Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
26/05/2024, 23:35
Static task
static1
Behavioral task
behavioral1
Sample
772e5e0817e65e733eac1d1ce3255147_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
772e5e0817e65e733eac1d1ce3255147_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
772e5e0817e65e733eac1d1ce3255147_JaffaCakes118.html
-
Size
228KB
-
MD5
772e5e0817e65e733eac1d1ce3255147
-
SHA1
8f3a3020666ae624976324e81458d700e0d98bda
-
SHA256
80111c2f9e7cea3e28f0de29311916871976c2c376f6db86af8a6edb60234a47
-
SHA512
99c6aec3312573595a59be9d122ad5965bff390394e48ec7db4c2e968544e5e3967a688c0dbdaaaf3f828817691aab411b44335cf7fbee27931408c2a8bb95fc
-
SSDEEP
6144:0xAkXDf+fDQXKBEYP2nTmOXMSZ/eSYRN78/EuD+:rkXDf+fDQXKBEYP2nTmOXMSZ/eSYRN7J
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3288 msedge.exe 3288 msedge.exe 3296 msedge.exe 3296 msedge.exe 1608 identity_helper.exe 1608 identity_helper.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3296 wrote to memory of 2716 3296 msedge.exe 82 PID 3296 wrote to memory of 2716 3296 msedge.exe 82 PID 3296 wrote to memory of 3956 3296 msedge.exe 83 PID 3296 wrote to memory of 3956 3296 msedge.exe 83 PID 3296 wrote to memory of 3956 3296 msedge.exe 83 PID 3296 wrote to memory of 3956 3296 msedge.exe 83 PID 3296 wrote to memory of 3956 3296 msedge.exe 83 PID 3296 wrote to memory of 3956 3296 msedge.exe 83 PID 3296 wrote to memory of 3956 3296 msedge.exe 83 PID 3296 wrote to memory of 3956 3296 msedge.exe 83 PID 3296 wrote to memory of 3956 3296 msedge.exe 83 PID 3296 wrote to memory of 3956 3296 msedge.exe 83 PID 3296 wrote to memory of 3956 3296 msedge.exe 83 PID 3296 wrote to memory of 3956 3296 msedge.exe 83 PID 3296 wrote to memory of 3956 3296 msedge.exe 83 PID 3296 wrote to memory of 3956 3296 msedge.exe 83 PID 3296 wrote to memory of 3956 3296 msedge.exe 83 PID 3296 wrote to memory of 3956 3296 msedge.exe 83 PID 3296 wrote to memory of 3956 3296 msedge.exe 83 PID 3296 wrote to memory of 3956 3296 msedge.exe 83 PID 3296 wrote to memory of 3956 3296 msedge.exe 83 PID 3296 wrote to memory of 3956 3296 msedge.exe 83 PID 3296 wrote to memory of 3956 3296 msedge.exe 83 PID 3296 wrote to memory of 3956 3296 msedge.exe 83 PID 3296 wrote to memory of 3956 3296 msedge.exe 83 PID 3296 wrote to memory of 3956 3296 msedge.exe 83 PID 3296 wrote to memory of 3956 3296 msedge.exe 83 PID 3296 wrote to memory of 3956 3296 msedge.exe 83 PID 3296 wrote to memory of 3956 3296 msedge.exe 83 PID 3296 wrote to memory of 3956 3296 msedge.exe 83 PID 3296 wrote to memory of 3956 3296 msedge.exe 83 PID 3296 wrote to memory of 3956 3296 msedge.exe 83 PID 3296 wrote to memory of 3956 3296 msedge.exe 83 PID 3296 wrote to memory of 3956 3296 msedge.exe 83 PID 3296 wrote to memory of 3956 3296 msedge.exe 83 PID 3296 wrote to memory of 3956 3296 msedge.exe 83 PID 3296 wrote to memory of 3956 3296 msedge.exe 83 PID 3296 wrote to memory of 3956 3296 msedge.exe 83 PID 3296 wrote to memory of 3956 3296 msedge.exe 83 PID 3296 wrote to memory of 3956 3296 msedge.exe 83 PID 3296 wrote to memory of 3956 3296 msedge.exe 83 PID 3296 wrote to memory of 3956 3296 msedge.exe 83 PID 3296 wrote to memory of 3288 3296 msedge.exe 84 PID 3296 wrote to memory of 3288 3296 msedge.exe 84 PID 3296 wrote to memory of 2108 3296 msedge.exe 85 PID 3296 wrote to memory of 2108 3296 msedge.exe 85 PID 3296 wrote to memory of 2108 3296 msedge.exe 85 PID 3296 wrote to memory of 2108 3296 msedge.exe 85 PID 3296 wrote to memory of 2108 3296 msedge.exe 85 PID 3296 wrote to memory of 2108 3296 msedge.exe 85 PID 3296 wrote to memory of 2108 3296 msedge.exe 85 PID 3296 wrote to memory of 2108 3296 msedge.exe 85 PID 3296 wrote to memory of 2108 3296 msedge.exe 85 PID 3296 wrote to memory of 2108 3296 msedge.exe 85 PID 3296 wrote to memory of 2108 3296 msedge.exe 85 PID 3296 wrote to memory of 2108 3296 msedge.exe 85 PID 3296 wrote to memory of 2108 3296 msedge.exe 85 PID 3296 wrote to memory of 2108 3296 msedge.exe 85 PID 3296 wrote to memory of 2108 3296 msedge.exe 85 PID 3296 wrote to memory of 2108 3296 msedge.exe 85 PID 3296 wrote to memory of 2108 3296 msedge.exe 85 PID 3296 wrote to memory of 2108 3296 msedge.exe 