Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 23:04
Static task
static1
Behavioral task
behavioral1
Sample
738b17aaa00437a8548c5edeea552ca8_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
738b17aaa00437a8548c5edeea552ca8_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
738b17aaa00437a8548c5edeea552ca8_JaffaCakes118.html
-
Size
158KB
-
MD5
738b17aaa00437a8548c5edeea552ca8
-
SHA1
3917df86215762d81536341a8900bc3d8bdc67ee
-
SHA256
c47ae33c79ee25812b111aeda04c911d5ba081be081eff68c8431193880419f5
-
SHA512
747e248835a2935714fa2ee4ae10e72debcce65372efcfda09a8b1d471636a924f38fe6dcb311abaa5379e366f9bd111bf690fa8b8ac78fdb7e776d675cbeaf2
-
SSDEEP
1536:iPRTQK0PE702vapiyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3om:ihXNWiyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exemsedge.exeidentity_helper.exepid process 1880 msedge.exe 1880 msedge.exe 1324 msedge.exe 1324 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 2392 identity_helper.exe 2392 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1324 wrote to memory of 3172 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 3172 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 5044 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 5044 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 5044 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 5044 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 5044 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 5044 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 5044 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 5044 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 5044 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 5044 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 5044 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 5044 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 5044 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 5044 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 5044 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 5044 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 5044 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 5044 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 5044 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 5044 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 5044 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 5044 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 5044 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 5044 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 5044 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 5044 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 5044 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 5044 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 5044 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 5044 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 5044 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 5044 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 5044 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 5044 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 5044 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 5044 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 5044 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 5044 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 5044 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 5044 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 1880 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 1880 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 4464 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 4464 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 4464 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 4464 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 4464 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 4464 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 4464 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 4464 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 4464 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 4464 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 4464 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 4464 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 4464 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 4464 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 4464 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 4464 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 4464 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 4464 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 4464 1324 msedge.exe msedge.exe PID 1324 wrote to memory of 4464 1324 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\738b17aaa00437a8548c5edeea552ca8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffea6ed46f8,0x7ffea6ed4708,0x7ffea6ed47182⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,10133431603281280165,12921934786482608666,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,10133431603281280165,12921934786482608666,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,10133431603281280165,12921934786482608666,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2556 /prefetch:82⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,10133431603281280165,12921934786482608666,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,10133431603281280165,12921934786482608666,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,10133431603281280165,12921934786482608666,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1732 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,10133431603281280165,12921934786482608666,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6124 /prefetch:82⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,10133431603281280165,12921934786482608666,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6124 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,10133431603281280165,12921934786482608666,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4024 /prefetch:12⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,10133431603281280165,12921934786482608666,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6104 /prefetch:12⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,10133431603281280165,12921934786482608666,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5852 /prefetch:12⤵PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,10133431603281280165,12921934786482608666,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5900 /prefetch:12⤵PID:3284
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3656
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:632
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD53c65613c76019d0fc0d6971b1457a4b8
SHA1ddbfcdad103be80e88aa826db9a2006f802baa87
SHA256188f3e8d5901450a563c4febc0dacef19198335480cd53916fb3218d09c72461
SHA5127b08b5e706220d420f7e56fcf1c9a5690811cea605571669ab545683dbcb47960beb879fa63ec4ff8c5971885b470a4a137893f9cdf9a689caf41f7a64a93384
-
Filesize
6KB
MD58a77d623a891fd48007999f36918170b
SHA1c07822cc8505a5d89a40661d301ab6e3d6a31751
SHA2569e70cdc6ca37f724ed6704d815338b9e39cda0dfd7eed04439a2841deb364fa4
SHA512f5f7e56aeee605e70588a4fba2fc7283bf4bb4fc46ae654a8f8af02ee0b49d174839dfcc9bef23e9198abd8e0e8bc09670a89529a36e4a61a99ee954f71fd329
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58fa3dd7e69ebaa781818ce7f04c9fd56
SHA1de1c18159a4b1f136a278c04c0eab2fa6b206486
SHA256fa2a598c19243fda5d072b1efcb1b846c92a624e4d9a42f23bf4730960ccd15e
SHA512b557d10bfa9cf098d1ad7489ce8e002a08029850d8ffe83ad909f7ea401750a66dfc3cbb7e8ad1dc131c57b08477ce70862bf1bb57fd2cc0e8898c78c847a7d8
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e