Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
26/05/2024, 10:08
Static task
static1
Behavioral task
behavioral1
Sample
75229f0095c393cc1a52fbe0d547e2f4_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
75229f0095c393cc1a52fbe0d547e2f4_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
75229f0095c393cc1a52fbe0d547e2f4_JaffaCakes118.html
-
Size
4KB
-
MD5
75229f0095c393cc1a52fbe0d547e2f4
-
SHA1
dda048f91544a938ff260f056c1aea387854c7b7
-
SHA256
fc2ce0fbf439c250804ca7335e14e47bd98094736560fb49524eff70f131a217
-
SHA512
5c0204fff17cf4856d4aaf9395398e885d653b42ab28c9994209f519bde3a13fecc9f7340d7540770ca15b484595fd25954dfff360d2952f5d4048e0e4a892aa
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oG653d:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDw
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2020 msedge.exe 2020 msedge.exe 412 msedge.exe 412 msedge.exe 212 identity_helper.exe 212 identity_helper.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 412 wrote to memory of 4644 412 msedge.exe 85 PID 412 wrote to memory of 4644 412 msedge.exe 85 PID 412 wrote to memory of 1936 412 msedge.exe 86 PID 412 wrote to memory of 1936 412 msedge.exe 86 PID 412 wrote to memory of 1936 412 msedge.exe 86 PID 412 wrote to memory of 1936 412 msedge.exe 86 PID 412 wrote to memory of 1936 412 msedge.exe 86 PID 412 wrote to memory of 1936 412 msedge.exe 86 PID 412 wrote to memory of 1936 412 msedge.exe 86 PID 412 wrote to memory of 1936 412 msedge.exe 86 PID 412 wrote to memory of 1936 412 msedge.exe 86 PID 412 wrote to memory of 1936 412 msedge.exe 86 PID 412 wrote to memory of 1936 412 msedge.exe 86 PID 412 wrote to memory of 1936 412 msedge.exe 86 PID 412 wrote to memory of 1936 412 msedge.exe 86 PID 412 wrote to memory of 1936 412 msedge.exe 86 PID 412 wrote to memory of 1936 412 msedge.exe 86 PID 412 wrote to memory of 1936 412 msedge.exe 86 PID 412 wrote to memory of 1936 412 msedge.exe 86 PID 412 wrote to memory of 1936 412 msedge.exe 86 PID 412 wrote to memory of 1936 412 msedge.exe 86 PID 412 wrote to memory of 1936 412 msedge.exe 86 PID 412 wrote to memory of 1936 412 msedge.exe 86 PID 412 wrote to memory of 1936 412 msedge.exe 86 PID 412 wrote to memory of 1936 412 msedge.exe 86 PID 412 wrote to memory of 1936 412 msedge.exe 86 PID 412 wrote to memory of 1936 412 msedge.exe 86 PID 412 wrote to memory of 1936 412 msedge.exe 86 PID 412 wrote to memory of 1936 412 msedge.exe 86 PID 412 wrote to memory of 1936 412 msedge.exe 86 PID 412 wrote to memory of 1936 412 msedge.exe 86 PID 412 wrote to memory of 1936 412 msedge.exe 86 PID 412 wrote to memory of 1936 412 msedge.exe 86 PID 412 wrote to memory of 1936 412 msedge.exe 86 PID 412 wrote to memory of 1936 412 msedge.exe 86 PID 412 wrote to memory of 1936 412 msedge.exe 86 PID 412 wrote to memory of 1936 412 msedge.exe 86 PID 412 wrote to memory of 1936 412 msedge.exe 86 PID 412 wrote to memory of 1936 412 msedge.exe 86 PID 412 wrote to memory of 1936 412 msedge.exe 86 PID 412 wrote to memory of 1936 412 msedge.exe 86 PID 412 wrote to memory of 1936 412 msedge.exe 86 PID 412 wrote to memory of 2020 412 msedge.exe 87 PID 412 wrote to memory of 2020 412 msedge.exe 87 PID 412 wrote to memory of 3288 412 msedge.exe 88 PID 412 wrote to memory of 3288 412 msedge.exe 88 PID 412 wrote to memory of 3288 412 msedge.exe 88 PID 412 wrote to memory of 3288 412 msedge.exe 88 PID 412 wrote to memory of 3288 412 msedge.exe 88 PID 412 wrote to memory of 3288 412 msedge.exe 88 PID 412 wrote to memory of 3288 412 msedge.exe 