Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2024, 03:41
Static task
static1
Behavioral task
behavioral1
Sample
70bfae7a683778ebc242a3e140f9918a_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
70bfae7a683778ebc242a3e140f9918a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
70bfae7a683778ebc242a3e140f9918a_JaffaCakes118.html
-
Size
36KB
-
MD5
70bfae7a683778ebc242a3e140f9918a
-
SHA1
42d57eacc01e7a1e94aefa920e9254d6a3898c0c
-
SHA256
45b36b35fc4835e47c9685b83e992c3c2a596f40de12a3dee29d4cb7cf41385b
-
SHA512
96248406aec66217f669f9018d2ca22d3b0789997f88eaeb3bc2bbc4681ddebc9a1688d2c5231b5a2bd69658259b81637617be22301e59225339915d462b63be
-
SSDEEP
768:zwx/MDTHV988hAROZPXRE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6TIZOf6sggf6lLR0:Q/7bJxNVNu0Sx/P8bK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1028 msedge.exe 1028 msedge.exe 436 msedge.exe 436 msedge.exe 624 identity_helper.exe 624 identity_helper.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 436 wrote to memory of 4636 436 msedge.exe 86 PID 436 wrote to memory of 4636 436 msedge.exe 86 PID 436 wrote to memory of 4604 436 msedge.exe 88 PID 436 wrote to memory of 4604 436 msedge.exe 88 PID 436 wrote to memory of 4604 436 msedge.exe 88 PID 436 wrote to memory of 4604 436 msedge.exe 88 PID 436 wrote to memory of 4604 436 msedge.exe 88 PID 436 wrote to memory of 4604 436 msedge.exe 88 PID 436 wrote to memory of 4604 436 msedge.exe 88 PID 436 wrote to memory of 4604 436 msedge.exe 88 PID 436 wrote to memory of 4604 436 msedge.exe 88 PID 436 wrote to memory of 4604 436 msedge.exe 88 PID 436 wrote to memory of 4604 436 msedge.exe 88 PID 436 wrote to memory of 4604 436 msedge.exe 88 PID 436 wrote to memory of 4604 436 msedge.exe 88 PID 436 wrote to memory of 4604 436 msedge.exe 88 PID 436 wrote to memory of 4604 436 msedge.exe 88 PID 436 wrote to memory of 4604 436 msedge.exe 88 PID 436 wrote to memory of 4604 436 msedge.exe 88 PID 436 wrote to memory of 4604 436 msedge.exe 88 PID 436 wrote to memory of 4604 436 msedge.exe 88 PID 436 wrote to memory of 4604 436 msedge.exe 88 PID 436 wrote to memory of 4604 436 msedge.exe 88 PID 436 wrote to memory of 4604 436 msedge.exe 88 PID 436 wrote to memory of 4604 436 msedge.exe 88 PID 436 wrote to memory of 4604 436 msedge.exe 88 PID 436 wrote to memory of 4604 436 msedge.exe 88 PID 436 wrote to memory of 4604 436 msedge.exe 88 PID 436 wrote to memory of 4604 436 msedge.exe 88 PID 436 wrote to memory of 4604 436 msedge.exe 88 PID 436 wrote to memory of 4604 436 msedge.exe 88 PID 436 wrote to memory of 4604 436 msedge.exe 88 PID 436 wrote to memory of 4604 436 msedge.exe 88 PID 436 wrote to memory of 4604 436 msedge.exe 88 PID 436 wrote to memory of 4604 436 msedge.exe 88 PID 436 wrote to memory of 4604 436 msedge.exe 88 PID 436 wrote to memory of 4604 436 msedge.exe 88 PID 436 wrote to memory of 4604 436 msedge.exe 88 PID 436 wrote to memory of 4604 436 msedge.exe 88 PID 436 wrote to memory of 4604 436 msedge.exe 88 PID 436 wrote to memory of 4604 436 msedge.exe 88 PID 436 wrote to memory of 4604 436 msedge.exe 88 PID 436 wrote to memory of 1028 436 msedge.exe 89 PID 436 wrote to memory of 1028 436 msedge.exe 89 PID 436 wrote to memory of 4308 436 msedge.exe 90 PID 436 wrote to memory of 4308 436 msedge.exe 90 PID 436 wrote to memory of 4308 436 msedge.exe 90 PID 436 wrote to memory of 4308 436 msedge.exe 90 PID 436 wrote to memory of 4308 436 msedge.exe 90 PID 436 wrote to memory of 4308 436 msedge.exe 90 PID 436 wrote to memory of 4308 436 msedge.exe 90 PID 436 wrote to memory of 4308 436 msedge.exe 90 PID 436 wrote to memory of 4308 436 msedge.exe 90 PID 436 wrote to memory of 4308 436 