Analysis
-
max time kernel
145s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 21:27
Static task
static1
Behavioral task
behavioral1
Sample
76d581862fd8d9b64f71cf6449bb5955_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
76d581862fd8d9b64f71cf6449bb5955_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
76d581862fd8d9b64f71cf6449bb5955_JaffaCakes118.html
-
Size
16KB
-
MD5
76d581862fd8d9b64f71cf6449bb5955
-
SHA1
091d48c09b97d6438c806b66cda8ec007d65adaf
-
SHA256
979ea5b11a88659eef89773841431e70875b2f0b2dd2d1d84ebff51b6cdad98e
-
SHA512
0ebed1b6e9ccdd6a310c5e02daede94e083d95a7f27f5ffe791bb13a4e5d2f575c7cfd64961f7fecca7e59c2d8a42e0e2bc072920eee7cb3e949e0300409b8cf
-
SSDEEP
384:L99FqVaOBMl7+sPuU68f+NyDxQIFx1t0sT22V:zEVaOCXM8fmyDxQIFx1t0sT22V
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4884 msedge.exe 4884 msedge.exe 2392 msedge.exe 2392 msedge.exe 1528 identity_helper.exe 1528 identity_helper.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2096 2392 msedge.exe 82 PID 2392 wrote to memory of 2096 2392 msedge.exe 82 PID 2392 wrote to memory of 1444 2392 msedge.exe 83 PID 2392 wrote to memory of 1444 2392 msedge.exe 83 PID 2392 wrote to memory of 1444 2392 msedge.exe 83 PID 2392 wrote to memory of 1444 2392 msedge.exe 83 PID 2392 wrote to memory of 1444 2392 msedge.exe 83 PID 2392 wrote to memory of 1444 2392 msedge.exe 83 PID 2392 wrote to memory of 1444 2392 msedge.exe 83 PID 2392 wrote to memory of 1444 2392 msedge.exe 83 PID 2392 wrote to memory of 1444 2392 msedge.exe 83 PID 2392 wrote to memory of 1444 2392 msedge.exe 83 PID 2392 wrote to memory of 1444 2392 msedge.exe 83 PID 2392 wrote to memory of 1444 2392 msedge.exe 83 PID 2392 wrote to memory of 1444 2392 msedge.exe 83 PID 2392 wrote to memory of 1444 2392 msedge.exe 83 PID 2392 wrote to memory of 1444 2392 msedge.exe 83 PID 2392 wrote to memory of 1444 2392 msedge.exe 83 PID 2392 wrote to memory of 1444 2392 msedge.exe 83 PID 2392 wrote to memory of 1444 2392 msedge.exe 83 PID 2392 wrote to memory of 1444 2392 msedge.exe 83 PID 2392 wrote to memory of 1444 2392 msedge.exe 83 PID 2392 wrote to memory of 1444 2392 msedge.exe 83 PID 2392 wrote to memory of 1444 2392 msedge.exe 83 PID 2392 wrote to memory of 1444 2392 msedge.exe 83 PID 2392 wrote to memory of 1444 2392 msedge.exe 83 PID 2392 wrote to memory of 1444 2392 msedge.exe 83 PID 2392 wrote to memory of 1444 2392 msedge.exe 83 PID 2392 wrote to memory of 1444 2392 msedge.exe 83 PID 2392 wrote to memory of 1444 2392 msedge.exe 83 PID 2392 wrote to memory of 1444 2392 msedge.exe 83 PID 2392 wrote to memory of 1444 2392 msedge.exe 83 PID 2392 wrote to memory of 1444 2392 msedge.exe 83 PID 2392 wrote to memory of 1444 2392 msedge.exe 83 PID 2392 wrote to memory of 1444 2392 msedge.exe 83 PID 2392 wrote to memory of 1444 2392 msedge.exe 83 PID 2392 wrote to memory of 1444 2392 msedge.exe 83 PID 2392 wrote to memory of 1444 2392 msedge.exe 83 PID 2392 wrote to memory of 1444 2392 msedge.exe 83 PID 2392 wrote to memory of 1444 2392 msedge.exe 83 PID 2392 wrote to memory of 1444 2392 msedge.exe 83 PID 2392 wrote to memory of 1444 2392 msedge.exe 83 PID 2392 wrote to memory of 4884 2392 msedge.exe 84 PID 2392 wrote to memory of 4884 2392 msedge.exe 84 PID 2392 wrote to memory of 4664 2392 msedge.exe 85 PID 2392 wrote to memory of 4664 2392 msedge.exe 85 PID 2392 wrote to memory of 4664 2392 msedge.exe 85 PID 2392 wrote to memory of 4664 2392 msedge.exe 85 PID 2392 wrote to memory of 4664 2392 msedge.exe 85 PID 2392 wrote to memory of 4664 2392 msedge.exe 85 PID 2392 wrote to memory of 4664 2392 msedge.exe 85 PID 2392 wrote