Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26/05/2024, 08:11
Static task
static1
Behavioral task
behavioral1
Sample
74d82656496694b84da116f93d8f41b9_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
74d82656496694b84da116f93d8f41b9_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
74d82656496694b84da116f93d8f41b9_JaffaCakes118.html
-
Size
28KB
-
MD5
74d82656496694b84da116f93d8f41b9
-
SHA1
f6e1290f1759b76c94965a8f19bed7ea443c5b6d
-
SHA256
29640540ac8069d6bace96333ded63fbcecc5b5769046877bdc2b06150c79202
-
SHA512
90bf1ba9e16775122791fb5e94a00b2753b8ab7287c1e9c7b0fb4c7d98e34f46eccc15f260d04b2623cc60cc65197b394a2d476c508d6e0d16c5c766dccf675f
-
SSDEEP
192:uw/Ab5njgxsnQjxn5Q/3nQieONnqdInQOkEntZP9nQTbnxnQ9e4am64VoudnQl7v:zQ/QEtywouoSk
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4220 msedge.exe 4220 msedge.exe 4524 msedge.exe 4524 msedge.exe 1836 identity_helper.exe 1836 identity_helper.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4524 wrote to memory of 2372 4524 msedge.exe 83 PID 4524 wrote to memory of 2372 4524 msedge.exe 83 PID 4524 wrote to memory of 3208 4524 msedge.exe 84 PID 4524 wrote to memory of 3208 4524 msedge.exe 84 PID 4524 wrote to memory of 3208 4524 msedge.exe 84 PID 4524 wrote to memory of 3208 4524 msedge.exe 84 PID 4524 wrote to memory of 3208 4524 msedge.exe 84 PID 4524 wrote to memory of 3208 4524 msedge.exe 84 PID 4524 wrote to memory of 3208 4524 msedge.exe 84 PID 4524 wrote to memory of 3208 4524 msedge.exe 84 PID 4524 wrote to memory of 3208 4524 msedge.exe 84 PID 4524 wrote to memory of 3208 4524 msedge.exe 84 PID 4524 wrote to memory of 3208 4524 msedge.exe 84 PID 4524 wrote to memory of 3208 4524 msedge.exe 84 PID 4524 wrote to memory of 3208 4524 msedge.exe 84 PID 4524 wrote to memory of 3208 4524 msedge.exe 84 PID 4524 wrote to memory of 3208 4524 msedge.exe 84 PID 4524 wrote to memory of 3208 4524 msedge.exe 84 PID 4524 wrote to memory of 3208 4524 msedge.exe 84 PID 4524 wrote to memory of 3208 4524 msedge.exe 84 PID 4524 wrote to memory of 3208 4524 msedge.exe 84 PID 4524 wrote to memory of 3208 4524 msedge.exe 84 PID 4524 wrote to memory of 3208 4524 msedge.exe 84 PID 4524 wrote to memory of 3208 4524 msedge.exe 84 PID 4524 wrote to memory of 3208 4524 msedge.exe 84 PID 4524 wrote to memory of 3208 4524 msedge.exe 84 PID 4524 wrote to memory of 3208 4524 msedge.exe 84 PID 4524 wrote to memory of 3208 4524 msedge.exe 84 PID 4524 wrote to memory of 3208 4524 msedge.exe 84 PID 4524 wrote to memory of 3208 4524 msedge.exe 84 PID 4524 wrote to memory of 3208 4524 msedge.exe 84 PID 4524 wrote to memory of 3208 4524 msedge.exe 84 PID 4524 wrote to memory of 3208 4524 msedge.exe 84 PID 4524 wrote to memory of 3208 4524 msedge.exe 84 PID 4524 wrote to memory of 3208 4524 msedge.exe 84 PID 4524 wrote to memory of 3208 4524 msedge.exe 84 PID 4524 wrote to memory of 3208 4524 msedge.exe 84 PID 4524 wrote to memory of 3208 4524 msedge.exe 84 PID 4524 wrote to memory of 3208 4524 msedge.exe 84 PID 4524 wrote to memory of 3208 4524 msedge.exe 84 PID 4524 wrote to memory of 3208 4524 msedge.exe 84 PID 4524 wrote to memory of 3208 4524 msedge.exe 84 PID 4524 wrote to memory of 4220 4524 msedge.exe 85 PID 4524 wrote to memory of 4220 4524 msedge.exe 85 PID 4524 wrote to memory of 4700 4524 msedge.exe 86 PID 4524 wrote to memory of 4700 4524 msedge.exe 86 PID 4524 wrote to memory of 4700 4524 msedge.exe 86 PID 4524 wrote to memory of 4700 4524 msedge.exe 86 PID 4524 wrote to memory of 4700 4524 msedge.exe 86 PID 4524 wrote to memory of 4700 4524 msedge.exe 86 PID 4524 wrote to memory of 4700 4524 msedge.exe 86 PID 4524 wrote to memory of 4700 4524 msedge.exe 86 PID 4524 wrote to memory of 4700 