Analysis
-
max time kernel
147s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2024, 13:51
Static task
static1
Behavioral task
behavioral1
Sample
722ba024a5bb940f1e0ac3858921203f_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
722ba024a5bb940f1e0ac3858921203f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
722ba024a5bb940f1e0ac3858921203f_JaffaCakes118.html
-
Size
461KB
-
MD5
722ba024a5bb940f1e0ac3858921203f
-
SHA1
975e97a29ab922ec0e7fe759c4e87222a00e6b69
-
SHA256
174935a166533a2c70edfcc83fa54b53a3c4f89ce5fa7841ae116ef9a9e9932b
-
SHA512
6df70dd09e962aaa8382a3694e63e561bcd9dd483fba7ab3f31ce75564f9dfacd3e8e5e12fa2ce3033617e3948d21bbe67b66f127fd8c14f83a743a4593680d9
-
SSDEEP
6144:SEsMYod+X3oI+YWzQtsMYod+X3oI+YAsMYod+X3oI+YLsMYod+X3oI+YQ:B5d+X3/5d+X345d+X315d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4744 msedge.exe 4744 msedge.exe 512 msedge.exe 512 msedge.exe 1588 identity_helper.exe 1588 identity_helper.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 512 wrote to memory of 2372 512 msedge.exe 83 PID 512 wrote to memory of 2372 512 msedge.exe 83 PID 512 wrote to memory of 4336 512 msedge.exe 84 PID 512 wrote to memory of 4336 512 msedge.exe 84 PID 512 wrote to memory of 4336 512 msedge.exe 84 PID 512 wrote to memory of 4336 512 msedge.exe 84 PID 512 wrote to memory of 4336 512 msedge.exe 84 PID 512 wrote to memory of 4336 512 msedge.exe 84 PID 512 wrote to memory of 4336 512 msedge.exe 84 PID 512 wrote to memory of 4336 512 msedge.exe 84 PID 512 wrote to memory of 4336 512 msedge.exe 84 PID 512 wrote to memory of 4336 512 msedge.exe 84 PID 512 wrote to memory of 4336 512 msedge.exe 84 PID 512 wrote to memory of 4336 512 msedge.exe 84 PID 512 wrote to memory of 4336 512 msedge.exe 84 PID 512 wrote to memory of 4336 512 msedge.exe 84 PID 512 wrote to memory of 4336 512 msedge.exe 84 PID 512 wrote to memory of 4336 512 msedge.exe 84 PID 512 wrote to memory of 4336 512 msedge.exe 84 PID 512 wrote to memory of 4336 512 msedge.exe 84 PID 512 wrote to memory of 4336 512 msedge.exe 84 PID 512 wrote to memory of 4336 512 msedge.exe 84 PID 512 wrote to memory of 4336 512 msedge.exe 84 PID 512 wrote to memory of 4336 512 msedge.exe 84 PID 512 wrote to memory of 4336 512 msedge.exe 84 PID 512 wrote to memory of 4336 512 msedge.exe 84 PID 512 wrote to memory of 4336 512 msedge.exe 84 PID 512 wrote to memory of 4336 512 msedge.exe 84 PID 512 wrote to memory of 4336 512 msedge.exe 84 PID 512 wrote to memory of 4336 512 msedge.exe 84 PID 512 wrote to memory of 4336 512 msedge.exe 84 PID 512 wrote to memory of 4336 512 msedge.exe 84 PID 512 wrote to memory of 4336 512 msedge.exe 84 PID 512 wrote to memory of 4336 512 msedge.exe 84 PID 512 wrote to memory of 4336 512 msedge.exe 84 PID 512 wrote to memory of 4336 512 msedge.exe 84 PID 512 wrote to memory of 4336 512 msedge.exe 84 PID 512 wrote to memory of 4336 512 msedge.exe 84 PID 512 wrote to memory of 4336 512 msedge.exe 84 PID 512 wrote to memory of 4336 512 msedge.exe 84 PID 512 wrote to memory of 4336 512 msedge.exe 84 PID 512 wrote to memory of 4336 512 msedge.exe 84 PID 512 wrote to memory of 4744 512 msedge.exe 85 PID 512 wrote to memory of 4744 512 msedge.exe 85 PID 512 wrote to memory of 4952 512 msedge.exe 86 PID 512 wrote to memory of 4952 512 msedge.exe 86 PID 512 wrote to memory of 4952 512 msedge.exe 86 PID 512 wrote