Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 18:56
Static task
static1
Behavioral task
behavioral1
Sample
72ee3663694c2b1607c1deacee872145_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
72ee3663694c2b1607c1deacee872145_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
72ee3663694c2b1607c1deacee872145_JaffaCakes118.html
-
Size
140KB
-
MD5
72ee3663694c2b1607c1deacee872145
-
SHA1
aac6aa1d28407770173589496d247f3762a5cdae
-
SHA256
d5f90b57369675567819de8bc238851c90b7299827c58373e0f67f7d54a4591a
-
SHA512
c07a4901bb88668275370b2ae75af88267ec0ca0ae7f40aab05e0ab73fcef9231f9ecadff1c11cf0e693d75098144f6d8557aa6d6a6ecea09f7192a11b76f199
-
SSDEEP
3072:w9bAA1L082scCCls2neMHqLmBppDvX4dmRvEFURO:ZABRfcr+u7KK5Tq2S
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4784 msedge.exe 4784 msedge.exe 2776 msedge.exe 2776 msedge.exe 4312 identity_helper.exe 4312 identity_helper.exe 3360 msedge.exe 3360 msedge.exe 3360 msedge.exe 3360 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2776 wrote to memory of 3332 2776 msedge.exe 85 PID 2776 wrote to memory of 3332 2776 msedge.exe 85 PID 2776 wrote to memory of 3692 2776 msedge.exe 86 PID 2776 wrote to memory of 3692 2776 msedge.exe 86 PID 2776 wrote to memory of 3692 2776 msedge.exe 86 PID 2776 wrote to memory of 3692 2776 msedge.exe 86 PID 2776 wrote to memory of 3692 2776 msedge.exe 86 PID 2776 wrote to memory of 3692 2776 msedge.exe 86 PID 2776 wrote to memory of 3692 2776 msedge.exe 86 PID 2776 wrote to memory of 3692 2776 msedge.exe 86 PID 2776 wrote to memory of 3692 2776 msedge.exe 86 PID 2776 wrote to memory of 3692 2776 msedge.exe 86 PID 2776 wrote to memory of 3692 2776 msedge.exe 86 PID 2776 wrote to memory of 3692 2776 msedge.exe 86 PID 2776 wrote to memory of 3692 2776 msedge.exe 86 PID 2776 wrote to memory of 3692 2776 msedge.exe 86 PID 2776 wrote to memory of 3692 2776 msedge.exe 86 PID 2776 wrote to memory of 3692 2776 msedge.exe 86 PID 2776 wrote to memory of 3692 2776 msedge.exe 86 PID 2776 wrote to memory of 3692 2776 msedge.exe 86 PID 2776 wrote to memory of 3692 2776 msedge.exe 86 PID 2776 wrote to memory of 3692 2776 msedge.exe 86 PID 2776 wrote to memory of 3692 2776 msedge.exe 86 PID 2776 wrote to memory of 3692 2776 msedge.exe 86 PID 2776 wrote to memory of 3692 2776 msedge.exe 86 PID 2776 wrote to memory of 3692 2776 msedge.exe 86 PID 2776 wrote to memory of 3692 2776 msedge.exe 86 PID 2776 wrote to memory of 3692 2776 msedge.exe 86 PID 2776 wrote to memory of 3692 2776 msedge.exe 86 PID 2776 wrote to memory of 3692 2776 msedge.exe 86 PID 2776 wrote to memory of 3692 2776 msedge.exe 86 PID 2776 wrote to memory of 3692 2776 msedge.exe 86 PID 2776 wrote to memory of 3692 2776 msedge.exe 86 PID 2776 wrote to memory of 3692 2776 msedge.exe 86 PID 2776 wrote to memory of 3692 2776 msedge.exe 86 PID 2776 wrote to memory of 3692 2776 msedge.exe 86 PID 2776 wrote to memory of 3692 2776 msedge.exe 86 PID 2776 wrote to memory of 3692 2776 msedge.exe 86 PID 2776 wrote to memory of 3692 2776 msedge.exe 86 PID 2776 wrote to memory of 3692 2776 msedge.exe 86 PID 2776 wrote to memory of 3692 2776 msedge.exe 86 PID 2776 wrote to memory of 3692 2776 msedge.exe 86 PID 2776 wrote to memory of 4784 2776 msedge.exe 87 PID 2776 wrote to memory of 4784 2776 msedge.exe 87 PID 2776 wrote to memory of 5096 2776 msedge.exe 88 PID 2776 wrote to memory of 5096 2776 msedge.exe 88 PID 2776 wrote to memory of 5096 2776 msedge.exe 88 PID 2776 wrote to memory of 5096 2776 msedge.exe 88 PID 2776 wrote to memory of 5096 2776 msedge.exe 88 PID 2776 wrote to memory of 5096 2776 msedge.exe 88 PID 2776 wrote to memory of 5096 2776 msedge.exe 88 PID 2776 wrote to memory of 5096 2776 msedge.exe 88 PID 2776 wrote to memory of 5096 2776 msedge.exe 88 PID 2776 wrote to memory