Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 20:35
Static task
static1
Behavioral task
behavioral1
Sample
732a663e6d9b10721a3dd7ec5783412f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
732a663e6d9b10721a3dd7ec5783412f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
732a663e6d9b10721a3dd7ec5783412f_JaffaCakes118.html
-
Size
144KB
-
MD5
732a663e6d9b10721a3dd7ec5783412f
-
SHA1
4eb09de468460e439ff455132901a92b076eb5e1
-
SHA256
5c82f9b568dc612b8a1e51ebff18f3ba053ea8df14ac353ef4d3466e8aa34d33
-
SHA512
a1bbd1b94d6cc99e734cb26daa1465e82d8608dfbbe204fa7737fdaa49befc9f5fffd090b5bf0359052559ae148c9f596b4251ebc03fea254c6383abeaf68f43
-
SSDEEP
1536:Sy5+8exswp9Cqb8JVczVsEQIzVYlD64I1QL4RG4eHhDbGBJEMKtXSn+kCZcEyjD6:S+wpcqb6VMsAzVYlD64r/Q+
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 45 pastebin.com 46 pastebin.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 6100 msedge.exe 6100 msedge.exe 4140 msedge.exe 4140 msedge.exe 3724 identity_helper.exe 3724 identity_helper.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4140 wrote to memory of 6084 4140 msedge.exe 83 PID 4140 wrote to memory of 6084 4140 msedge.exe 83 PID 4140 wrote to memory of 936 4140 msedge.exe 85 PID 4140 wrote to memory of 936 4140 msedge.exe 85 PID 4140 wrote to memory of 936 4140 msedge.exe 85 PID 4140 wrote to memory of 936 4140 msedge.exe 85 PID 4140 wrote to memory of 936 4140 msedge.exe 85 PID 4140 wrote to memory of 936 4140 msedge.exe 85 PID 4140 wrote to memory of 936 4140 msedge.exe 85 PID 4140 wrote to memory of 936 4140 msedge.exe 85 PID 4140 wrote to memory of 936 4140 msedge.exe 85 PID 4140 wrote to memory of 936 4140 msedge.exe 85 PID 4140 wrote to memory of 936 4140 msedge.exe 85 PID 4140 wrote to memory of 936 4140 msedge.exe 85 PID 4140 wrote to memory of 936 4140 msedge.exe 85 PID 4140 wrote to memory of 936 4140 msedge.exe 85 PID 4140 wrote to memory of 936 4140 msedge.exe 85 PID 4140 wrote to memory of 936 4140 msedge.exe 85 PID 4140 wrote to memory of 936 4140 msedge.exe 85 PID 4140 wrote to memory of 936 4140 msedge.exe 85 PID 4140 wrote to memory of 936 4140 msedge.exe 85 PID 4140 wrote to memory of 936 4140 msedge.exe 85 PID 4140 wrote to memory of 936 4140 msedge.exe 85 PID 4140 wrote to memory of 936 4140 msedge.exe 85 PID 4140 wrote to memory of 936 4140 msedge.exe 85 PID 4140 wrote to memory of 936 4140 msedge.exe 85 PID 4140 wrote to memory of 936 4140 msedge.exe 85 PID 4140 wrote to memory of 936 4140 msedge.exe 85 PID 4140 wrote to memory of 936 4140 msedge.exe 85 PID 4140 wrote to memory of 936 4140 msedge.exe 85 PID 4140 wrote to memory of 936 4140 msedge.exe 85 PID 4140 wrote to memory of 936 4140 msedge.exe 85 PID 4140 wrote to memory of 936 4140 msedge.exe 85 PID 4140 wrote to memory of 936 4140 msedge.exe 85 PID 4140 wrote to memory of 936 4140 msedge.exe 85 PID 4140 wrote to memory of 936 4140 msedge.exe 85 PID 4140 wrote to memory of 936 4140 msedge.exe 85 PID 4140 wrote to memory of 936 4140 msedge.exe 85 PID 4140 wrote to memory of 936 4140 msedge.exe 85 PID 4140 wrote to memory of 936 4140 msedge.exe 85 PID 4140 wrote to memory of 936 4140 msedge.exe 85 PID 4140 wrote to memory of 936 4140 msedge.exe 85 PID 4140 wrote to memory of 6100 4140 msedge.exe 86 PID 4140 wrote to memory of 6100 4140 msedge.exe 86 PID 4140 wrote to memory of 5324 4140 msedge.exe 87 PID 4140 wrote to memory of 5324 4140 msedge.exe 87 PID 4140 wrote to memory of 5324 4140 msedge.exe 87 PID 4140 wrote to memory of 5324 4140 msedge.exe 87 PID 4140 wrote to memory of 5324 4140 msedge.exe 87 PID 4140 wrote to memory of 5324 4140 msedge.exe 87 PID 4140 wrote to memory of 5324 4140 msedge.exe 87 PID 4140 wrote to memory of 5324 4140 msedge.exe 87 PID 4140 wrote to memory of 5324 4140 msedge.exe 87 PID 4140 wrote to memory of 5324 4140 