Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2024, 17:07
Static task
static1
Behavioral task
behavioral1
Sample
72a95fdc7ddbdb75f0da631ddaab89ea_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
72a95fdc7ddbdb75f0da631ddaab89ea_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
72a95fdc7ddbdb75f0da631ddaab89ea_JaffaCakes118.html
-
Size
227KB
-
MD5
72a95fdc7ddbdb75f0da631ddaab89ea
-
SHA1
8dbdcde71e5f58bdb8564f076f1bce276f0667a7
-
SHA256
b0374036acdd62e1b9802bbb67434a1fc9532d64da6cb635a068203149a53c9d
-
SHA512
cc3c0e23125dbbdb10348de522dae325f7ac8db07bae9d115e0e2f028cd1ac2950a6cbc0ea941c0cd7b72dbf1d528627a66e4c456efb4ad65ae9c5c613ceb459
-
SSDEEP
6144:2PFf+AwlxVg7L59FnQ3FnkzUFzQ/FGeJoOb:sFf+AwlxVg7LTFSF/FGF/b
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1312 msedge.exe 1312 msedge.exe 3964 msedge.exe 3964 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 4604 identity_helper.exe 4604 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3964 wrote to memory of 2184 3964 msedge.exe 83 PID 3964 wrote to memory of 2184 3964 msedge.exe 83 PID 3964 wrote to memory of 892 3964 msedge.exe 84 PID 3964 wrote to memory of 892 3964 msedge.exe 84 PID 3964 wrote to memory of 892 3964 msedge.exe 84 PID 3964 wrote to memory of 892 3964 msedge.exe 84 PID 3964 wrote to memory of 892 3964 msedge.exe 84 PID 3964 wrote to memory of 892 3964 msedge.exe 84 PID 3964 wrote to memory of 892 3964 msedge.exe 84 PID 3964 wrote to memory of 892 3964 msedge.exe 84 PID 3964 wrote to memory of 892 3964 msedge.exe 84 PID 3964 wrote to memory of 892 3964 msedge.exe 84 PID 3964 wrote to memory of 892 3964 msedge.exe 84 PID 3964 wrote to memory of 892 3964 msedge.exe 84 PID 3964 wrote to memory of 892 3964 msedge.exe 84 PID 3964 wrote to memory of 892 3964 msedge.exe 84 PID 3964 wrote to memory of 892 3964 msedge.exe 84 PID 3964 wrote to memory of 892 3964 msedge.exe 84 PID 3964 wrote to memory of 892 3964 msedge.exe 84 PID 3964 wrote to memory of 892 3964 msedge.exe 84 PID 3964 wrote to memory of 892 3964 msedge.exe 84 PID 3964 wrote to memory of 892 3964 msedge.exe 84 PID 3964 wrote to memory of 892 3964 msedge.exe 84 PID 3964 wrote to memory of 892 3964 msedge.exe 84 PID 3964 wrote to memory of 892 3964 msedge.exe 84 PID 3964 wrote to memory of 892 3964 msedge.exe 84 PID 3964 wrote to memory of 892 3964 msedge.exe 84 PID 3964 wrote to memory of 892 3964 msedge.exe 84 PID 3964 wrote to memory of 892 3964 msedge.exe 84 PID 3964 wrote to memory of 892 3964 msedge.exe 84 PID 3964 wrote to memory of 892 3964 msedge.exe 84 PID 3964 wrote to memory of 892 3964 msedge.exe 84 PID 3964 wrote to memory of 892 3964 msedge.exe 84 PID 3964 wrote to memory of 892 3964 msedge.exe 84 PID 3964 wrote to memory of 892 3964 msedge.exe 84 PID 3964 wrote to memory of 892 3964 msedge.exe 84 PID 3964 wrote to memory of 892 3964 msedge.exe 84 PID 3964 wrote to memory of 892 3964 msedge.exe 84 PID 3964 wrote to memory of 892 3964 msedge.exe 84 PID 3964 wrote to memory of 892 3964 msedge.exe 84 PID 3964 wrote to memory of 892 3964 msedge.exe 84 PID 3964 wrote to memory of 892 3964 msedge.exe 84 PID 3964 wrote to memory of 1312 3964 msedge.exe 85 PID 3964 wrote to memory of 1312 3964 msedge.exe 85 PID 3964 wrote to memory of 936 3964 msedge.exe 86 PID 3964 wrote to memory of 936 3964 msedge.exe 86 PID 3964 wrote to memory of 936 3964 msedge.exe 86 PID 3964 wrote to memory of 936 3964 msedge.exe 86 PID 3964 wrote to memory of 936 3964 msedge.exe 86 PID 3964 wrote to memory of 936 3964 msedge.exe 86 PID 3964 wrote to memory of 936 3964 msedge.exe 86 PID 3964 wrote to memory of 936 3964 msedge.exe 86 PID 3964 wrote to memory of 936 3964 msedge.exe 86 PID 3964 wrote to memory of 936 3964 msedge.exe 86 PID 3964 wrote to memory of 936 3964 msedge.exe 86 PID 3964 wrote to memory of 936 3964 msedge.exe 86 PID 3964 wrote to memory of 936 3964 msedge.exe 86 PID 3964 wrote to memory of 936 3964 msedge.exe 86 PID 3964 wrote to memory of 936 3964 msedge.exe 86 PID 3964 wrote to memory of 936 3964 msedge.exe 86 PID 3964 wrote to memory of 936 3964 msedge.exe 86 PID 3964 