Analysis
-
max time kernel
146s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 05:37
Static task
static1
Behavioral task
behavioral1
Sample
69e7b2abdf38a6774c950b0744b84ab4_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
69e7b2abdf38a6774c950b0744b84ab4_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
69e7b2abdf38a6774c950b0744b84ab4_JaffaCakes118.html
-
Size
23KB
-
MD5
69e7b2abdf38a6774c950b0744b84ab4
-
SHA1
9bf17a6d76d19caaff552a7a6c3221a3a70480c8
-
SHA256
52e34f1c92f558b82909b885deadec582eb3895a3a648f25484465170e4f3725
-
SHA512
56301bb0e300922aa81d9e0dcb243e1f9548621cc0f00c95875f0248895fe4db313e650b79b2b55d560da4eea4c286d75767a483c71fa93f8f440426b94b9b9a
-
SSDEEP
192:uwLvb5nVynQjxn5Q/snQie/Nn2RinQOkEntEGnQTbnNnQeGLnLnQtzqMBfqnYnQW:3Q/QRzGwd2Ny
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3532 msedge.exe 3532 msedge.exe 432 msedge.exe 432 msedge.exe 3136 identity_helper.exe 3136 identity_helper.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 432 wrote to memory of 1692 432 msedge.exe 83 PID 432 wrote to memory of 1692 432 msedge.exe 83 PID 432 wrote to memory of 948 432 msedge.exe 84 PID 432 wrote to memory of 948 432 msedge.exe 84 PID 432 wrote to memory of 948 432 msedge.exe 84 PID 432 wrote to memory of 948 432 msedge.exe 84 PID 432 wrote to memory of 948 432 msedge.exe 84 PID 432 wrote to memory of 948 432 msedge.exe 84 PID 432 wrote to memory of 948 432 msedge.exe 84 PID 432 wrote to memory of 948 432 msedge.exe 84 PID 432 wrote to memory of 948 432 msedge.exe 84 PID 432 wrote to memory of 948 432 msedge.exe 84 PID 432 wrote to memory of 948 432 msedge.exe 84 PID 432 wrote to memory of 948 432 msedge.exe 84 PID 432 wrote to memory of 948 432 msedge.exe 84 PID 432 wrote to memory of 948 432 msedge.exe 84 PID 432 wrote to memory of 948 432 msedge.exe 84 PID 432 wrote to memory of 948 432 msedge.exe 84 PID 432 wrote to memory of 948 432 msedge.exe 84 PID 432 wrote to memory of 948 432 msedge.exe 84 PID 432 wrote to memory of 948 432 msedge.exe 84 PID 432 wrote to memory of 948 432 msedge.exe 84 PID 432 wrote to memory of 948 432 msedge.exe 84 PID 432 wrote to memory of 948 432 msedge.exe 84 PID 432 wrote to memory of 948 432 msedge.exe 84 PID 432 wrote to memory of 948 432 msedge.exe 84 PID 432 wrote to memory of 948 432 msedge.exe 84 PID 432 wrote to memory of 948 432 msedge.exe 84 PID 432 wrote to memory of 948 432 msedge.exe 84 PID 432 wrote to memory of 948 432 msedge.exe 84 PID 432 wrote to memory of 948 432 msedge.exe 84 PID 432 wrote to memory of 948 432 msedge.exe 84 PID 432 wrote to memory of 948 432 msedge.exe 84 PID 432 wrote to memory of 948 432 msedge.exe 84 PID 432 wrote to memory of 948 432 msedge.exe 84 PID 432 wrote to memory of 948 432 msedge.exe 84 PID 432 wrote to memory of 948 432 msedge.exe 84 PID 432 wrote to memory of 948 432 msedge.exe 84 PID 432 wrote to memory of 948 432 msedge.exe 84 PID 432 wrote to memory of 948 432 msedge.exe 84 PID 432 wrote to memory of 948 432 msedge.exe 84 PID 432 wrote to memory of 948 432 msedge.exe 84 PID 432 wrote to memory of 3532 432 msedge.exe 85 PID 432 wrote to memory of 3532 432 msedge.exe 85 PID 432 wrote to memory of 2972 432 msedge.exe 86 PID 432 wrote to memory of 2972 432 msedge.exe 86 PID 432 wrote to memory of 2972 432 msedge.exe 86 PID 432 wrote to memory of 2972 432 msedge.exe 86 PID 432 wrote to memory of 2972 432 msedge.exe 86 PID 432 wrote to memory of 2972 432 