to memory of 4664 2392 msedge.exe 85 PID 2392 wrote to memory of 4664 2392 msedge.exe 85 PID 2392 wrote to memory of 4664 2392 msedge.exe 85 PID 2392 wrote to memory of 4664 2392 msedge.exe 85 PID 2392 wrote to memory of 4664 2392 msedge.exe 85 PID 2392 wrote to memory of 4664 2392 msedge.exe 85 PID 2392 wrote to memory of 4664 2392 msedge.exe 85 PID 2392 wrote to memory of 4664 2392 msedge.exe 85 PID 2392 wrote to memory of 4664 2392 msedge.exe 85 PID 2392 wrote to memory of 4664 2392 msedge.exe 85 PID 2392 wrote to memory of 4664 2392 msedge.exe 85 PID 2392 wrote to memory of 4664 2392 msedge.exe 85 PID 2392 wrote to memory of 4664 2392 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\76d581862fd8d9b64f71cf6449bb5955_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff0aba46f8,0x7fff0aba4708,0x7fff0aba47182⤵PID:2096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,8521724571206243414,11385821250881811633,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,8521724571206243414,11385821250881811633,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,8521724571206243414,11385821250881811633,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8521724571206243414,11385821250881811633,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8521724571206243414,11385821250881811633,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,8521724571206243414,11385821250881811633,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4796 /prefetch:82⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,8521724571206243414,11385821250881811633,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4796 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8521724571206243414,11385821250881811633,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8521724571206243414,11385821250881811633,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:3732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8521724571206243414,11385821250881811633,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8521724571206243414,11385821250881811633,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,8521724571206243414,11385821250881811633,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4836 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4276
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4348
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
32KB
MD5f48baec69cc4dc0852d118259eff2d56
SHA1e64c6e4423421da5b35700154810cb67160bc32b
SHA256463d99ca5448f815a05b2d946ddae9eed3e21c335c0f4cfe7a16944e3512f76c
SHA51206fdccb5d9536ab7c68355dbf49ac02ebccad5a4ea01cb62200fd67728a6d05c276403e588a5bdceacf5e671913fc65b63e8b92456ca5493dae5b5a70e4a8b37
-
Filesize
6KB
MD5ebcb1fb57c3f97f163b088baa1199576
SHA12698bff06a817b50c782dd1cb6aeb242399053fa
SHA256a95aeaf289163fac0cab69b58dbbfbe9510c839ef9f4fc5a843c3c15c029dfa3
SHA5120079ae12c87e9e0f51b6ad343fe7debda1683a6a3f782b0a922236ee393a3018321716e871cc52518205e88feb78af25b531729c10b2946306e5e72070ed51a7
-
Filesize
5KB
MD5aadda2dcf5d44857f1e8f365291fc6cc
SHA182e7cd9915310c895de6dd43827bd894b66c4e46
SHA2563a23cf4226fdaa7e6ab1f090b5dcd35f18f7df0bfbce6666c01d220c7f88f52e
SHA51247e19d920e17ffa966ca5c8e32399f008c1f03e7e9f73eecb2039e3fdb24b0c6445b16829ab4a856ffd06e26184ba0f9d8bdf0cb4c5aa6033b25fc95efd44a05
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a233793caa4dbe6e34481c4a25e3aaa6
SHA1becff0e76515a1057f1c2c523954b280718dd21d
SHA2568081c297806972c9a32e291f0102f5a796d1ab8519b1700b45dd87d7e5e13ec4
SHA512252cf1d87c7e4b1825af8f5d2745137ef21e4cb1e4156f3d686da654e8c18ef9c32690e4b1797f1e1a46723cdb4855aaa3a4b58776f1d17bf1414e2cd253d698