Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2024, 16:52
Static task
static1
Behavioral task
behavioral1
Sample
72a0c29404d9ba1aeeba5dc9818aafbf_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
72a0c29404d9ba1aeeba5dc9818aafbf_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
72a0c29404d9ba1aeeba5dc9818aafbf_JaffaCakes118.html
-
Size
70KB
-
MD5
72a0c29404d9ba1aeeba5dc9818aafbf
-
SHA1
3b7f0710939dbb69a802e31c3461f5822fda725e
-
SHA256
887661d206cc04cd00e39adb1ade198ae260997c7854c806744b87ef8a692fb0
-
SHA512
81d6fcf623575914ced6a6ea50240911920ea1190cf7070fa96c550893df1024b7a5bcdadfb699bec13a677e3e27d85958547ae480453749aef6451885d632f5
-
SSDEEP
768:Ji8gcMWR3sI2PDDnd0g6kgNbvVoT2e1wCZkoTyMdtbBnfBgN8/lboiGhcRfQFVGQ:JqwxvSTTNen0tbrga90hc+NnhVJ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1728 msedge.exe 1728 msedge.exe 1952 msedge.exe 1952 msedge.exe 3612 identity_helper.exe 3612 identity_helper.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1952 wrote to memory of 4932 1952 msedge.exe 83 PID 1952 wrote to memory of 4932 1952 msedge.exe 83 PID 1952 wrote to memory of 2996 1952 msedge.exe 84 PID 1952 wrote to memory of 2996 1952 msedge.exe 84 PID 1952 wrote to memory of 2996 1952 msedge.exe 84 PID 1952 wrote to memory of 2996 1952 msedge.exe 84 PID 1952 wrote to memory of 2996 1952 msedge.exe 84 PID 1952 wrote to memory of 2996 1952 msedge.exe 84 PID 1952 wrote to memory of 2996 1952 msedge.exe 84 PID 1952 wrote to memory of 2996 1952 msedge.exe 84 PID 1952 wrote to memory of 2996 1952 msedge.exe 84 PID 1952 wrote to memory of 2996 1952 msedge.exe 84 PID 1952 wrote to memory of 2996 1952 msedge.exe 84 PID 1952 wrote to memory of 2996 1952 msedge.exe 84 PID 1952 wrote to memory of 2996 1952 msedge.exe 84 PID 1952 wrote to memory of 2996 1952 msedge.exe 84 PID 1952 wrote to memory of 2996 1952 msedge.exe 84 PID 1952 wrote to memory of 2996 1952 msedge.exe 84 PID 1952 wrote to memory of 2996 1952 msedge.exe 84 PID 1952 wrote to memory of 2996 1952 msedge.exe 84 PID 1952 wrote to memory of 2996 1952 msedge.exe 84 PID 1952 wrote to memory of 2996 1952 msedge.exe 84 PID 1952 wrote to memory of 2996 1952 msedge.exe 84 PID 1952 wrote to memory of 2996 1952 msedge.exe 84 PID 1952 wrote to memory of 2996 1952 msedge.exe 84 PID 1952 wrote to memory of 2996 1952 msedge.exe 84 PID 1952 wrote to memory of 2996 1952 msedge.exe 84 PID 1952 wrote to memory of 2996 1952 msedge.exe 84 PID 1952 wrote to memory of 2996 1952 msedge.exe 84 PID 1952 wrote to memory of 2996 1952 msedge.exe 84 PID 1952 wrote to memory of 2996 1952 msedge.exe 84 PID 1952 wrote to memory of 2996 1952 msedge.exe 84 PID 1952 wrote to memory of 2996 1952 msedge.exe 84 PID 1952 wrote to memory of 2996 1952 msedge.exe 84 PID 1952 wrote to memory of 2996 1952 msedge.exe 84 PID 1952 wrote to memory of 2996 1952 msedge.exe 84 PID 1952 wrote to memory of 2996 1952 msedge.exe 84 PID 1952 wrote to memory of 2996 1952 msedge.exe 84 PID 1952 wrote to memory of 2996 1952 msedge.exe 84 PID 1952 wrote to memory of 2996 1952 msedge.exe 84 PID 1952 wrote to memory of 2996 1952 msedge.exe 84 PID 1952 wrote to memory of 2996 1952 msedge.exe 84 PID 1952 wrote to memory of 1728 1952 msedge.exe 85 PID 1952 wrote to memory of 1728 1952 msedge.exe 85 PID 1952 wrote to memory of 4940 1952 msedge.exe 86 PID 1952 wrote to memory of 4940 1952 msedge.exe 86 PID 1952 wrote to memory of 4940 1952 msedge.exe 86 PID 1952 wrote to memory of 4940 1952 msedge.exe 86 PID 1952 wrote to memory of 