Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2024, 00:29
Static task
static1
Behavioral task
behavioral1
Sample
704a81089dd716e7823a42a97bb33dfe_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
704a81089dd716e7823a42a97bb33dfe_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
704a81089dd716e7823a42a97bb33dfe_JaffaCakes118.html
-
Size
12KB
-
MD5
704a81089dd716e7823a42a97bb33dfe
-
SHA1
4ee9efdfda047039567680a66dc1761d3acf914c
-
SHA256
8605a3a7314cda09c1773a59b26225d428350cdb038ee9e6d5bc0bcc8028d11c
-
SHA512
141c67f5b1de7ce9c2167036bd237c6080fb109c96386c948f02f25422dab0f250a59a126d4c7f277f4c9ab61be718431fcd913cbafa045f575481b2496a76d6
-
SSDEEP
192:FiBuOFkIdf8Ri9o2gM3kMEVmqsvtx3pxGNizXaILWqQNg5A:8lci9o2Tk7QqsvthXGpILWqQNg5A
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1164 msedge.exe 1164 msedge.exe 2016 msedge.exe 2016 msedge.exe 1456 identity_helper.exe 1456 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2016 wrote to memory of 3664 2016 msedge.exe 82 PID 2016 wrote to memory of 3664 2016 msedge.exe 82 PID 2016 wrote to memory of 216 2016 msedge.exe 83 PID 2016 wrote to memory of 216 2016 msedge.exe 83 PID 2016 wrote to memory of 216 2016 msedge.exe 83 PID 2016 wrote to memory of 216 2016 msedge.exe 83 PID 2016 wrote to memory of 216 2016 msedge.exe 83 PID 2016 wrote to memory of 216 2016 msedge.exe 83 PID 2016 wrote to memory of 216 2016 msedge.exe 83 PID 2016 wrote to memory of 216 2016 msedge.exe 83 PID 2016 wrote to memory of 216 2016 msedge.exe 83 PID 2016 wrote to memory of 216 2016 msedge.exe 83 PID 2016 wrote to memory of 216 2016 msedge.exe 83 PID 2016 wrote to memory of 216 2016 msedge.exe 83 PID 2016 wrote to memory of 216 2016 msedge.exe 83 PID 2016 wrote to memory of 216 2016 msedge.exe 83 PID 2016 wrote to memory of 216 2016 msedge.exe 83 PID 2016 wrote to memory of 216 2016 msedge.exe 83 PID 2016 wrote to memory of 216 2016 msedge.exe 83 PID 2016 wrote to memory of 216 2016 msedge.exe 83 PID 2016 wrote to memory of 216 2016 msedge.exe 83 PID 2016 wrote to memory of 216 2016 msedge.exe 83 PID 2016 wrote to memory of 216 2016 msedge.exe 83 PID 2016 wrote to memory of 216 2016 msedge.exe 83 PID 2016 wrote to memory of 216 2016 msedge.exe 83 PID 2016 wrote to memory of 216 2016 msedge.exe 83 PID 2016 wrote to memory of 216 2016 msedge.exe 83 PID 2016 wrote to memory of 216 2016 msedge.exe 83 PID 2016 wrote to memory of 216 2016 msedge.exe 83 PID 2016 wrote to memory of 216 2016 msedge.exe 83 PID 2016 wrote to memory of 216 2016 msedge.exe 83 PID 2016 wrote to memory of 216 2016 msedge.exe 83 PID 2016 wrote to memory of 216 2016 msedge.exe 83 PID 2016 wrote to memory of 216 2016 msedge.exe 83 PID 2016 wrote to memory of 216 2016 msedge.exe 83 PID 2016 wrote to memory of 216 2016 msedge.exe 83 PID 2016 wrote to memory of 216 2016 msedge.exe 83 PID 2016 wrote to memory of 216 2016 msedge.exe 83 PID 2016 wrote to memory of 216 2016 msedge.exe 83 PID 2016 wrote to memory of 216 2016 msedge.exe 83 PID 2016 wrote to memory of 216 2016 msedge.exe 83 PID 2016 wrote to memory of 216 2016 msedge.exe 83 PID 2016 wrote to memory of 1164 2016 msedge.exe 84 PID 2016 wrote to memory of 1164 2016 msedge.exe 84 PID 2016 wrote to memory of 3392 2016 msedge.exe 85 PID 2016 wrote to memory of 3392 2016 msedge.exe 85 PID 2016 wrote to memory of 3392 2016 msedge.exe 85 PID 2016 wrote to memory of 3392 2016 msedge.exe 85 PID 2016 wrote to memory of 3392 2016 msedge.exe 85 PID 2016 wrote to memory of 3392 2016 msedge.exe 85 PID 2016 wrote to memory of 3392 2016 msedge.exe 85 PID 2016 wrote to memory of 3392 2016 msedge.exe 85 PID 2016 wrote to memory of 3392 2016 msedge.exe 85 PID 2016 wrote to memory of 3392 2016 msedge.exe 85 PID 2016 wrote to memory of 3392 2016 msedge.exe 85 PID 2016 wrote to memory of 3392 2016 msedge.exe 85 PID 2016 wrote to memory of 3392 2016 msedge.exe 85 PID 2016 wrote to memory of 3392 2016 msedge.exe 85 PID 2016 wrote to memory of 3392 2016 msedge.exe 85 PID 2016 wrote to memory of 3392 2016 msedge.exe 85 PID 2016 wrote to memory of 3392 2016 msedge.exe 85 PID 2016 wrote to memory of 3392 2016 msedge.exe 