Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26/05/2024, 10:21
Static task
static1
Behavioral task
behavioral1
Sample
752b1a147e97ba69605202385283780b_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
752b1a147e97ba69605202385283780b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
752b1a147e97ba69605202385283780b_JaffaCakes118.html
-
Size
461KB
-
MD5
752b1a147e97ba69605202385283780b
-
SHA1
dccb102f44457ff9e561f5fe69e6bb566d19b749
-
SHA256
0db74cb1c918a795da6bdc9c5f8156d756352241a5ce1091e485665a1baec31b
-
SHA512
4d8b3492fcab7a72eeba303b26dcca52022e494da3d9d2a88b88bcf0055648adabff595f757609b8770dc24a010137f1736a9ffd5a1c14df3b274a390b07c36f
-
SSDEEP
6144:SCsMYod+X3oI+Y2LKsMYod+X3oI+YEsMYod+X3oI+YLsMYod+X3oI+YQ:n5d+X395d+X3g5d+X315d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1208 msedge.exe 1208 msedge.exe 1144 msedge.exe 1144 msedge.exe 1984 identity_helper.exe 1984 identity_helper.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1144 wrote to memory of 3936 1144 msedge.exe 83 PID 1144 wrote to memory of 3936 1144 msedge.exe 83 PID 1144 wrote to memory of 1232 1144 msedge.exe 84 PID 1144 wrote to memory of 1232 1144 msedge.exe 84 PID 1144 wrote to memory of 1232 1144 msedge.exe 84 PID 1144 wrote to memory of 1232 1144 msedge.exe 84 PID 1144 wrote to memory of 1232 1144 msedge.exe 84 PID 1144 wrote to memory of 1232 1144 msedge.exe 84 PID 1144 wrote to memory of 1232 1144 msedge.exe 84 PID 1144 wrote to memory of 1232 1144 msedge.exe 84 PID 1144 wrote to memory of 1232 1144 msedge.exe 84 PID 1144 wrote to memory of 1232 1144 msedge.exe 84 PID 1144 wrote to memory of 1232 1144 msedge.exe 84 PID 1144 wrote to memory of 1232 1144 msedge.exe 84 PID 1144 wrote to memory of 1232 1144 msedge.exe 84 PID 1144 wrote to memory of 1232 1144 msedge.exe 84 PID 1144 wrote to memory of 1232 1144 msedge.exe 84 PID 1144 wrote to memory of 1232 1144 msedge.exe 84 PID 1144 wrote to memory of 1232 1144 msedge.exe 84 PID 1144 wrote to memory of 1232 1144 msedge.exe 84 PID 1144 wrote to memory of 1232 1144 msedge.exe 84 PID 1144 wrote to memory of 1232 1144 msedge.exe 84 PID 1144 wrote to memory of 1232 1144 msedge.exe 84 PID 1144 wrote to memory of 1232 1144 msedge.exe 84 PID 1144 wrote to memory of 1232 1144 msedge.exe 84 PID 1144 wrote to memory of 1232 1144 msedge.exe 84 PID 1144 wrote to memory of 1232 1144 msedge.exe 84 PID 1144 wrote to memory of 1232 1144 msedge.exe 84 PID 1144 wrote to memory of 1232 1144 msedge.exe 84 PID 1144 wrote to memory of 1232 1144 msedge.exe 84 PID 1144 wrote to memory of 1232 1144 msedge.exe 84 PID 1144 wrote to memory of 1232 1144 msedge.exe 84 PID 1144 wrote to memory of 1232 1144 msedge.exe 84 PID 1144 wrote to memory of 1232 1144 msedge.exe 84 PID 1144 wrote to memory of 1232 1144 msedge.exe 84 PID 1144 wrote to memory of 1232 1144 msedge.exe 84 PID 1144 wrote to memory of 1232 1144 msedge.exe 84 PID 1144 wrote to memory of 1232 1144 msedge.exe 84 PID 1144 wrote to memory of 1232 1144 msedge.exe 84 PID 1144 wrote to memory of 1232 1144 msedge.exe 84 PID 1144 wrote to memory of 1232 1144 msedge.exe 84 PID 1144 wrote to memory of 1232 1144 msedge.exe 84 PID 1144 wrote to memory of 1208 1144 msedge.exe 85 PID 1144 wrote to memory of 1208 1144 msedge.exe 85 PID 1144 wrote to memory of 1576 1144 msedge.exe 86 PID 1144 wrote to memory of 1576 1144 msedge.exe 86 PID 1144 wrote to memory of 1576 1144 msedge.exe 86 PID 1144 wrote to memory of 1576 1144 msedge.exe 86 PID 1144 wrote to memory of 1576 1144 msedge.exe 86 PID 1144 wrote to memory of 1576 1144 msedge.exe 86 PID 1144 wrote to memory of 1576 1144 msedge.exe 86 PID 1144 wrote to memory of 1576 1144 msedge.exe 86 PID 1144 wrote to memory of 1576 1144 