msedge.exe 90 PID 436 wrote to memory of 4308 436 msedge.exe 90 PID 436 wrote to memory of 4308 436 msedge.exe 90 PID 436 wrote to memory of 4308 436 msedge.exe 90 PID 436 wrote to memory of 4308 436 msedge.exe 90 PID 436 wrote to memory of 4308 436 msedge.exe 90 PID 436 wrote to memory of 4308 436 msedge.exe 90 PID 436 wrote to memory of 4308 436 msedge.exe 90 PID 436 wrote to memory of 4308 436 msedge.exe 90 PID 436 wrote to memory of 4308 436 msedge.exe 90 PID 436 wrote to memory of 4308 436 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\70bfae7a683778ebc242a3e140f9918a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xd8,0x10c,0x7ffbe6c446f8,0x7ffbe6c44708,0x7ffbe6c447182⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,9687278615101975480,5099160911665900376,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,9687278615101975480,5099160911665900376,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,9687278615101975480,5099160911665900376,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,9687278615101975480,5099160911665900376,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,9687278615101975480,5099160911665900376,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,9687278615101975480,5099160911665900376,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 /prefetch:82⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,9687278615101975480,5099160911665900376,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,9687278615101975480,5099160911665900376,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4100 /prefetch:12⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,9687278615101975480,5099160911665900376,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,9687278615101975480,5099160911665900376,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4080 /prefetch:12⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,9687278615101975480,5099160911665900376,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3496 /prefetch:12⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,9687278615101975480,5099160911665900376,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1924 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3720
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1960
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5d39ae434bb07f58037ce26a5b14f2bcd
SHA13f8d2627290d0aa3b7859f1f3fc263de6cc71383
SHA256a08690dbde9629f1fa1757911d4263806bc08fff7015e8c0dfebabfd18ae8e72
SHA5126252706b4d189bd27b4cd116b8675db6264fda6984e7805df26e945c2c0c3ea9d8058d8d84bdcba6c70ac99acb2206ee04ec2ec33c5dfb55e367cf21fd6d3f83
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\6c061a47-161e-40a9-8761-cf6caa005c9a.tmp
Filesize6KB
MD526107bf14d957d8ed692c1abd5fe4b1c
SHA1ea6ed1996652f004031bbe69059d6bf850a2defb
SHA2569cdd3985ff6ba4bf5f0a1727ec5177d2f9168dbca4329c92e930e58a26bf2228
SHA512e9656897a193cf93aa9de440396ec638d7f0cbacbc5698545e26d37b6c7811ae78f709b41a4a3a84a072cf57a25d31d04d11d6ec7e1e09c37b5aeca382b0aa49
-
Filesize
614B
MD52882aaeac7f887b42a154de9fce19934
SHA1069fe8dca4e36953ac102509bab23050f8cd29b8
SHA256152ca7be26fab4549dbf120b9a6b0f6786c13982704156ed05de7d31fa153673
SHA512242ac696289d49500b882ba508c2bee2c64609b37e2a5e6aafeaaf1475d682119a369d54b619d334d2578bcf0e3a7b279f1aec6779e1d54582de8d389c771ddb
-
Filesize
6KB
MD589884f1e9737e7a7202d7a777cedf80e
SHA1874cef8d642bcbd9894ee461e5ebe5c38a1b9ee9
SHA2567740569e0a63585e17acd446f390564044303344a0b12791c8f3b657e65bd137
SHA512d7b3fec1c219160a90a9248f4bbaf864b47550ea25b2a303a7bb55856e78a12357b3b3ac6b55ee856977edd152950b72da6d8242b926e2e0c71b5849f710dd58
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389