Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 23:43
Static task
static1
Behavioral task
behavioral1
Sample
773474cec0a1cf7e828fb27278fedc8a_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
773474cec0a1cf7e828fb27278fedc8a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
773474cec0a1cf7e828fb27278fedc8a_JaffaCakes118.html
-
Size
128KB
-
MD5
773474cec0a1cf7e828fb27278fedc8a
-
SHA1
fcfb269350c847975aa6108def1a32f98d56aa6f
-
SHA256
48ef1be82f347a6ad827608055aaa3dbec741f7c931350517b5a2e1228038ece
-
SHA512
5e09cbea9f295d0702180f777a534cd288690f2c71792bfe8457b64955185b8f38e8b62463c400afeee61774bd0a81dbf45ff67dc502e60ad8f1e3bcbcb8422d
-
SSDEEP
1536:YNpJiwhfyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy+:YffyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4588 msedge.exe 4588 msedge.exe 3612 msedge.exe 3612 msedge.exe 2132 identity_helper.exe 2132 identity_helper.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3612 wrote to memory of 3080 3612 msedge.exe 82 PID 3612 wrote to memory of 3080 3612 msedge.exe 82 PID 3612 wrote to memory of 3160 3612 msedge.exe 83 PID 3612 wrote to memory of 3160 3612 msedge.exe 83 PID 3612 wrote to memory of 3160 3612 msedge.exe 83 PID 3612 wrote to memory of 3160 3612 msedge.exe 83 PID 3612 wrote to memory of 3160 3612 msedge.exe 83 PID 3612 wrote to memory of 3160 3612 msedge.exe 83 PID 3612 wrote to memory of 3160 3612 msedge.exe 83 PID 3612 wrote to memory of 3160 3612 msedge.exe 83 PID 3612 wrote to memory of 3160 3612 msedge.exe 83 PID 3612 wrote to memory of 3160 3612 msedge.exe 83 PID 3612 wrote to memory of 3160 3612 msedge.exe 83 PID 3612 wrote to memory of 3160 3612 msedge.exe 83 PID 3612 wrote to memory of 3160 3612 msedge.exe 83 PID 3612 wrote to memory of 3160 3612 msedge.exe 83 PID 3612 wrote to memory of 3160 3612 msedge.exe 83 PID 3612 wrote to memory of 3160 3612 msedge.exe 83 PID 3612 wrote to memory of 3160 3612 msedge.exe 83 PID 3612 wrote to memory of 3160 3612 msedge.exe 83 PID 3612 wrote to memory of 3160 3612 msedge.exe 83 PID 3612 wrote to memory of 3160 3612 msedge.exe 83 PID 3612 wrote to memory of 3160 3612 msedge.exe 83 PID 3612 wrote to memory of 3160 3612 msedge.exe 83 PID 3612 wrote to memory of 3160 3612 msedge.exe 83 PID 3612 wrote to memory of 3160 3612 msedge.exe 83 PID 3612 wrote to memory of 3160 3612 msedge.exe 83 PID 3612 wrote to memory of 3160 3612 msedge.exe 83 PID 3612 wrote to memory of 3160 3612 msedge.exe 83 PID 3612 wrote to memory of 3160 3612 msedge.exe 83 PID 3612 wrote to memory of 3160 3612 msedge.exe 83 PID 3612 wrote to memory of 3160 3612 msedge.exe 83 PID 3612 wrote to memory of 3160 3612 msedge.exe 83 PID 3612 wrote to memory of 3160 3612 msedge.exe 83 PID 3612 wrote to memory of 3160 3612 msedge.exe 83 PID 3612 wrote to memory of 3160 3612 msedge.exe 83 PID 3612 wrote to memory of 3160 3612 msedge.exe 83 PID 3612 wrote to memory of 3160 3612 msedge.exe 83 PID 3612 wrote to memory of 3160 3612 msedge.exe 83 PID 3612 wrote to memory of 3160 3612 msedge.exe 83 PID 3612 wrote to memory of 3160 3612 msedge.exe 83 PID 3612 wrote to memory of 3160 3612 msedge.exe 83 PID 3612 wrote to memory of 4588 3612 msedge.exe 84 PID 3612 wrote to memory of 4588 3612 msedge.exe 84 PID 3612 wrote to memory of 4204 3612 msedge.exe 85 PID 3612 wrote to memory of 4204 3612 msedge.exe 85 PID 3612 wrote to memory of 4204 3612 msedge.exe 85 PID 3612 wrote to memory of 4204 3612 msedge.exe 85 PID 3612 wrote to memory of 4204 3612 msedge.exe 85 PID 3612 wrote to memory of 4204 3612 msedge.exe 85 PID 3612 wrote to memory of 4204 