msedge.exe 86 PID 1144 wrote to memory of 1576 1144 msedge.exe 86 PID 1144 wrote to memory of 1576 1144 msedge.exe 86 PID 1144 wrote to memory of 1576 1144 msedge.exe 86 PID 1144 wrote to memory of 1576 1144 msedge.exe 86 PID 1144 wrote to memory of 1576 1144 msedge.exe 86 PID 1144 wrote to memory of 1576 1144 msedge.exe 86 PID 1144 wrote to memory of 1576 1144 msedge.exe 86 PID 1144 wrote to memory of 1576 1144 msedge.exe 86 PID 1144 wrote to memory of 1576 1144 msedge.exe 86 PID 1144 wrote to memory of 1576 1144 msedge.exe 86 PID 1144 wrote to memory of 1576 1144 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\752b1a147e97ba69605202385283780b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff97d9546f8,0x7ff97d954708,0x7ff97d9547182⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,8033035615889657170,3136434176613762169,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,8033035615889657170,3136434176613762169,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2432 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,8033035615889657170,3136434176613762169,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2500 /prefetch:82⤵PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8033035615889657170,3136434176613762169,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8033035615889657170,3136434176613762169,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8033035615889657170,3136434176613762169,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:12⤵PID:984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8033035615889657170,3136434176613762169,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:2520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,8033035615889657170,3136434176613762169,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5708 /prefetch:82⤵PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,8033035615889657170,3136434176613762169,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5708 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8033035615889657170,3136434176613762169,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8033035615889657170,3136434176613762169,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,8033035615889657170,3136434176613762169,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4152
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4308
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1776
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD5dbcc531aa643ecee7b7644d0cb4d2e03
SHA131113cdc9e7df1fd1a63ccfe8f35b062eca7f885
SHA256c3611cd9e6f011f6357611a92466425354c77a81a3d45315e7699d5e0d3df98f
SHA51206f9a52a249e5fa9c72562b043601a55a50ba824efc5e26488ab9a8afa0417cf74847376bc2f6fb6653c0e9db5f2c895126bdc2ed31577ac11157f3df79c884e
-
Filesize
6KB
MD5628755b7d0c6a31ed605d931d94eb2aa
SHA1b6f54e5780bc38e657bfaf7afbba1ac14ad89ccd
SHA256e7c97fa180163fa15a82cc3804270a90a8e45665bad12fe751a2428bb8362596
SHA512d0649cceed1b3dce43fe42a3d7aa886bcf8bb20d059c76b2a8331a6185f97f1cd6e8a5235c6ae61292c6a7344c6c4305060d8d8d14bc5ccf9ab64ec4a9c7e85d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5edcbb665271a061a63306972681d2506
SHA1b4b8d3b6376dd8ca288045db5b0490861e0928a4
SHA256b403ef40741f54be438fb796124ea90cbc8a2576c81f4ba4cba4d53b99d0c005
SHA512cef806ce52a29abf7eb5f6bba755fadbf21daa10a50c30e1c9084b8f9fb2ebcaea241e8acd998984d141bfe7347773a3517211334129e50ba28be4bc551a773b
-
Filesize
11KB
MD523b80a1c15612d90f3760576b6498769
SHA13bf56ea3286255c1d4284a4061978d56064d2390
SHA256451e5427a029cb18684c7e5759e83896fa4ee2f3f9e7736b5135da18c541ce64
SHA512e02d5a7e0bc3e09a516bd04b1124797dd99a8597130a42529a8716458cb839f2079717509234dc61c143921e85ef4475c4a66df1cfa2d06215d986449a1ad268