wrote to memory of 936 3964 msedge.exe 86 PID 3964 wrote to memory of 936 3964 msedge.exe 86 PID 3964 wrote to memory of 936 3964 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\72a95fdc7ddbdb75f0da631ddaab89ea_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8107b46f8,0x7ff8107b4708,0x7ff8107b47182⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,9673185442520481108,14020150595971817048,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,9673185442520481108,14020150595971817048,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,9673185442520481108,14020150595971817048,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9673185442520481108,14020150595971817048,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9673185442520481108,14020150595971817048,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9673185442520481108,14020150595971817048,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2080 /prefetch:12⤵PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,9673185442520481108,14020150595971817048,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5736 /prefetch:82⤵PID:1120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,9673185442520481108,14020150595971817048,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5736 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,9673185442520481108,14020150595971817048,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2272 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9673185442520481108,14020150595971817048,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1308 /prefetch:12⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9673185442520481108,14020150595971817048,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1816 /prefetch:12⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9673185442520481108,14020150595971817048,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6132 /prefetch:12⤵PID:848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9673185442520481108,14020150595971817048,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:3424
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3164
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2172
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
955B
MD5d4acb825907e76b7ec75e06b192bf8a8
SHA1c58814a2bc9ecde275a2f65464cbd65d4267bfef
SHA25638beea117c37b3a2e83d81bc97e545ab2695a8457f281fef0b7a9f54deef02c7
SHA51246a8b47025dbc5955473ba9e70f9b39f756ee486307400afb29aded3e732c1b0a9e4ab68a526858e6a130d77241926d85129a3a1e10bf2b1fcadb1410205286b
-
Filesize
882B
MD54d210c6ccec03200ab684ebf8a79c709
SHA11e349de603e0587e268d4165e1fbd1cf8d500e4b
SHA2564af95040e88682f736d20a7b9bf78d5362a0a07cf725c7719de8aedf615ad9d4
SHA51217e16e780afeebb171412e439dd28a6712072e8d8623e387246cf9dd7d50cbe9fcc04535265bd46aa7891b13784f8d37e371d41c97fe50aa33797d07579cebc5
-
Filesize
5KB
MD5016bab2bcb70cc6e57df5c1fb70f2d57
SHA177bf53c57095f600d69489c223ed505a061fdc11
SHA25658add607efe7604f36667920869d03d3a28d3724c7ace4a2d7bbc8e19a2f6a0a
SHA51296edf68d6d611c6e9124bbf06bfaf725e2139f1c33c20929fec4ac6c2d34e8af42547a5ea664c1d82ef27c23b308d3c963f92fbb5f972ef64a46630f7bd056a9
-
Filesize
6KB
MD5817de749c6738816c7e6430c013d432c
SHA1941fc8d4dc698e3e6a6970ca4833df95e25d47ee
SHA25680b6a53b48619026d09f57cb6ce156f57367e10a4b5e97af011d9042f255bfca
SHA512194ec55a92ce7287abf534cf44f3d839dab36cd3d3acba74378e3b8f12c98d58b2d0e125cb9010a6b076b5cbabdb2e23e1d134348ff5c3a743e1bb29d658cb33
-
Filesize
6KB
MD5087cf823d3cf10da6833914d57645a79
SHA189713aa2069e41d2ead998d36be70553c4918643
SHA256556babd20ab468853fcc4d7047f68a62ec9bc3deda6e84c947602ce9a8f419cd
SHA51255b253410bae19c1c29430aa09aa69be27b18ae7ae8461452cf76e39f931ccb4243ddafbd78ab57a48764ca09408c4c5731387eb8a0d109a5857511f8bd5fc8e
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD50462d246527a9c659449f23b249c506e
SHA1bc92e48809d92730548fcc2e21938dad7e7d9fa3
SHA256b41bdd21634d490e2afdc8f327552caf50f1df33e272f789ddcd7c2e0ebf956d
SHA5124e3c1f455f4166f3297f6fb29154128231043e233604926c0b5371d60e4c84c03e4ea4396d9a024a6fefa88b6ffda3e3a0bff0a697a0f152fa28e401afa15f4f