3612 msedge.exe 85 PID 3612 wrote to memory of 4204 3612 msedge.exe 85 PID 3612 wrote to memory of 4204 3612 msedge.exe 85 PID 3612 wrote to memory of 4204 3612 msedge.exe 85 PID 3612 wrote to memory of 4204 3612 msedge.exe 85 PID 3612 wrote to memory of 4204 3612 msedge.exe 85 PID 3612 wrote to memory of 4204 3612 msedge.exe 85 PID 3612 wrote to memory of 4204 3612 msedge.exe 85 PID 3612 wrote to memory of 4204 3612 msedge.exe 85 PID 3612 wrote to memory of 4204 3612 msedge.exe 85 PID 3612 wrote to memory of 4204 3612 msedge.exe 85 PID 3612 wrote to memory of 4204 3612 msedge.exe 85 PID 3612 wrote to memory of 4204 3612 msedge.exe 85 PID 3612 wrote to memory of 4204 3612 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\773474cec0a1cf7e828fb27278fedc8a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9903a46f8,0x7ff9903a4708,0x7ff9903a47182⤵PID:3080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,8899329081926566817,1283804181988487803,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,8899329081926566817,1283804181988487803,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,8899329081926566817,1283804181988487803,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,8899329081926566817,1283804181988487803,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,8899329081926566817,1283804181988487803,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,8899329081926566817,1283804181988487803,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:82⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,8899329081926566817,1283804181988487803,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,8899329081926566817,1283804181988487803,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,8899329081926566817,1283804181988487803,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:12⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,8899329081926566817,1283804181988487803,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4100 /prefetch:12⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,8899329081926566817,1283804181988487803,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,8899329081926566817,1283804181988487803,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4456
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2404
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
5KB
MD58ed07da08b86a86028d7bde67bbf00c5
SHA169ee390d10ee20c62d352777fde30ead2f14b396
SHA25657627db16c53b8c85c9816caaef99d2b250ee192222861d4aceeb20c386f21ef
SHA512d89c346ae8b15dd1b9c02b4785316c050fdae97cc23bd28990d7f02db8ee30bcc3b166a7fc1ebe330e5e0acdc710b8a236804d85a63202ce6fbbada94f6e945b
-
Filesize
6KB
MD55f42f50a1a36993e0192b4121e7504cc
SHA14ddc71c60e002f270fe5cd756ca34ab1a91e038c
SHA256a6807ccde92137e6faaf4b51e0b74cec6ddfc74c268d781483a7272d146244e7
SHA51279ee4a88d440053ec2d344b2763789508ae0e2e7a5722682372970193265c5115bca9df5e26e66c2c87717453616a0e62a9fb909593be4b29c589cc210c2c125
-
Filesize
6KB
MD514eba1c1016a07841a90585f7cb96cf1
SHA14ca2baf12c38ab26df818606b87d4bf2f030fcfd
SHA256f0c233aa006fca0527effaab609356bf12c4a1e9a6ec3b659672d374df7776c3
SHA512358a11982033dc8eb3b07e8222ef67b8a1e709765d745fdceb0a8e4a1e6dda47677ecf662437d407eb434b050bfa6b9c2624a6d4dfbf214df65e03fe784f92af
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e01cc7656a66e1ab332254b79d2db6d2
SHA167dc6ac662888ea804ed63857a1615aa472fbacf
SHA2566ff2d6d491c1570c32e1b431b703fc8dec1b8ffc9c10f9843d590209fe56be67
SHA512ebc02a8f46f05ce8f1a616221d646a97c841d16efc88301d384bf4568a7d2ed238bed061d61f6e0e9411e217a12457cb7cbbd7496c80f98a4ba910e04c00e972