Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2024, 17:41
Static task
static1
Behavioral task
behavioral1
Sample
72bf9af5f51a18e30f97e633454e6896_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
72bf9af5f51a18e30f97e633454e6896_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
72bf9af5f51a18e30f97e633454e6896_JaffaCakes118.html
-
Size
355KB
-
MD5
72bf9af5f51a18e30f97e633454e6896
-
SHA1
dd8e6bf853e0c00d9d38ed6272ebf6b6fbf70e43
-
SHA256
31f9475fe27d22de43dac7fe7113e6004b8e5589350deb15d18701ab71ed5620
-
SHA512
ce6daf0a1e4d24486409a31c6a00d4fb7fec96c24b98dad7a21769c4ca62376da521b1815e8aa9a6f7bf3f66a530e991f0d9fb982abfea4f09197dfdbfe8f843
-
SSDEEP
6144:SGLL/0hz4N9dvsMYod+X3oI+YvsMYod+X3oI+YcsMYod+X3oI+YC:PLL/0hzG9dz5d+X3R5d+X3o5d+X3A
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4600 msedge.exe 4600 msedge.exe 3664 msedge.exe 3664 msedge.exe 2560 identity_helper.exe 2560 identity_helper.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3664 wrote to memory of 3028 3664 msedge.exe 83 PID 3664 wrote to memory of 3028 3664 msedge.exe 83 PID 3664 wrote to memory of 3076 3664 msedge.exe 84 PID 3664 wrote to memory of 3076 3664 msedge.exe 84 PID 3664 wrote to memory of 3076 3664 msedge.exe 84 PID 3664 wrote to memory of 3076 3664 msedge.exe 84 PID 3664 wrote to memory of 3076 3664 msedge.exe 84 PID 3664 wrote to memory of 3076 3664 msedge.exe 84 PID 3664 wrote to memory of 3076 3664 msedge.exe 84 PID 3664 wrote to memory of 3076 3664 msedge.exe 84 PID 3664 wrote to memory of 3076 3664 msedge.exe 84 PID 3664 wrote to memory of 3076 3664 msedge.exe 84 PID 3664 wrote to memory of 3076 3664 msedge.exe 84 PID 3664 wrote to memory of 3076 3664 msedge.exe 84 PID 3664 wrote to memory of 3076 3664 msedge.exe 84 PID 3664 wrote to memory of 3076 3664 msedge.exe 84 PID 3664 wrote to memory of 3076 3664 msedge.exe 84 PID 3664 wrote to memory of 3076 3664 msedge.exe 84 PID 3664 wrote to memory of 3076 3664 msedge.exe 84 PID 3664 wrote to memory of 3076 3664 msedge.exe 84 PID 3664 wrote to memory of 3076 3664 msedge.exe 84 PID 3664 wrote to memory of 3076 3664 msedge.exe 84 PID 3664 wrote to memory of 3076 3664 msedge.exe 84 PID 3664 wrote to memory of 3076 3664 msedge.exe 84 PID 3664 wrote to memory of 3076 3664 msedge.exe 84 PID 3664 wrote to memory of 3076 3664 msedge.exe 84 PID 3664 wrote to memory of 3076 3664 msedge.exe 84 PID 3664 wrote to memory of 3076 3664 msedge.exe 84 PID 3664 wrote to memory of 3076 3664 msedge.exe 84 PID 3664 wrote to memory of 3076 3664 msedge.exe 84 PID 3664 wrote to memory of 3076 3664 msedge.exe 84 PID 3664 wrote to memory of 3076 3664 msedge.exe 84 PID 3664 wrote to memory of 3076 3664 msedge.exe 84 PID 3664 wrote to memory of 3076 3664 msedge.exe 84 PID 3664 wrote to memory of 3076 3664 msedge.exe 84 PID 3664 wrote to memory of 3076 3664 msedge.exe 84 PID 3664 wrote to memory of 3076 3664 msedge.exe 84 PID 3664 wrote to memory of 3076 3664 msedge.exe 84 PID 3664 wrote to memory of 3076 3664 msedge.exe 84 PID 3664 wrote to memory of 3076 3664 msedge.exe 84 PID 3664 wrote to memory of 3076 3664 msedge.exe 84 PID 3664 wrote to memory of 3076 3664 msedge.exe 84 PID 3664 wrote to memory of 4600 3664 msedge.exe 85 PID 3664 wrote to memory of 4600 3664 msedge.exe 85 PID 3664 wrote to memory of 4632 3664 msedge.exe 86 PID 3664 wrote to memory of 4632 3664 msedge.exe 86 PID 3664 wrote to memory of 4632 3664 msedge.exe 86 PID 3664 wrote to memory of 4632 3664 msedge.exe 86 PID 3664 wrote to memory of 4632 