85 PID 3296 wrote to memory of 2108 3296 msedge.exe 85 PID 3296 wrote to memory of 2108 3296 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\772e5e0817e65e733eac1d1ce3255147_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc374346f8,0x7ffc37434708,0x7ffc374347182⤵PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,16534757541813893748,5742963655909953552,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,16534757541813893748,5742963655909953552,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,16534757541813893748,5742963655909953552,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16534757541813893748,5742963655909953552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16534757541813893748,5742963655909953552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16534757541813893748,5742963655909953552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:1348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,16534757541813893748,5742963655909953552,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5972 /prefetch:82⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,16534757541813893748,5742963655909953552,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5972 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16534757541813893748,5742963655909953552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5768 /prefetch:12⤵PID:3804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16534757541813893748,5742963655909953552,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:12⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16534757541813893748,5742963655909953552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16534757541813893748,5742963655909953552,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,16534757541813893748,5742963655909953552,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4896 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4416
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4060
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
257B
MD55faf4147e3ac2001907641ec026eba77
SHA11c397cc9b50eef82b2287033afe225bc8ce4b7a3
SHA256e25b6ac234281c7b4eff1f1093feb211175fce9cbb5b30394f4ab8ba39d1a210
SHA5125c37600daa971bdbe3908bf76c6851032ac0b084fe833d8c8e0786666583446ed8df5df30acf4e77e3476eb50b481fc534c71dc60488aea9df1919ebab2c8419
-
Filesize
5KB
MD5c718ae1e1336471007a93fafb5f6334c
SHA1e3a1e9d53f75cad21086a38e00e6f72355686d93
SHA256106723c64a87288172798f8efeb2901af275075bb6489c15c512e48777db5fae
SHA5124586ad3d1d37d3230b054014b2e50ff71929a4cbf313e356d823de5c8f860510489b478668182174547d39253f1bd6a8c70e2006075ee236a620e0febae4223d
-
Filesize
6KB
MD56c943ed68e3a5fa459b9c0d549fb7e56
SHA194bbb16dbe7eb67dacb3bdb0fae4cb55fe0dc096
SHA256abe71b6b4141ab1b6871538851992398e91b5c330568c1cf3b76aad0afeff127
SHA512b46c3254a420853571a3436163a74d710d26f225c02596b8bf8b90b9d42ebb27530ad9cb24053ff759bc5d420613e0763af67682bcdc7027e0be54f2ab0e6839
-
Filesize
6KB
MD584141df16a57eed0ff37afe4a7892f3c
SHA1fa4598eeedc79d0e0ad75f71c228602394473e83
SHA256802b955700f53016f7280785fbf4ab9c7bdd60e869c53116809149afe5fecbb8
SHA512d1b76e28dd1a194b8d977b4439464d768f4e39ec56906ad02b220fd51d422d47639286f4ad80a86700aa23dcd7ee69b4d303a376452e1ca0d110cb4d1fc75c45
-
Filesize
1KB
MD51a03ac154ffdb55a9943bfbb82ffee3c
SHA1cae3dabf76e62cf5b01eb4873543c347e349c1ec
SHA256529d06697760d5547d1ecb6279ba30aabd4e3ff571ceedda9d7a227037cbe556
SHA5123137845f13cdf2f912c6baf807975165ef3e9cf5371cd2cb207e2dfdf44964c8de4dcbae135105cbda29eafd931cbdb6e5d2931b42d04b9a112afe612a054be2
-
Filesize
708B
MD5a70b4b360cb3cfb8ab9b71e4a4bb4290
SHA18db73d04effe01401b9c198c764f09ddeaf42784
SHA2569063501fd80f73fd3baff8d83f998ecd1f6cdde9e7415b5761022e7902dc5671
SHA512d53e1fad71032d5a5692e7c38a8106aafba6d2ca080eed046b3ca65efe722fc8259388a8ad4d0663af0f705655ad6586cf41d6bc7aa54c91fa5c1d26f8f300ea
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b9032d9d0a14448155871672b1ac6168
SHA112fef08cd3dc546f40d557e955364af67ca1fb20
SHA25607ac49b57961cd3fd990d3b0a432204279ddcece507788330ab9c6253cd31c7d
SHA5128cc9bad65b9ef9e5159e1cfbac4a8aed4b0503a6dbd08bece4d53b733b6bb12cb29f425881b8dfd280929cfca6ca2353ca10e9188a5ce77eff5a2b6038d47264