896242222114,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,11950582235398574294,2724188896242222114,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4840 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2488
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1124
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
191B
MD56bb0e1d8bab7ce211a058d8817f73035
SHA1125a3b2a1187f2f70351cfc97c8b88d4094ef05e
SHA256ff92bc2ea67f586d5de3bf6d0d22651fbc091b1e6fe822a8f003df5e1d27e888
SHA512b592ad470dfe2cad76587bfef3afab3dcfa836d00a33cf7a134fec0f3de77c86e27f225e1d2a40be27a1c3ef662e83fa510052c1dde824d2d510ec25a8c18533
-
Filesize
5KB
MD5c9d28969779a3f8c2cb26b3815a782f4
SHA174630dcce97f1eb4de3ca232ffbafacd4e13b8a7
SHA2568eb54b084442b7a7561881c07948aafb4689ba56cc61ae253acb8edddc1350e5
SHA512628ea5796342056531e2e83accd833835ec6bbe28669eb40aa9d7e52675fdd093d2a806ed4efaf74e35d57a0d741c863334a8374041c9298f72267e95b6f1147
-
Filesize
6KB
MD5c250caffeccf762ac77404d07e3a20aa
SHA132e3a9953f4c056335ae153f26258cbab02822fa
SHA256e880aca05c1232c6b53ff522078552b81febb1090687641798b6c8f3df25141f
SHA5129a3d6107d03f8b546884bfe7df9a059b28a3293ce100201a4cb89814139a85c30c59b6e963bd636f0024589f990a382c4dce65826beb47021312b06821ce659a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51392ac248fdab1b93ef579d92fc3a243
SHA11adda61e2aa50973bc5430d5982bdde6ccaedeb2
SHA2560b919f1ee7b0dc45a2898333ed24d55295c36157b946759aa0e1243367bec915
SHA51203333327afacaa39423a4c44fa690b8d4068b7eeb8c9b8de17f6695bd6f54ed80e18e247b49a8982691176dd367564ffede7f216a2670ebbbbb46068db97d549