3664 msedge.exe 86 PID 3664 wrote to memory of 4632 3664 msedge.exe 86 PID 3664 wrote to memory of 4632 3664 msedge.exe 86 PID 3664 wrote to memory of 4632 3664 msedge.exe 86 PID 3664 wrote to memory of 4632 3664 msedge.exe 86 PID 3664 wrote to memory of 4632 3664 msedge.exe 86 PID 3664 wrote to memory of 4632 3664 msedge.exe 86 PID 3664 wrote to memory of 4632 3664 msedge.exe 86 PID 3664 wrote to memory of 4632 3664 msedge.exe 86 PID 3664 wrote to memory of 4632 3664 msedge.exe 86 PID 3664 wrote to memory of 4632 3664 msedge.exe 86 PID 3664 wrote to memory of 4632 3664 msedge.exe 86 PID 3664 wrote to memory of 4632 3664 msedge.exe 86 PID 3664 wrote to memory of 4632 3664 msedge.exe 86 PID 3664 wrote to memory of 4632 3664 msedge.exe 86 PID 3664 wrote to memory of 4632 3664 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\72bf9af5f51a18e30f97e633454e6896_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8591c46f8,0x7ff8591c4708,0x7ff8591c47182⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,954372023803705339,567364356813230395,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,954372023803705339,567364356813230395,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,954372023803705339,567364356813230395,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2572 /prefetch:82⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,954372023803705339,567364356813230395,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,954372023803705339,567364356813230395,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:3748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,954372023803705339,567364356813230395,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,954372023803705339,567364356813230395,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,954372023803705339,567364356813230395,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,954372023803705339,567364356813230395,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,954372023803705339,567364356813230395,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3524 /prefetch:12⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,954372023803705339,567364356813230395,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3552 /prefetch:12⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,954372023803705339,567364356813230395,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4896 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4844
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2196
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD55b13c0b6fe416b25b55470971a2af6ad
SHA1acdbfc7b9d2ac17410b8a9023c17bc651a2b3c43
SHA256276c9a093680a078d05b080d458516cc7ff8b708e293648519f9b17815a6bde2
SHA5124a4b97e3482d29ed9d1905b4309350ee13b0df8ec933daf8982ca3d6413eeae5c6519181cd3a5347b6f32b92c12931de4739474fcde77096fbebd326a918b093
-
Filesize
6KB
MD518d7aef5d845a649bfbfaf0bf49fab93
SHA1b3f13f21a6bf5e78019ff3cd2a565ce69435f7d9
SHA256e04cbcbe9f53e76c571736b387a00a03f5e951a3a4e2f0c806a53081cd87262b
SHA5120cee17a882e9eaa4b38088977a3d69b2184338d16ddfd03f5409b6e71bec40787731125d181aa5c1a5de4028ada790d44b3fdf87823620b6981dfb4ccbd8f1ae
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59941f7c0288cae30099fd5bc40180e74
SHA1dbb4593036136ca43bb2ad31c37579001e38f29d
SHA256042405ab296ad11a819231ec023a1f477e8170442f269e6ae84e3b024e7bbf80
SHA51214aeaa258fe1a12414a163a1e8c960494468b8cf72321565ef35981161b52b97e79dc288148d03e5bf7fd8c5228f4f07543a9f5287a396a531b9944bb024d816