Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 14:43
Static task
static1
Behavioral task
behavioral1
Sample
724dae20472fb04e5afdc8fc6283a135_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
724dae20472fb04e5afdc8fc6283a135_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
724dae20472fb04e5afdc8fc6283a135_JaffaCakes118.html
-
Size
32KB
-
MD5
724dae20472fb04e5afdc8fc6283a135
-
SHA1
41c100a35d8bd5bc81cc5e603009bd154356c7bc
-
SHA256
33873bcbf99baf45eec8e9169344779bf068dd98b85553053be7308a39f86ce7
-
SHA512
31c4ed3d5dd5087d6980509e40084716505f308a6fb7f54221b79e7e1aefb319bf5b8a5d7de2f4cfe6778f454cefbf61595984581404eddab3a18a3e3a83b565
-
SSDEEP
768:oLqpCa+ajC1oDGbf2cb3jsfq5HXqqY7WZ2emjInICLCrCrCrCrCUCUCtCtC1C1CF:uqC1oDGbf2cb3jsfq5HXqqY7WZ2emjIM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1788 msedge.exe 1788 msedge.exe 928 msedge.exe 928 msedge.exe 1540 identity_helper.exe 1540 identity_helper.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 928 wrote to memory of 1616 928 msedge.exe 83 PID 928 wrote to memory of 1616 928 msedge.exe 83 PID 928 wrote to memory of 4332 928 msedge.exe 84 PID 928 wrote to memory of 4332 928 msedge.exe 84 PID 928 wrote to memory of 4332 928 msedge.exe 84 PID 928 wrote to memory of 4332 928 msedge.exe 84 PID 928 wrote to memory of 4332 928 msedge.exe 84 PID 928 wrote to memory of 4332 928 msedge.exe 84 PID 928 wrote to memory of 4332 928 msedge.exe 84 PID 928 wrote to memory of 4332 928 msedge.exe 84 PID 928 wrote to memory of 4332 928 msedge.exe 84 PID 928 wrote to memory of 4332 928 msedge.exe 84 PID 928 wrote to memory of 4332 928 msedge.exe 84 PID 928 wrote to memory of 4332 928 msedge.exe 84 PID 928 wrote to memory of 4332 928 msedge.exe 84 PID 928 wrote to memory of 4332 928 msedge.exe 84 PID 928 wrote to memory of 4332 928 msedge.exe 84 PID 928 wrote to memory of 4332 928 msedge.exe 84 PID 928 wrote to memory of 4332 928 msedge.exe 84 PID 928 wrote to memory of 4332 928 msedge.exe 84 PID 928 wrote to memory of 4332 928 msedge.exe 84 PID 928 wrote to memory of 4332 928 msedge.exe 84 PID 928 wrote to memory of 4332 928 msedge.exe 84 PID 928 wrote to memory of 4332 928 msedge.exe 84 PID 928 wrote to memory of 4332 928 msedge.exe 84 PID 928 wrote to memory of 4332 928 msedge.exe 84 PID 928 wrote to memory of 4332 928 msedge.exe 84 PID 928 wrote to memory of 4332 928 msedge.exe 84 PID 928 wrote to memory of 4332 928 msedge.exe 84 PID 928 wrote to memory of 4332 928 msedge.exe 84 PID 928 wrote to memory of 4332 928 msedge.exe 84 PID 928 wrote to memory of 4332 928 msedge.exe 84 PID 928 wrote to memory of 4332 928 msedge.exe 84 PID 928 wrote to memory of 4332 928 msedge.exe 84 PID 928 wrote to memory of 4332 928 msedge.exe 84 PID 928 wrote to memory of 4332 928 msedge.exe 84 PID 928 wrote to memory of 4332 928 msedge.exe 84 PID 928 wrote to memory of 4332 928 msedge.exe 84 PID 928 wrote to memory of 4332 928 msedge.exe 84 PID 928 wrote to memory of 4332 928 msedge.exe 84 PID 928 wrote to memory of 4332 928 msedge.exe 84 PID 928 wrote to memory of 4332 928 msedge.exe 84 PID 928 wrote to memory of 1788 928 msedge.exe 85 PID 928 wrote to memory of 1788 928 msedge.exe 85 PID 928 wrote to memory of 4984 928 msedge.exe 86 PID 928 wrote to memory of 4984 928 msedge.exe 86 PID 928 wrote to memory of 4984 928 msedge.exe 86 PID 928 wrote to memory of 4984 928 msedge.exe 86 PID 928 wrote to memory of 4984 928 msedge.exe 86 PID 928 wrote to memory of 4984 928 msedge.exe 86 PID 928 wrote to memory of 4984 928 msedge.exe 86 PID 928 wrote to memory of 4984 928 msedge.exe 86 PID 928 wrote to memory of 4984 928 msedge.exe 86 PID 928 wrote to memory of 4984 928 msedge.exe 86 PID 928 wrote to memory of 4984 928 msedge.exe 86 PID 928 wrote to memory of 4984 928 msedge.exe 86 PID 928 wrote to memory of 4984 928 msedge.exe 86 PID 928 wrote to memory of 4984 928 msedge.exe 86 PID 928 wrote to memory of 4984 928 msedge.exe 86 PID 928 wrote to memory of 4984 928 msedge.exe 