of 5096 2776 msedge.exe 88 PID 2776 wrote to memory of 5096 2776 msedge.exe 88 PID 2776 wrote to memory of 5096 2776 msedge.exe 88 PID 2776 wrote to memory of 5096 2776 msedge.exe 88 PID 2776 wrote to memory of 5096 2776 msedge.exe 88 PID 2776 wrote to memory of 5096 2776 msedge.exe 88 PID 2776 wrote to memory of 5096 2776 msedge.exe 88 PID 2776 wrote to memory of 5096 2776 msedge.exe 88 PID 2776 wrote to memory of 5096 2776 msedge.exe 88 PID 2776 wrote to memory of 5096 2776 msedge.exe 88 PID 2776 wrote to memory of 5096 2776 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\72ee3663694c2b1607c1deacee872145_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbe6c446f8,0x7ffbe6c44708,0x7ffbe6c447182⤵PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,12068111452542435687,807538391894523775,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2004 /prefetch:22⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,12068111452542435687,807538391894523775,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2396 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,12068111452542435687,807538391894523775,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,12068111452542435687,807538391894523775,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,12068111452542435687,807538391894523775,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,12068111452542435687,807538391894523775,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,12068111452542435687,807538391894523775,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:82⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,12068111452542435687,807538391894523775,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,12068111452542435687,807538391894523775,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,12068111452542435687,807538391894523775,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,12068111452542435687,807538391894523775,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4104 /prefetch:12⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,12068111452542435687,807538391894523775,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:12⤵PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,12068111452542435687,807538391894523775,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2956 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3360
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2120
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1252
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
790B
MD5ad3dd26a33a37891f2cbe95eec637822
SHA1e8aee4faf846a1da5e58ebc25dbd0e6058d2221e
SHA2563c80301b7296802512a3b26abe800d6de55af105cc9f35a742a5016fb93030fc
SHA5129cd8a212efb4d8c12d2ece2dcdefdec1ee942449bb0cf2fe2f5c6fdf6aeb166b92ddc41fe3753e08198e172964a3d8385b676975a3155a70526ff426223ff120
-
Filesize
6KB
MD51104fd36c89391ede59e008230f1a271
SHA141228ead0557fd56773e19ac6da215ecad68cb95
SHA2563fbc589418e8781a0a7d8397e26e57b7cdefa622ba11b56cd4d905cd60d9a181
SHA512b43decd1cab24d51494e848decaebeecd89962be4de7a48140677dabd42e3f0657714aae80406763c94119e54a28738fac8c8f1b56a45f6ba8466670fc1c01d5
-
Filesize
6KB
MD508dbbb08afa9af2eb1dfe92efdca18e6
SHA1195d149c34ddaf1f0cd14a75796be31b3a7769a1
SHA2560e67c2285ee1c811201ad3429303027c66322fa6c41aef39d9c4e1b7104619e3
SHA512995da6e50e109b07f730c78aced5d006ce26ad1e385545a40c08c3cc52b9b5ad58adca04e16b5b3928070dfcbbd430b4cd09e923d089f1819c977c1b3d6bb1ae
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD55b9ec5cb002dafd48afaa6131abacff9
SHA1d5ea96d0fd08de3b9b89617c83b1971c30d44b98
SHA2561657cd605e838aff60430032464f5d60f759b28103c95829d3b34a0fea4a709d
SHA5120e370112b565e2b726eff50d53f1905e57e023d9e6d28d2ac5851c1d4659612d50e92a51c4e55a0e987e0d1e6e160dd44fd8bf9f6d308a4a360b0cfbc8ed59a6