85 PID 2016 wrote to memory of 3392 2016 msedge.exe 85 PID 2016 wrote to memory of 3392 2016 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\704a81089dd716e7823a42a97bb33dfe_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc8b8946f8,0x7ffc8b894708,0x7ffc8b8947182⤵PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1988,6712332081675083354,7507711650443174789,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2024 /prefetch:22⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1988,6712332081675083354,7507711650443174789,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1988,6712332081675083354,7507711650443174789,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,6712332081675083354,7507711650443174789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,6712332081675083354,7507711650443174789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1988,6712332081675083354,7507711650443174789,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5464 /prefetch:82⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1988,6712332081675083354,7507711650443174789,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5464 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,6712332081675083354,7507711650443174789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,6712332081675083354,7507711650443174789,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4068 /prefetch:12⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,6712332081675083354,7507711650443174789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,6712332081675083354,7507711650443174789,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,6712332081675083354,7507711650443174789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,6712332081675083354,7507711650443174789,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4072 /prefetch:12⤵PID:4664
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2764
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
386B
MD5d471da3032f007f6891b72906ffeb0cc
SHA1fabed58dbc682ac9cf9736eb02659f0216d9f430
SHA256464d823450e88cbae1a2c90bee7e2c09ea4a9f5a1c8f9eb27bfda7f7e26d23ce
SHA512906b3afc386f06c78d398a11a0d283da0c34de05c3b742462008ef2a755484ea1d5373ee82635e2f68e6ecf111038fd6c3b6a00842dea3cf2823a817893619f4
-
Filesize
6KB
MD5864f55ff9878a6a06f3a4b944c6ff49a
SHA1f93a05e8c74afa73f9b076a0b140e681f0d7bc7e
SHA256b95d4df5d47b1622b1ecb3fbefd869c6b521c75102dc219251dd25b28938c52b
SHA512b5df7ecfae5019fc78867149ca4e7018e8319a3b8d5fdb1edcc55910e49e83b6a4c7549057e14ef60e03642b5701690ecb875640d9e21fb067f267792ef768de
-
Filesize
5KB
MD58e9c792e3536de1b18c8301a41e0a176
SHA1f548691e568b40eace99c6a6f9cf010b23b61529
SHA2563bcfab03932ccee44458656765cd98657926c8c481e25ba55e532e2e17e852e0
SHA5127702129eb4d045997e9594beed3720100ad692546882c870da420e0db28194f11cbb5dd92297ac12fe058193624990e563d74773151ece37e9da5f4d10de92b0
-
Filesize
6KB
MD52932bfbfe318a3bb59dc41bd2cf16431
SHA13c01d9e68f9514368bad3569ddc20f781bfcf8ec
SHA25640b5425e12ad1952d15291b0f2b0e8b3339e94f5dd1a772a1aecc038f9320be2
SHA512a016a22d0a5607309e51c1b5f86c8d0caa69d9102371c9eb5869ccd15a6d70aa1817003d0f4fd2f64e9fe547559b09d3b765f1c72c9fc456fd8affe34ea0ff8e
-
Filesize
6KB
MD57d21e2debd331ae2214370a502e4a385
SHA14debf0dd2c9a8666773b520cbb1f659d6a2b49ef
SHA2562a2365f07a28fff164a5727790dd0aba215f9f027251a8cf4e04ed18ed1cb62c
SHA512890671c6268ecb8b225572a24a4feb6e7984801f3ff082004c1a3e04e903f58da075a35fc9ed7509dccac4ffcfbd215cf8d99718b2f76c98b199d7c380924789
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58ba9c18c68a8c3d870bb346871c18ba5
SHA1d4ac201399a758d8350dcc289a8b9a0f837d8512
SHA256a33ef853438c198785b33dd45073ffa6c9daca8757125f4ae41241054e8fa025
SHA512479b9ae980e7e7a43489b06bc7fcf056e1c225ccdcaf5ae40f988bd7b97395a8a22b3241e969004c5f2da98949df58809cd249059de597966aea170120b5ee5b
-
Filesize
12KB
MD5ee7eaf5dfb23bcb424ecc0c74913b4c9
SHA11b1b331583bb9bd793df05bf81fdd14aea625a97
SHA25657195e32d831c5fcc68c5fdf4af3405a3325285a5ef6a2dcf4c9eab5cf4484d6
SHA5123c7d8f13be82ca3b0eefa6bb0ee871991ca59431a82259c13516858916c2edc8b49be3784ef4466f1b2f01670e0df34a50032129d4a1c17f9ad57242dc823563