4524 msedge.exe 86 PID 4524 wrote to memory of 4700 4524 msedge.exe 86 PID 4524 wrote to memory of 4700 4524 msedge.exe 86 PID 4524 wrote to memory of 4700 4524 msedge.exe 86 PID 4524 wrote to memory of 4700 4524 msedge.exe 86 PID 4524 wrote to memory of 4700 4524 msedge.exe 86 PID 4524 wrote to memory of 4700 4524 msedge.exe 86 PID 4524 wrote to memory of 4700 4524 msedge.exe 86 PID 4524 wrote to memory of 4700 4524 msedge.exe 86 PID 4524 wrote to memory of 4700 4524 msedge.exe 86 PID 4524 wrote to memory of 4700 4524 msedge.exe 86 PID 4524 wrote to memory of 4700 4524 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\74d82656496694b84da116f93d8f41b9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbaf3846f8,0x7ffbaf384708,0x7ffbaf3847182⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,7215756299796339029,9934480874375701962,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:22⤵PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,7215756299796339029,9934480874375701962,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2368 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,7215756299796339029,9934480874375701962,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,7215756299796339029,9934480874375701962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,7215756299796339029,9934480874375701962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,7215756299796339029,9934480874375701962,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3752 /prefetch:82⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,7215756299796339029,9934480874375701962,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3752 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,7215756299796339029,9934480874375701962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,7215756299796339029,9934480874375701962,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,7215756299796339029,9934480874375701962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:12⤵PID:1120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,7215756299796339029,9934480874375701962,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,7215756299796339029,9934480874375701962,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3300 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4712
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:804
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4832
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
5KB
MD5732bf4934110b04219ac6879f5c7fbb2
SHA1477e3c08d54a420c66317300362cbcefe839bccc
SHA2563561f72b77fc55de7bfb1f438d65d3efcd09b65d14681e12f6dfd8c9c975823e
SHA512e7b2c50e58a363d97f8b1b31d8b687f8b78c8b492734ae34d0f43502334758caa9e2877d271747e06be4853dd601b586f51699c64e05c0cdf6dd7087274ff65c
-
Filesize
6KB
MD588526e8c1af4888de5d64b321434a8fa
SHA1271f46e4067916dfd7fe2a451310f20210e8b2cf
SHA256ea04e31378d7503dcd08c3d9a804a7b43bf51b1e62558962bdf97099ea478782
SHA512af001bd0ab33b738a2ce031f16eff56cea230496f0bf35e0b29cf200186799aa7e0d71de9aecb7b3ba5c1abbaa6c0e6bd730abca4adf8eed4e56e6729b70749a
-
Filesize
6KB
MD5d6e58cff89bb71249ff40035dee58062
SHA189941e39acf4346329c6b65bb19c4a758b07bbcd
SHA2565adbf600625cba9d6007fa6f3813e339ce55046392d20cdb73e684b660308efe
SHA512b14afca5fcbc9c340661d02351d7b4f8f4d9880e6a354338172a1d4ac81bbdc1038429ed7464a5b2ae9692aa95459c74fc3059846533d11ad511605de92a5405
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e3bf2b99c95f98f0c41623af9aa4c7da
SHA184e9bef05c65f9f031ef589b7301aeb5746e0036
SHA256fa021c7e9d4afb524cceb2db0b42acf618897b352df445de788fb81be0d02a96
SHA512d720108a3a677da2ac92f57db0a62fec1870dce364a21a29a9c1e4528f69dc178d756903b1c088ad8d8b035ea54e0789c97c98df9d2ba281c268eb4eb4cf880f