msedge.exe 87 PID 4140 wrote to memory of 5324 4140 msedge.exe 87 PID 4140 wrote to memory of 5324 4140 msedge.exe 87 PID 4140 wrote to memory of 5324 4140 msedge.exe 87 PID 4140 wrote to memory of 5324 4140 msedge.exe 87 PID 4140 wrote to memory of 5324 4140 msedge.exe 87 PID 4140 wrote to memory of 5324 4140 msedge.exe 87 PID 4140 wrote to memory of 5324 4140 msedge.exe 87 PID 4140 wrote to memory of 5324 4140 msedge.exe 87 PID 4140 wrote to memory of 5324 4140 msedge.exe 87 PID 4140 wrote to memory of 5324 4140 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\732a663e6d9b10721a3dd7ec5783412f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xb4,0x108,0x7ffa127d46f8,0x7ffa127d4708,0x7ffa127d47182⤵PID:6084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,11255299518537048758,17765263907143141733,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,11255299518537048758,17765263907143141733,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2580 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:6100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,11255299518537048758,17765263907143141733,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:5324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11255299518537048758,17765263907143141733,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:12⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11255299518537048758,17765263907143141733,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:12⤵PID:1764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11255299518537048758,17765263907143141733,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11255299518537048758,17765263907143141733,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,11255299518537048758,17765263907143141733,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5740 /prefetch:82⤵PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,11255299518537048758,17765263907143141733,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5740 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11255299518537048758,17765263907143141733,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:6120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11255299518537048758,17765263907143141733,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:12⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,11255299518537048758,17765263907143141733,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1980
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2144
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
547B
MD5860ba9dc727046b93cdb2d6622fa9923
SHA1b85c79b04eb7cf3d1b425b8f636ec87caeafb49b
SHA256981911387dd9afc47d058adc5c367653452da429ddc21a1d73d4935d65fdc373
SHA512a048d77cadfe9e86ea38cf2e8ae04c69b2453081040b87f80250798ece76b146f34acf2c91b6c1ee8161af53c52eeeccafc0253d263cf213e52d1b0e6bd63b6f
-
Filesize
5KB
MD5e1280e48c9da7ab8c71c68611cd93565
SHA17dedf781b8ad036e8fda06e7848200ae5d4bcc18
SHA25687fa24c286a161c44efd3982f9bca82db0bfc5aa875dc0fcde6f2058c5002148
SHA512dd3296f3fcc25f41b45c412dbda871a4e95c100d746aca228b0752aa70ccf512f0c0794af56c7d5264e5017ff9f2f957910ba73b83b2e067e265af7edcf5dd95
-
Filesize
6KB
MD59ed216cf0085aba91ea8abbd8e55d8cb
SHA16c3a3a0841b3ecc2311aed0652bd29f600eaf10a
SHA256f89cf4829c57d9d93a1c40c228be7d102eb0587fff9a472e0c7de6e5142c4009
SHA512758e236f6ec70f7798111aa33a8f818008867be98be2e84c588e2f025646a2d8134ce678c0d973e8de0b170b2f831ddb95267691cce4c1c05c62ef5d1f084cee
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD590061ec505face0f2dbfacce667b9a58
SHA15eaf547c367426c563971ecd149ee8e7e6f21c9a
SHA25676c673e2d6333c0e9d850826e04c5c46dfc1de8a6c934ae6c78afce6e777dda4
SHA5121a8e7de43afeb1a812aee5665794e8f3987ffc7746b6df77b6e4a26b27aef7b591ec6205715936c883e7891a8555302fdaad938c4ddb2fe41ee19ac8301c7032