Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2024, 10:11
Static task
static1
Behavioral task
behavioral1
Sample
719b9202cd69eda18cd6a2d17cada298_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
719b9202cd69eda18cd6a2d17cada298_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
719b9202cd69eda18cd6a2d17cada298_JaffaCakes118.html
-
Size
36KB
-
MD5
719b9202cd69eda18cd6a2d17cada298
-
SHA1
12c7aba51fb241928ca729f8fd6a31086f9a313d
-
SHA256
50c8c9c7cbe8d192bff78f629d7de02706d5e5f229b1ab4d052d1e7025722169
-
SHA512
c439ba1f40302cd439efd3d33d8d2552e41127870141cdc58042a2fe20a84761c75b0bc3d9a56fb1866550a8aae71bd8e8a5472e579bb21e99282178b39244fa
-
SSDEEP
768:zwx/MDTH5h88hAR2ZPXZE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6TdwE6DJtxo6qLRj:Q/PbJxNVGuxS6/W81K
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2608 msedge.exe 2608 msedge.exe 1504 msedge.exe 1504 msedge.exe 4840 identity_helper.exe 4840 identity_helper.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1504 wrote to memory of 1448 1504 msedge.exe 82 PID 1504 wrote to memory of 1448 1504 msedge.exe 82 PID 1504 wrote to memory of 2380 1504 msedge.exe 85 PID 1504 wrote to memory of 2380 1504 msedge.exe 85 PID 1504 wrote to memory of 2380 1504 msedge.exe 85 PID 1504 wrote to memory of 2380 1504 msedge.exe 85 PID 1504 wrote to memory of 2380 1504 msedge.exe 85 PID 1504 wrote to memory of 2380 1504 msedge.exe 85 PID 1504 wrote to memory of 2380 1504 msedge.exe 85 PID 1504 wrote to memory of 2380 1504 msedge.exe 85 PID 1504 wrote to memory of 2380 1504 msedge.exe 85 PID 1504 wrote to memory of 2380 1504 msedge.exe 85 PID 1504 wrote to memory of 2380 1504 msedge.exe 85 PID 1504 wrote to memory of 2380 1504 msedge.exe 85 PID 1504 wrote to memory of 2380 1504 msedge.exe 85 PID 1504 wrote to memory of 2380 1504 msedge.exe 85 PID 1504 wrote to memory of 2380 1504 msedge.exe 85 PID 1504 wrote to memory of 2380 1504 msedge.exe 85 PID 1504 wrote to memory of 2380 1504 msedge.exe 85 PID 1504 wrote to memory of 2380 1504 msedge.exe 85 PID 1504 wrote to memory of 2380 1504 msedge.exe 85 PID 1504 wrote to memory of 2380 1504 msedge.exe 85 PID 1504 wrote to memory of 2380 1504 msedge.exe 85 PID 1504 wrote to memory of 2380 1504 msedge.exe 85 PID 1504 wrote to memory of 2380 1504 msedge.exe 85 PID 1504 wrote to memory of 2380 1504 msedge.exe 85 PID 1504 wrote to memory of 2380 1504 msedge.exe 85 PID 1504 wrote to memory of 2380 1504 msedge.exe 85 PID 1504 wrote to memory of 2380 1504 msedge.exe 85 PID 1504 wrote to memory of 2380 1504 msedge.exe 85 PID 1504 wrote to memory of 2380 1504 msedge.exe 85 PID 1504 wrote to memory of 2380 1504 msedge.exe 85 PID 1504 wrote to memory of 2380 1504 msedge.exe 85 PID 1504 wrote to memory of 2380 1504 msedge.exe 85 PID 1504 wrote to memory of 2380 1504 msedge.exe 85 PID 1504 wrote to memory of 2380 1504 msedge.exe 85 PID 1504 wrote to memory of 2380 1504 msedge.exe 85 PID 1504 wrote to memory of 2380 1504 msedge.exe 85 PID 1504 wrote to memory of 2380 1504 msedge.exe 85 PID 1504 wrote to memory of 2380 1504 msedge.exe 85 PID 1504 wrote to memory of 2380 1504 msedge.exe 85 PID 1504 wrote to memory of 2380 1504 msedge.exe 85 PID 1504 wrote to memory of 2608 1504 msedge.exe 86 PID 1504 wrote to memory of 2608 1504 msedge.exe 86 PID 1504 wrote to memory of 1532 1504 msedge.exe 87 PID 1504 wrote to memory of 1532 1504 msedge.exe 87 PID 1504 wrote to memory of 1532 1504 msedge.exe 87 PID 1504 wrote to memory of 1532 1504 msedge.exe 87 PID 1504 wrote to memory of 1532 1504 msedge.exe 87 PID 1504 wrote to memory of 1532 1504 msedge.exe 87 PID 1504 wrote to memory of 1532 1504 msedge.exe 87 PID 1504 wrote to memory of 1532 1504 msedge.exe 87 PID 1504 