Analysis
-
max time kernel
145s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2024, 18:34
Static task
static1
Behavioral task
behavioral1
Sample
72e14338b8ca889f5e95cafc3dd8cde7_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
72e14338b8ca889f5e95cafc3dd8cde7_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
72e14338b8ca889f5e95cafc3dd8cde7_JaffaCakes118.html
-
Size
27KB
-
MD5
72e14338b8ca889f5e95cafc3dd8cde7
-
SHA1
056cb2ffe100938606ccdf3317364bf0af3f6044
-
SHA256
99db7f4071638facca25bb968053843ea55cd466fa7c5c360c8c74045821cce9
-
SHA512
f550000dffe77302a63566c7a8921c1c2301da4c219fe989e11b8470d3faa294170a17ee593635f08e422faef61c27f80598bf53b4e894529faf1c3b2c413498
-
SSDEEP
192:uwDAb5naunQjxn5Q/FnQiewNninQOkEntXjnQTbnhnQ9emom6l98OQl7MBQqnYnI:rQ/2HQj8pSKds
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1316 msedge.exe 1316 msedge.exe 2748 msedge.exe 2748 msedge.exe 2220 identity_helper.exe 2220 identity_helper.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2748 wrote to memory of 4296 2748 msedge.exe 82 PID 2748 wrote to memory of 4296 2748 msedge.exe 82 PID 2748 wrote to memory of 4468 2748 msedge.exe 83 PID 2748 wrote to memory of 4468 2748 msedge.exe 83 PID 2748 wrote to memory of 4468 2748 msedge.exe 83 PID 2748 wrote to memory of 4468 2748 msedge.exe 83 PID 2748 wrote to memory of 4468 2748 msedge.exe 83 PID 2748 wrote to memory of 4468 2748 msedge.exe 83 PID 2748 wrote to memory of 4468 2748 msedge.exe 83 PID 2748 wrote to memory of 4468 2748 msedge.exe 83 PID 2748 wrote to memory of 4468 2748 msedge.exe 83 PID 2748 wrote to memory of 4468 2748 msedge.exe 83 PID 2748 wrote to memory of 4468 2748 msedge.exe 83 PID 2748 wrote to memory of 4468 2748 msedge.exe 83 PID 2748 wrote to memory of 4468 2748 msedge.exe 83 PID 2748 wrote to memory of 4468 2748 msedge.exe 83 PID 2748 wrote to memory of 4468 2748 msedge.exe 83 PID 2748 wrote to memory of 4468 2748 msedge.exe 83 PID 2748 wrote to memory of 4468 2748 msedge.exe 83 PID 2748 wrote to memory of 4468 2748 msedge.exe 83 PID 2748 wrote to memory of 4468 2748 msedge.exe 83 PID 2748 wrote to memory of 4468 2748 msedge.exe 83 PID 2748 wrote to memory of 4468 2748 msedge.exe 83 PID 2748 wrote to memory of 4468 2748 msedge.exe 83 PID 2748 wrote to memory of 4468 2748 msedge.exe 83 PID 2748 wrote to memory of 4468 2748 msedge.exe 83 PID 2748 wrote to memory of 4468 2748 msedge.exe 83 PID 2748 wrote to memory of 4468 2748 msedge.exe 83 PID 2748 wrote to memory of 4468 2748 msedge.exe 83 PID 2748 wrote to memory of 4468 2748 msedge.exe 83 PID 2748 wrote to memory of 4468 2748 msedge.exe 83 PID 2748 wrote to memory of 4468 2748 msedge.exe 83 PID 2748 wrote to memory of 4468 2748 msedge.exe 83 PID 2748 wrote to memory of 4468 2748 msedge.exe 83 PID 2748 wrote to memory of 4468 2748 msedge.exe 83 PID 2748 wrote to memory of 4468 2748 msedge.exe 83 PID 2748 wrote to memory of 4468 2748 msedge.exe 83 PID 2748 wrote to memory of 4468 2748 msedge.exe 83 PID 2748 wrote to memory of 4468 2748 msedge.exe 83 PID 2748 wrote to memory of 4468 2748 msedge.exe 83 PID 2748 wrote to memory of 4468 2748 msedge.exe 83 PID 2748 wrote to memory of 4468 2748 msedge.exe 83 PID 2748 wrote to memory of 1316 2748 msedge.exe 84 PID 2748 wrote to memory of 1316 2748 msedge.exe 84 PID 2748 wrote to memory of 3012 2748 msedge.exe 85 PID 2748 wrote to memory of 3012 2748 msedge.exe 85 PID 2748 wrote to memory of 3012 2748 msedge.exe 85 PID 2748 wrote to memory of 3012 2748 msedge.exe 85 PID 2748 wrote to memory of 3012 2748 msedge.exe 85 PID 2748 wrote to memory of 3012 2748 msedge.exe 85 PID 2748 wrote to memory of 3012 