Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 12:52
Static task
static1
Behavioral task
behavioral1
Sample
79396c11a9e9f6e437052eae32a5488c_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
79396c11a9e9f6e437052eae32a5488c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
79396c11a9e9f6e437052eae32a5488c_JaffaCakes118.html
-
Size
66KB
-
MD5
79396c11a9e9f6e437052eae32a5488c
-
SHA1
c8a9465095a26656e19cef8f08527194e134f722
-
SHA256
225003a2519d653668d3951ae014511afbfca83aaaf927e2d6bb4a8ffafbc544
-
SHA512
686415c9cdcacfa1533cce3d6b0edab213844ffbc9dafc475c690e55f5e3f8c0b9355fddf6d47758c77da6160e0ce07ec898c505c71c65988708f7eddf51c760
-
SSDEEP
768:1vl02yWxbPB+MBh7VDRiXwjbWWKktVonNJiC5l+xt7KvF:n01WHB7VDd6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4836 msedge.exe 4836 msedge.exe 5100 msedge.exe 5100 msedge.exe 3732 identity_helper.exe 3732 identity_helper.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5100 wrote to memory of 3652 5100 msedge.exe 84 PID 5100 wrote to memory of 3652 5100 msedge.exe 84 PID 5100 wrote to memory of 2752 5100 msedge.exe 85 PID 5100 wrote to memory of 2752 5100 msedge.exe 85 PID 5100 wrote to memory of 2752 5100 msedge.exe 85 PID 5100 wrote to memory of 2752 5100 msedge.exe 85 PID 5100 wrote to memory of 2752 5100 msedge.exe 85 PID 5100 wrote to memory of 2752 5100 msedge.exe 85 PID 5100 wrote to memory of 2752 5100 msedge.exe 85 PID 5100 wrote to memory of 2752 5100 msedge.exe 85 PID 5100 wrote to memory of 2752 5100 msedge.exe 85 PID 5100 wrote to memory of 2752 5100 msedge.exe 85 PID 5100 wrote to memory of 2752 5100 msedge.exe 85 PID 5100 wrote to memory of 2752 5100 msedge.exe 85 PID 5100 wrote to memory of 2752 5100 msedge.exe 85 PID 5100 wrote to memory of 2752 5100 msedge.exe 85 PID 5100 wrote to memory of 2752 5100 msedge.exe 85 PID 5100 wrote to memory of 2752 5100 msedge.exe 85 PID 5100 wrote to memory of 2752 5100 msedge.exe 85 PID 5100 wrote to memory of 2752 5100 msedge.exe 85 PID 5100 wrote to memory of 2752 5100 msedge.exe 85 PID 5100 wrote to memory of 2752 5100 msedge.exe 85 PID 5100 wrote to memory of 2752 5100 msedge.exe 85 PID 5100 wrote to memory of 2752 5100 msedge.exe 85 PID 5100 wrote to memory of 2752 5100 msedge.exe 85 PID 5100 wrote to memory of 2752 5100 msedge.exe 85 PID 5100 wrote to memory of 2752 5100 msedge.exe 85 PID 5100 wrote to memory of 2752 5100 msedge.exe 85 PID 5100 wrote to memory of 2752 5100 msedge.exe 85 PID 5100 wrote to memory of 2752 5100 msedge.exe 85 PID 5100 wrote to memory of 2752 5100 msedge.exe 85 PID 5100 wrote to memory of 2752 5100 msedge.exe 85 PID 5100 wrote to memory of 2752 5100 msedge.exe 85 PID 5100 wrote to memory of 2752 5100 msedge.exe 85 PID 5100 wrote to memory of 2752 5100 msedge.exe 85 PID 5100 wrote to memory of 2752 5100 msedge.exe 85 PID 5100 wrote to memory of 2752 5100 msedge.exe 85 PID 5100 wrote to memory of 2752 5100 msedge.exe 85 PID 5100 wrote to memory of 2752 5100 msedge.exe 85 PID 5100 wrote to memory of 2752 5100 msedge.exe 85 PID 5100 wrote to memory of 2752 5100 msedge.exe 85 PID 5100 wrote to memory of 2752 5100 msedge.exe 85 PID 5100 wrote to memory of 4836 5100 msedge.exe 86 PID 5100 wrote to memory of 4836 5100 msedge.exe 86 PID 5100 wrote to memory of 808 5100 msedge.exe 87 PID 5100 wrote to memory of 808 5100 msedge.exe 87 PID 5100 wrote to memory of 808 5100 msedge.exe 87 PID 5100 wrote to memory of 808 5100 msedge.exe 87 PID 5100 wrote to memory of 808 5100 msedge.exe 87 PID 5100 wrote to memory of 808 5100 msedge.exe 87 PID 5100 wrote to memory of 808 5100 msedge.exe 87 PID 5100 wrote to memory of 808 5100 msedge.exe 87 PID 5100 wrote to memory of 808 5100 msedge.exe 87 PID 5100 wrote to memory of 808 5100 msedge.exe 87 