Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26/05/2024, 23:10
Static task
static1
Behavioral task
behavioral1
Sample
771e290291b95601283f26cd365fdc58_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
771e290291b95601283f26cd365fdc58_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
771e290291b95601283f26cd365fdc58_JaffaCakes118.html
-
Size
6KB
-
MD5
771e290291b95601283f26cd365fdc58
-
SHA1
15f07013f4c2112d3f874ccf85e16722cde0d491
-
SHA256
b8053411ca7575c23150ee7ba6822705204d1b95158e41d1cc9a04e3d71061b2
-
SHA512
1329a228791a8148a7dfcfc8b605eaed31594bc7568814ad1f54761d65e8e1494aa78ba79fc565fddcfe8c5b39e547ad92a6211a82ffa5411f2570683cd42261
-
SSDEEP
192:0omjjl7vFZ7v8bKZkRcIdBmI2fC5msshCvHNC:0omtf2jiC5a
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4228 msedge.exe 4228 msedge.exe 4000 msedge.exe 4000 msedge.exe 1860 identity_helper.exe 1860 identity_helper.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4000 wrote to memory of 220 4000 msedge.exe 82 PID 4000 wrote to memory of 220 4000 msedge.exe 82 PID 4000 wrote to memory of 4256 4000 msedge.exe 83 PID 4000 wrote to memory of 4256 4000 msedge.exe 83 PID 4000 wrote to memory of 4256 4000 msedge.exe 83 PID 4000 wrote to memory of 4256 4000 msedge.exe 83 PID 4000 wrote to memory of 4256 4000 msedge.exe 83 PID 4000 wrote to memory of 4256 4000 msedge.exe 83 PID 4000 wrote to memory of 4256 4000 msedge.exe 83 PID 4000 wrote to memory of 4256 4000 msedge.exe 83 PID 4000 wrote to memory of 4256 4000 msedge.exe 83 PID 4000 wrote to memory of 4256 4000 msedge.exe 83 PID 4000 wrote to memory of 4256 4000 msedge.exe 83 PID 4000 wrote to memory of 4256 4000 msedge.exe 83 PID 4000 wrote to memory of 4256 4000 msedge.exe 83 PID 4000 wrote to memory of 4256 4000 msedge.exe 83 PID 4000 wrote to memory of 4256 4000 msedge.exe 83 PID 4000 wrote to memory of 4256 4000 msedge.exe 83 PID 4000 wrote to memory of 4256 4000 msedge.exe 83 PID 4000 wrote to memory of 4256 4000 msedge.exe 83 PID 4000 wrote to memory of 4256 4000 msedge.exe 83 PID 4000 wrote to memory of 4256 4000 msedge.exe 83 PID 4000 wrote to memory of 4256 4000 msedge.exe 83 PID 4000 wrote to memory of 4256 4000 msedge.exe 83 PID 4000 wrote to memory of 4256 4000 msedge.exe 83 PID 4000 wrote to memory of 4256 4000 msedge.exe 83 PID 4000 wrote to memory of 4256 4000 msedge.exe 83 PID 4000 wrote to memory of 4256 4000 msedge.exe 83 PID 4000 wrote to memory of 4256 4000 msedge.exe 83 PID 4000 wrote to memory of 4256 4000 msedge.exe 83 PID 4000 wrote to memory of 4256 4000 msedge.exe 83 PID 4000 wrote to memory of 4256 4000 msedge.exe 83 PID 4000 wrote to memory of 4256 4000 msedge.exe 83 PID 4000 wrote to memory of 4256 4000 msedge.exe 83 PID 4000 wrote to memory of 4256 4000 msedge.exe 83 PID 4000 wrote to memory of 4256 4000 msedge.exe 83 PID 4000 wrote to memory of 4256 4000 msedge.exe 83 PID 4000 wrote to memory of 4256 4000 msedge.exe 83 PID 4000 wrote to memory of 4256 4000 msedge.exe 83 PID 4000 wrote to memory of 4256 4000 msedge.exe 83 PID 4000 wrote to memory of 4256 4000 msedge.exe 83 PID 4000 wrote to memory of 4256 4000 msedge.exe 83 PID 4000 wrote to memory of 4228 4000 msedge.exe 84 PID 4000 wrote to memory of 4228 4000 msedge.exe 84 PID 4000 wrote to memory of 2376 4000 msedge.exe 85 PID 4000 wrote to memory of 2376 4000 msedge.exe 85 PID 4000 wrote to memory of 2376 4000 msedge.exe 85 PID 4000 wrote to memory of 2376 4000 msedge.exe 85 PID 4000 wrote to memory of 2376 4000 msedge.exe 85 PID 4000 wrote to memory of 2376 4000 msedge.exe 85 PID 4000 wrote to memory of 2376 4000 msedge.exe 85 PID 4000 wrote to memory of 2376 4000 