2748 msedge.exe 85 PID 2748 wrote to memory of 3012 2748 msedge.exe 85 PID 2748 wrote to memory of 3012 2748 msedge.exe 85 PID 2748 wrote to memory of 3012 2748 msedge.exe 85 PID 2748 wrote to memory of 3012 2748 msedge.exe 85 PID 2748 wrote to memory of 3012 2748 msedge.exe 85 PID 2748 wrote to memory of 3012 2748 msedge.exe 85 PID 2748 wrote to memory of 3012 2748 msedge.exe 85 PID 2748 wrote to memory of 3012 2748 msedge.exe 85 PID 2748 wrote to memory of 3012 2748 msedge.exe 85 PID 2748 wrote to memory of 3012 2748 msedge.exe 85 PID 2748 wrote to memory of 3012 2748 msedge.exe 85 PID 2748 wrote to memory of 3012 2748 msedge.exe 85 PID 2748 wrote to memory of 3012 2748 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\72e14338b8ca889f5e95cafc3dd8cde7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffff99546f8,0x7ffff9954708,0x7ffff99547182⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,9624698105334696653,5921435294843879612,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,9624698105334696653,5921435294843879612,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,9624698105334696653,5921435294843879612,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9624698105334696653,5921435294843879612,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9624698105334696653,5921435294843879612,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,9624698105334696653,5921435294843879612,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:82⤵PID:644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,9624698105334696653,5921435294843879612,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9624698105334696653,5921435294843879612,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:2128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9624698105334696653,5921435294843879612,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9624698105334696653,5921435294843879612,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:2736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9624698105334696653,5921435294843879612,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,9624698105334696653,5921435294843879612,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5324 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2116
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4680
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
5KB
MD5ec89bf2e07f79f89f94e85022d8bbdf0
SHA1c2bccdd01400e0f3017db466aead0a768f8f8da8
SHA256daad7b943b799a9ed2a92009846d5b50744400a256077530539e8f12040ce43d
SHA512bd7a1d883b90db225f9f46ece975fe4e316d0393bb80234095424578b4867912c8e5a9d1b1ab2b1edc630d9f37b9c31fcaaa308783ace5755b450369dd8831cc
-
Filesize
6KB
MD5887998ba6f2d1d4ca483497282422a9d
SHA1b2b2eb4a15efaa57189f809eecff3bc69e82950e
SHA25634fa4de7a360a307068d3748c4839cb71d9e98ae272f5b2cbf61a067163252c1
SHA512a5e7ffd508a7a269844c653fea4d91001857fc29e898c4a182a21deb7fe778643751e62875aff5c1f0c0470332e4d559e2736060d31aa9db126d3da4f8ff48c2
-
Filesize
6KB
MD5ddd5cc952c2e5fd8cdd8d5de5fde1ce7
SHA1628c3d07b567aece3a45512722461ee087766f0a
SHA2568def21b271cb04e88c630dcd0bf510518b3ddead50eb4b250ba865be59d548b2
SHA512da9d6cb19fb76e1af2d3e259b760082bd5b531fa51b77c7f66bb02912d4ff2367133908a450031a36351375fc512218e776366112829fd5a02606b35c83ac87e
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD56f1be60c6b77002c5e3ad21d665b1a2b
SHA1a6255575c947889a83f6a830580de9c19864d8f2
SHA25684571fb8a565a025296c330993121efd6b678668dd10e3ef76225138d2d7a518
SHA51209fb3ca190be477e183330e31a484d365f5ffa1c6f4cdd2d3c4fce917177fbdc005d53f9c77381646323cc21e5504e5b7ec2d1f2fbe6ec954079ff042d806871