wrote to memory of 1532 1504 msedge.exe 87 PID 1504 wrote to memory of 1532 1504 msedge.exe 87 PID 1504 wrote to memory of 1532 1504 msedge.exe 87 PID 1504 wrote to memory of 1532 1504 msedge.exe 87 PID 1504 wrote to memory of 1532 1504 msedge.exe 87 PID 1504 wrote to memory of 1532 1504 msedge.exe 87 PID 1504 wrote to memory of 1532 1504 msedge.exe 87 PID 1504 wrote to memory of 1532 1504 msedge.exe 87 PID 1504 wrote to memory of 1532 1504 msedge.exe 87 PID 1504 wrote to memory of 1532 1504 msedge.exe 87 PID 1504 wrote to memory of 1532 1504 msedge.exe 87 PID 1504 wrote to memory of 1532 1504 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\719b9202cd69eda18cd6a2d17cada298_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8ad3946f8,0x7ff8ad394708,0x7ff8ad3947182⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,9370055448634481649,6195524728879312461,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,9370055448634481649,6195524728879312461,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,9370055448634481649,6195524728879312461,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:82⤵PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9370055448634481649,6195524728879312461,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9370055448634481649,6195524728879312461,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,9370055448634481649,6195524728879312461,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5444 /prefetch:82⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,9370055448634481649,6195524728879312461,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5444 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9370055448634481649,6195524728879312461,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9370055448634481649,6195524728879312461,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3908 /prefetch:12⤵PID:1496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9370055448634481649,6195524728879312461,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9370055448634481649,6195524728879312461,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4656 /prefetch:12⤵PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,9370055448634481649,6195524728879312461,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3876 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3248
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2952
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
614B
MD54742448b9759c30c0dbb45405ce91f00
SHA1adc057841df2d203eee200699b0b55763821985a
SHA256f92a2b97968f63acb3a814e17ba4fcf50206161d2d2989277bb3483d4b36ce3c
SHA512412b8764d940776231f34a52171d96ff067a878231de93d6cafa7e44df3a99fad56479bab9c98b9adc08a85db553e37c2e7ff51c3dd8e1d36457f26631c0bdf1
-
Filesize
5KB
MD5da165699536e494a162d8c6a4badd7ba
SHA169da0cc246d540938345c7ab8f9db206afe11ee1
SHA256dd41ebbe4652000147ddbc42fde4ce92a651145f5d85526d0b0db259a1b4bee9
SHA512bb5d9f7ba6e4e155cd425ecb95cd05c0c3612a33a2766c792c3197ccc18d9ec2121dc38e2e7fc889a25b7006cf9be5a9df626d48dcf82c8d3eafcc5e63dca663
-
Filesize
6KB
MD57a3688c0c1b11d593c2f01d675bac5a9
SHA1747d28129082356ee4aa919210d5053d71c7ef94
SHA256cde82c659180572232ac887f5518b35e172a55462c6f8173c77ce91511fdd745
SHA512e9205eb556f64d24b9d4a998b7f8e4a55962f6bb84ddfe418193fab2d70e5c7a58b6a982bd4514f999f624bda1c5c74657e618e2f8627414f306b3a10c3e733e
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5ae2866105f04648836d241ee70c14794
SHA15373c5d53ad811d37ac4503abfb972ef9bbe8ee7
SHA256a23975ec55ef41fb553ff162a8e29849836b6dcdba01e19015c678a8f5a32bf8
SHA512f637566e6088ef992c891daaea702a57539ee225cf3ee75dd29539741135942c3f4cfd7971195dc9dba05da92134e11e218336634a7bc4c49d032aead7c9828e