PID 5100 wrote to memory of 808 5100 msedge.exe 87 PID 5100 wrote to memory of 808 5100 msedge.exe 87 PID 5100 wrote to memory of 808 5100 msedge.exe 87 PID 5100 wrote to memory of 808 5100 msedge.exe 87 PID 5100 wrote to memory of 808 5100 msedge.exe 87 PID 5100 wrote to memory of 808 5100 msedge.exe 87 PID 5100 wrote to memory of 808 5100 msedge.exe 87 PID 5100 wrote to memory of 808 5100 msedge.exe 87 PID 5100 wrote to memory of 808 5100 msedge.exe 87 PID 5100 wrote to memory of 808 5100 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\79396c11a9e9f6e437052eae32a5488c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc4d6946f8,0x7ffc4d694708,0x7ffc4d6947182⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,4121250168552871212,17058036359611997800,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,4121250168552871212,17058036359611997800,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,4121250168552871212,17058036359611997800,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2608 /prefetch:82⤵PID:808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,4121250168552871212,17058036359611997800,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,4121250168552871212,17058036359611997800,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,4121250168552871212,17058036359611997800,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,4121250168552871212,17058036359611997800,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,4121250168552871212,17058036359611997800,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,4121250168552871212,17058036359611997800,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4964 /prefetch:12⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,4121250168552871212,17058036359611997800,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,4121250168552871212,17058036359611997800,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,4121250168552871212,17058036359611997800,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5524 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3596
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4496
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
309B
MD56547abad4ee1bf11102a2ad0d9cc170a
SHA1f9374df509df9906695cde07366b92d857657139
SHA2560a209182c4c342ec70a4b38b863762957fc96e5a43907bf266966e5b8df0ec9a
SHA512a7512255c7357d114925727aa8cc1b8ed48af8416eac5bf4b5b9b8b435940dda842daa1a80e686be3782f45293ad79e84136029034dca8b7fa6f3ad669b161a3
-
Filesize
5KB
MD518ca5f4fe338f33c0334d11c9fd4b8ea
SHA109bae02d45cd201f3d2e3d67cb09de5158469844
SHA256998e6dd838f586dfd992f35425d9f3250583097c45a4d7f459d3dab027e3888e
SHA512bb3e6ac3223b2f868853370f71bd6029f3f9ff6e922ec64fdaa8a251b6fcbefc0573086a104e7a28284614ffe25fdb73ac64aa721e8a3292335e1b0d38ae2f59
-
Filesize
6KB
MD5cf8c9ad2779711e39d5a3b30760bf640
SHA12cddc5df4a29cd19b9d24cb160cc9f497b8ad6fd
SHA2567989d83e705afc3612df17a6f20377a23293946db9e66c3a07d42bef5eb0a636
SHA5127534d4f3ef5d82a203fc93fe7ac376d03cea4610a358acea2d24c93370a60c8592c7df2abc87c8989f5101a68cbb72356cbb23d8401f523378be688fbed3a0fe
-
Filesize
6KB
MD5a535694f2766eb4bb490de4b660660fa
SHA1ebeb55d84806cbd94829f515b96fe61e26460666
SHA256f6ff2e24b8f409b9f724c3198d90d86550d75f96bfb10e46f91b0abe104c7c56
SHA51286e1f183e20951396434395b209e3b29085a190320570ed758c03a8e5c1cd2b7a7fbd67cc004930ea0af76cbdadb076015105cbcfb9363c4771cca4b46be4fea
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD564f7c1292a82509cabf7f4709e72dc50
SHA11f2ab2bf9913499b872562c91d60c54b53c5c868
SHA25603882bc5ace84dceb2215ef5f048bbbe76562cf774e6df86f5f3b8ec8f8f1399
SHA512910ff9ca9ec4a48040b93d9a489d41e139eaebb368837b0fa589332491697d40ca5df8154a46d1c81e9aea3cbc5b8ec73c7ac298fcc69d4f8c79678250fe9da7