88 PID 412 wrote to memory of 3288 412 msedge.exe 88 PID 412 wrote to memory of 3288 412 msedge.exe 88 PID 412 wrote to memory of 3288 412 msedge.exe 88 PID 412 wrote to memory of 3288 412 msedge.exe 88 PID 412 wrote to memory of 3288 412 msedge.exe 88 PID 412 wrote to memory of 3288 412 msedge.exe 88 PID 412 wrote to memory of 3288 412 msedge.exe 88 PID 412 wrote to memory of 3288 412 msedge.exe 88 PID 412 wrote to memory of 3288 412 msedge.exe 88 PID 412 wrote to memory of 3288 412 msedge.exe 88 PID 412 wrote to memory of 3288 412 msedge.exe 88 PID 412 wrote to memory of 3288 412 msedge.exe 88 PID 412 wrote to memory of 3288 412 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\75229f0095c393cc1a52fbe0d547e2f4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff54f946f8,0x7fff54f94708,0x7fff54f947182⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,3451686029480229625,7432263081166329763,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,3451686029480229625,7432263081166329763,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,3451686029480229625,7432263081166329763,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:82⤵PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3451686029480229625,7432263081166329763,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3451686029480229625,7432263081166329763,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,3451686029480229625,7432263081166329763,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 /prefetch:82⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,3451686029480229625,7432263081166329763,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3451686029480229625,7432263081166329763,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3451686029480229625,7432263081166329763,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:12⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3451686029480229625,7432263081166329763,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3451686029480229625,7432263081166329763,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,3451686029480229625,7432263081166329763,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4140
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2068
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
292B
MD5e8d9507d91aa0f3179c19c6f1326ef22
SHA1e0c59942e70bf406d600056ca5b009c9d48b59e6
SHA2569c0a4350877b40f82dc2a55fa5e82c4ea3bf5f438afbcd3f1c5bbc88f7379ef5
SHA5120a2aaee861696604d52bbd15c954bff3a410d82f0b822703a219382259830d0f9e5c82133624601c5d2041c18a382032e02803f82d1629ffd202bd9f5b391fa4
-
Filesize
5KB
MD5696aa610eeba7a27311725c1b57b89fd
SHA157f959e7715b75ee3990e5db992d33260af25901
SHA25641405e5e391e985bdcc3688d535b16d2e710c3a1ebf3e47e85a24fa7770ae142
SHA5125e270850f0f789e515e860e55f866b4b8335429f407c6fb6f624c17e47ebb87a5cf232045117ec2e1e0e220eebbe0886200d6428fb45c7834447915d741ceeb4
-
Filesize
6KB
MD5cc7ea02f984be6d9854889f61738e0e5
SHA11302ee774e9ca65d47d21962ad2aaf5b1cf494ab
SHA256907ef3d574da9777764fda437b14b22a1a4d2ca4b2aebab1f3b98605c306d8b7
SHA51216108227314570f23279ab79525a93843ebef5b578a6eb3ba419685f9e148ba17d3031cdc78aab6a7f4697112d50418007c42a7f910441d8edde19177dc4c76d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50f733fd3d77e6d429f5f3cbcf6d8d921
SHA1c3c60e9e0746503f0a55ce1330206ac23696c962
SHA25689c869c5b4d1598a9f344cc417ed3c2e351673955f3615f14022f5842adb2846
SHA5124eaff271dcff2c1371cb58a68420b263c757a96660f7bb36b9a27cb7af4c6c79bbe674c78ec2298599855310a4ec6a3e8da14cf223f5d4263b117490e306d32d