msedge.exe 85 PID 4000 wrote to memory of 2376 4000 msedge.exe 85 PID 4000 wrote to memory of 2376 4000 msedge.exe 85 PID 4000 wrote to memory of 2376 4000 msedge.exe 85 PID 4000 wrote to memory of 2376 4000 msedge.exe 85 PID 4000 wrote to memory of 2376 4000 msedge.exe 85 PID 4000 wrote to memory of 2376 4000 msedge.exe 85 PID 4000 wrote to memory of 2376 4000 msedge.exe 85 PID 4000 wrote to memory of 2376 4000 msedge.exe 85 PID 4000 wrote to memory of 2376 4000 msedge.exe 85 PID 4000 wrote to memory of 2376 4000 msedge.exe 85 PID 4000 wrote to memory of 2376 4000 msedge.exe 85 PID 4000 wrote to memory of 2376 4000 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\771e290291b95601283f26cd365fdc58_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa088046f8,0x7ffa08804708,0x7ffa088047182⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,14991699647313237312,15315969551587755085,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,14991699647313237312,15315969551587755085,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,14991699647313237312,15315969551587755085,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,14991699647313237312,15315969551587755085,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,14991699647313237312,15315969551587755085,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,14991699647313237312,15315969551587755085,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 /prefetch:82⤵PID:1548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,14991699647313237312,15315969551587755085,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,14991699647313237312,15315969551587755085,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,14991699647313237312,15315969551587755085,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,14991699647313237312,15315969551587755085,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3944 /prefetch:12⤵PID:2484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,14991699647313237312,15315969551587755085,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,14991699647313237312,15315969551587755085,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4856 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4508
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4088
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2348
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
5KB
MD5c09dfc867fc12c30735d26fd2ffcb547
SHA1a1e084578199d321b310bac1fef94792b7ed4e1b
SHA256d6ccab25b8afda3a00b0cb132cdadd3c0be01f1b4cc9eb4b8577498004c6968f
SHA51221af28bcaf8488abd733877495239af8ccba35e8db90e3425390d63f5059c08b3cebdf841ebfaf5137483e09bbde4131ee20326d052a3ac66b99420a222de3f0
-
Filesize
6KB
MD5e9dc23172355dada2ec17d0e5b3d86d1
SHA168ed7d6d765ffb77497da3c191fc9b3020e75ffa
SHA256bde92266937e2ea272fe9eff9a20bf3bcdc1a0f2a2890e62e76a170da34b4fcc
SHA512864d2ec0d5c4ded4ad8c7ba4f0a1ead439f866da5474ae0e76b6080bc2971e5f0a17689e2e2022849fe2627feccae8d62e863a4aaa6c90ebd436c9f49dbdd428
-
Filesize
6KB
MD5a8195fca7cf3b1d8b4030ae8c0fb5d18
SHA1ea40d91c1676092329ffabef33e07cdac10b1ac7
SHA2568f8518e4d5d3e1497046154ab0c0a04fea14cb2eac8919b86d2ae8bdc054204e
SHA512155cd8371bb724114486a769d849dd0b17fb5c15ded1098f97687e7c3bc231770f546afa27e8e9eb157b1b61472137a76e89b0b39b69936498a0cb3a9f1f5585
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c74992fb6b1258bb1eadd5533135dc57
SHA125af051ee8883e941a41b129d08b50cc6e2c9423
SHA2561c60dd548cab45f3e97ad08be04eb6a7aec07c044ebb8134a7207b247003d1de
SHA5125a5e02996c623c4f0530e56237cc3dfc605d39978a5045b5ea73a30be9c66d2104e2dbc884d0b755315a6fb6bb0b1399958b71b08300cabbfcad061e1aed8114