msedge.exe 86 PID 432 wrote to memory of 2972 432 msedge.exe 86 PID 432 wrote to memory of 2972 432 msedge.exe 86 PID 432 wrote to memory of 2972 432 msedge.exe 86 PID 432 wrote to memory of 2972 432 msedge.exe 86 PID 432 wrote to memory of 2972 432 msedge.exe 86 PID 432 wrote to memory of 2972 432 msedge.exe 86 PID 432 wrote to memory of 2972 432 msedge.exe 86 PID 432 wrote to memory of 2972 432 msedge.exe 86 PID 432 wrote to memory of 2972 432 msedge.exe 86 PID 432 wrote to memory of 2972 432 msedge.exe 86 PID 432 wrote to memory of 2972 432 msedge.exe 86 PID 432 wrote to memory of 2972 432 msedge.exe 86 PID 432 wrote to memory of 2972 432 msedge.exe 86 PID 432 wrote to memory of 2972 432 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\69e7b2abdf38a6774c950b0744b84ab4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa3ad546f8,0x7ffa3ad54708,0x7ffa3ad547182⤵PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,6433033530834914556,2323808943486391303,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2016,6433033530834914556,2323808943486391303,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2016,6433033530834914556,2323808943486391303,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,6433033530834914556,2323808943486391303,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,6433033530834914556,2323808943486391303,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,6433033530834914556,2323808943486391303,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 /prefetch:82⤵PID:716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,6433033530834914556,2323808943486391303,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,6433033530834914556,2323808943486391303,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,6433033530834914556,2323808943486391303,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:12⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,6433033530834914556,2323808943486391303,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,6433033530834914556,2323808943486391303,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3940 /prefetch:12⤵PID:896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,6433033530834914556,2323808943486391303,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4924 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:940
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5116
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2504
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
5KB
MD5cf2d50cac9393a0fbb5e3af093f3b4ce
SHA1a9045621bf91029a1c1b5079aa49d3ba2f384c83
SHA25604d93f2a9f12b4d154b22f465b153f7d51040146d7cc8be46bf67ae9f6422d30
SHA512009066e6a88ac1c04e3d75607f2b6b4e7918e278cef152250bb7892cd0da10910f84c1a5d18e1981b61a1ba8773f62231a5c4a3f7689b5088cbc91783639ee6c
-
Filesize
6KB
MD51d8a7ad847e1245b670ee2b9576e0e4f
SHA14b50192b34df7fc331a7af71d04987bc3c097568
SHA256d87e7efbfb77a43fc39ba6fb780f0d22741738993cb57107a60fdf22fdd4e2ed
SHA5129e438a0943bfc22ac10802db116806933e19c55edee2197e4ee912861ea156f825b0eeddbc245e6acd82e089eefe986d77805d4346a597f92e297956c9350157
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d8f20503d07019c7d91d6354eb9d20a0
SHA16ec22e130416de85ac4c541b20eb02c33abf451b
SHA256b939ca149becb349afd3654d371948a88b9d16665756bf5f8c8669d16ab40547
SHA512def4ff49cb6f2b5fadfd78c95534e393508861f664ee7de1042542b59ee73870055d0b2cbc3ed8d9ed2948dcc6d781536d95e9e99bd432965a9393ad8a810f5e