4940 1952 msedge.exe 86 PID 1952 wrote to memory of 4940 1952 msedge.exe 86 PID 1952 wrote to memory of 4940 1952 msedge.exe 86 PID 1952 wrote to memory of 4940 1952 msedge.exe 86 PID 1952 wrote to memory of 4940 1952 msedge.exe 86 PID 1952 wrote to memory of 4940 1952 msedge.exe 86 PID 1952 wrote to memory of 4940 1952 msedge.exe 86 PID 1952 wrote to memory of 4940 1952 msedge.exe 86 PID 1952 wrote to memory of 4940 1952 msedge.exe 86 PID 1952 wrote to memory of 4940 1952 msedge.exe 86 PID 1952 wrote to memory of 4940 1952 msedge.exe 86 PID 1952 wrote to memory of 4940 1952 msedge.exe 86 PID 1952 wrote to memory of 4940 1952 msedge.exe 86 PID 1952 wrote to memory of 4940 1952 msedge.exe 86 PID 1952 wrote to memory of 4940 1952 msedge.exe 86 PID 1952 wrote to memory of 4940 1952 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\72a0c29404d9ba1aeeba5dc9818aafbf_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9272c46f8,0x7ff9272c4708,0x7ff9272c47182⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,2137049557354560609,13951504515489285355,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,2137049557354560609,13951504515489285355,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1464 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,2137049557354560609,13951504515489285355,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,2137049557354560609,13951504515489285355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,2137049557354560609,13951504515489285355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,2137049557354560609,13951504515489285355,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 /prefetch:82⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,2137049557354560609,13951504515489285355,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,2137049557354560609,13951504515489285355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,2137049557354560609,13951504515489285355,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:12⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,2137049557354560609,13951504515489285355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,2137049557354560609,13951504515489285355,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:2572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,2137049557354560609,13951504515489285355,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5476 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2488
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:60
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD54f532dda26edfa031cd367125c5e1d92
SHA1701dbae7b44d754dc431746dd33f1d6afb9de111
SHA256ddb3f293e1648b44cd1678241739c4cf060c7311310fd5db93c83406f9e8dcb1
SHA51270fa3d6920483065daec2d3d5fd957084969d7d583f09cfe378f24e8b34ba96b285e71abe34522f5cf6b2629a814591297c5bbeb4fef02ccdaca1b82e21fe896
-
Filesize
6KB
MD5784b7d0aea5f05766ef976e1ee8ddaac
SHA140cbc4f70e3ef58b405636774a81e5ea3618ec8c
SHA25654dc5fcaf0ee282326139b2282858326512299d2d65538ba34c1b4c0899cc010
SHA51224fa07513471d949ce65464713e0f3e0eabb0b220449eaadc094035e050be3f9f2969f693961f01deaac9170a88b98ebcd5249e5e65c63354e34e7e0ecf82985
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD585cc8f4d9e52147f320735f1bc598dbc
SHA17cbba93c0eb2a38fe64cc9083c314a30a05268d5
SHA2567570c9fefcfaa3aaa3394ee1b8b2fb0895100f69fec019841b02aa0cfeb5b47b
SHA512c87848252e5960e25c041246c4ccf96671d405e4343c6a46440831f78071f9294485046c2d64dc2d266ba78ee97cb47d1650754cb13c58fd11eb462450a6aa2c