86 PID 928 wrote to memory of 4984 928 msedge.exe 86 PID 928 wrote to memory of 4984 928 msedge.exe 86 PID 928 wrote to memory of 4984 928 msedge.exe 86 PID 928 wrote to memory of 4984 928 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\724dae20472fb04e5afdc8fc6283a135_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff825a646f8,0x7ff825a64708,0x7ff825a647182⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,5146270421990045587,13530505458454907835,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:22⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2212,5146270421990045587,13530505458454907835,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2212,5146270421990045587,13530505458454907835,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,5146270421990045587,13530505458454907835,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,5146270421990045587,13530505458454907835,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,5146270421990045587,13530505458454907835,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5504 /prefetch:82⤵PID:1304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,5146270421990045587,13530505458454907835,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5504 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,5146270421990045587,13530505458454907835,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:12⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,5146270421990045587,13530505458454907835,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:3300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,5146270421990045587,13530505458454907835,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,5146270421990045587,13530505458454907835,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3704 /prefetch:12⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,5146270421990045587,13530505458454907835,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5156 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2000
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1396
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
1KB
MD52ae94a7d2d072868b188cb819ee89103
SHA1b42e4906ee64f1098f6ef3907d6488bbfb5ac7b8
SHA256812655058861fe0c0d6811aee497c041cd16aaa348d35f6b597d6df38961c0a9
SHA51262e08356df412cd2228dc45352a8caff40a2b602bff257879f2564ebd7653e6d216354b04d09b59aac110fa739ccbce4a71c41e79ef2f66698826b287d1d3302
-
Filesize
5KB
MD53aa9d5a1893545f726f37ffb4d4c91ee
SHA1f5f231306aa265b9c8a645051e95d1439da892c7
SHA2569fb0aadad59b3fb1bed654110eab461d79fb90b68dca252bea6a7b0892e2c5a9
SHA512de6d6505cf48ed13744e020a48c233dc67fee3ac6570ecc36e897c9755a69cdffeb859d1563e4dd58799ab0c7ef9319bce902f278254fc42a304bbbcdcba3641
-
Filesize
6KB
MD59c573f4efefaf8af94db6f88fbb7236d
SHA18fc8babdba281c47a514b33dff42e97ed70a349a
SHA256db1e41bc5782c99d8184726e7ec514ec8146a84b374c232bdf566a651f315051
SHA512d8dc4e5b564202dfefa76db0cc9df6d10e80bbdff74d9d2cd146eaedbc6fa44bde4452fdf96ee30d3a3db7c2a9c2b32e75dd69a593b5f77ec29df3d7006c610f
-
Filesize
873B
MD509f07901e5140a304de58cf60c50c206
SHA1c08dedf13cfcf2c77bf205e7e721fdb1e74dab73
SHA25603a6a785002cdc0ea14e7ff12b75959ecb065fd42101ac0cc4fb121f2a8284c5
SHA512bc62f7e940df00bbcf6d416eb597a3e951d7263b9bb466929b73e2b3f34e7e0b79d217b94992c27ab17e244e8437eb32c9861e90cbb97c29f030587e480fc7c4
-
Filesize
706B
MD5e33d975fe1e6643e5c6f13b0a5c91c4e
SHA1eacd86239d487d91858a73a6f502ddf6f110455f
SHA256291bebf7ebb5d903ddde8f908463d7c2e26466dce34e3f7595d566b3e3c3550c
SHA512dfdc8caade96eda4e9aa6d3967bc65a3b382817604e65877674242b3ac186e9f37fe18a095e0bfa1bde9b90f2d9642d41e475d63032b4aa2d4dc972d98d1807c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5cf8fab34aca578921413211116ab195a
SHA18550c203684014c5b48b8e03231df17a52457b46
SHA256483e0ec3c1a94f7f86c16fc9eb07928d4af333759cc84467453abb3d66947555
SHA512f86df30037bb2fa18c30685a4b1f0c5dffd653251e49803c631fd6d4821275e0730d4e18c3cc1cbb9a497108bc03d568a3bcf659a060c08c9c688483ab8c17fb