to memory of 4952 512 msedge.exe 86 PID 512 wrote to memory of 4952 512 msedge.exe 86 PID 512 wrote to memory of 4952 512 msedge.exe 86 PID 512 wrote to memory of 4952 512 msedge.exe 86 PID 512 wrote to memory of 4952 512 msedge.exe 86 PID 512 wrote to memory of 4952 512 msedge.exe 86 PID 512 wrote to memory of 4952 512 msedge.exe 86 PID 512 wrote to memory of 4952 512 msedge.exe 86 PID 512 wrote to memory of 4952 512 msedge.exe 86 PID 512 wrote to memory of 4952 512 msedge.exe 86 PID 512 wrote to memory of 4952 512 msedge.exe 86 PID 512 wrote to memory of 4952 512 msedge.exe 86 PID 512 wrote to memory of 4952 512 msedge.exe 86 PID 512 wrote to memory of 4952 512 msedge.exe 86 PID 512 wrote to memory of 4952 512 msedge.exe 86 PID 512 wrote to memory of 4952 512 msedge.exe 86 PID 512 wrote to memory of 4952 512 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\722ba024a5bb940f1e0ac3858921203f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd168946f8,0x7ffd16894708,0x7ffd168947182⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,7434821618626605306,6200196612139781326,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,7434821618626605306,6200196612139781326,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,7434821618626605306,6200196612139781326,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7434821618626605306,6200196612139781326,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7434821618626605306,6200196612139781326,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,7434821618626605306,6200196612139781326,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 /prefetch:82⤵PID:2304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,7434821618626605306,6200196612139781326,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7434821618626605306,6200196612139781326,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7434821618626605306,6200196612139781326,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7434821618626605306,6200196612139781326,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7434821618626605306,6200196612139781326,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,7434821618626605306,6200196612139781326,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5672 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1676
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3348
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
5KB
MD5e2a16017a5e6e6cca440cb7ae153efa7
SHA1ae015f385bc9d2a559ff13bbdf5567d072cf0453
SHA256635c0bf288cc7f676f6f8489d0301db0f8d6a83b1a298ccdfca1ec430800b788
SHA51233a9873485f00d4c9d7ccb7378262c129347b4cddc38e50c56fa98485e5e762da241c2074b18ff103debb2985ae11c4869192f5a9cf145c44674af0a1dd4e546
-
Filesize
6KB
MD5b8c677c791319cdfcbc55047cd6782a9
SHA133b2b18be3e2903ab8fa59980e9171944c5071ab
SHA2566647fd753631d7360ddbfa8719782d158b78d1b7ad14068e007952c95fc6c8f6
SHA5128727d393605e6dc2ab1ffdb2a16d7f55e9904bdf99aca67d9195c3ae63720772bff7829b5f19d594107bd92c21bc67be5f7b47dd70fe5b243c6a6f30cc640afe
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5159a3e9fc781aca57d59d1cf9373fcbc
SHA1f71566b942c2c320931c2d2cc05481229c5f4591
SHA2564aae9f35bdf85b2b9a4319eedff7a9cde30521d9772ba21b9428f6a6052bb140
SHA512796b4e7b75785928f5cdad4dec1dd4b815e6eb5ddaa92f8eccdf01dfa307412b775e03c237064de75ca9046b9c12ba37661536d5a4d8eb5720c113fef5639566