Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 12:15
Static task
static1
Behavioral task
behavioral1
Sample
791ee81057f8d3b351d0a200116b81f9_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
791ee81057f8d3b351d0a200116b81f9_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
791ee81057f8d3b351d0a200116b81f9_JaffaCakes118.html
-
Size
4KB
-
MD5
791ee81057f8d3b351d0a200116b81f9
-
SHA1
9b03721e1581307220b7777dde1b55271d7324de
-
SHA256
edfc8b5912dd9787050689a3123949574491775292ea23134d6718f2a9c5f6a1
-
SHA512
0a5cfb737d47245c7bed33b2124a5a31a70743699f8b440ca2a0488031f8b8ef757c0247b12f0206f1204e164709683c424c476696e182cd077248f81010b219
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oSQeUI33:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDb
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3100 msedge.exe 3100 msedge.exe 1472 msedge.exe 1472 msedge.exe 1400 identity_helper.exe 1400 identity_helper.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1472 wrote to memory of 2328 1472 msedge.exe 82 PID 1472 wrote to memory of 2328 1472 msedge.exe 82 PID 1472 wrote to memory of 3344 1472 msedge.exe 83 PID 1472 wrote to memory of 3344 1472 msedge.exe 83 PID 1472 wrote to memory of 3344 1472 msedge.exe 83 PID 1472 wrote to memory of 3344 1472 msedge.exe 83 PID 1472 wrote to memory of 3344 1472 msedge.exe 83 PID 1472 wrote to memory of 3344 1472 msedge.exe 83 PID 1472 wrote to memory of 3344 1472 msedge.exe 83 PID 1472 wrote to memory of 3344 1472 msedge.exe 83 PID 1472 wrote to memory of 3344 1472 msedge.exe 83 PID 1472 wrote to memory of 3344 1472 msedge.exe 83 PID 1472 wrote to memory of 3344 1472 msedge.exe 83 PID 1472 wrote to memory of 3344 1472 msedge.exe 83 PID 1472 wrote to memory of 3344 1472 msedge.exe 83 PID 1472 wrote to memory of 3344 1472 msedge.exe 83 PID 1472 wrote to memory of 3344 1472 msedge.exe 83 PID 1472 wrote to memory of 3344 1472 msedge.exe 83 PID 1472 wrote to memory of 3344 1472 msedge.exe 83 PID 1472 wrote to memory of 3344 1472 msedge.exe 83 PID 1472 wrote to memory of 3344 1472 msedge.exe 83 PID 1472 wrote to memory of 3344 1472 msedge.exe 83 PID 1472 wrote to memory of 3344 1472 msedge.exe 83 PID 1472 wrote to memory of 3344 1472 msedge.exe 83 PID 1472 wrote to memory of 3344 1472 msedge.exe 83 PID 1472 wrote to memory of 3344 1472 msedge.exe 83 PID 1472 wrote to memory of 3344 1472 msedge.exe 83 PID 1472 wrote to memory of 3344 1472 msedge.exe 83 PID 1472 wrote to memory of 3344 1472 msedge.exe 83 PID 1472 wrote to memory of 3344 1472 msedge.exe 83 PID 1472 wrote to memory of 3344 1472 msedge.exe 83 PID 1472 wrote to memory of 3344 1472 msedge.exe 83 PID 1472 wrote to memory of 3344 1472 msedge.exe 83 PID 1472 wrote to memory of 3344 1472 msedge.exe 83 PID 1472 wrote to memory of 3344 1472 msedge.exe 83 PID 1472 wrote to memory of 3344 1472 msedge.exe 83 PID 1472 wrote to memory of 3344 1472 msedge.exe 83 PID 1472 wrote to memory of 3344 1472 msedge.exe 83 PID 1472 wrote to memory of 3344 1472 msedge.exe 83 PID 1472 wrote to memory of 3344 1472 msedge.exe 83 PID 1472 wrote to memory of 3344 1472 msedge.exe 83 PID 1472 wrote to memory of 3344 1472 msedge.exe 83 PID 1472 wrote to memory of 3100 1472 msedge.exe 84 PID 1472 wrote to memory of 3100 1472 msedge.exe 84 PID 1472 wrote to memory of 1900 1472 msedge.exe 85 PID 1472 wrote to memory of 1900 1472 msedge.exe 85 PID 1472 wrote to memory of 1900 1472 msedge.exe 85 PID 1472 wrote to memory of 1900 1472 msedge.exe 85 PID 1472 wrote to memory of 1900 1472 msedge.exe 85 PID 1472 wrote to memory of 1900 1472 msedge.exe 85 PID 1472 wrote to memory of 1900 1472 msedge.exe 85 PID 1472 wrote to memory of 1900 1472 msedge.exe 85 PID 1472 wrote to memory of 1900 1472 msedge.exe 85 PID 1472 wrote to memory of 1900 1472 msedge.exe 85 PID 1472 wrote to memory of 1900 1472 msedge.exe 85 PID 1472 wrote to memory of 1900 1472 msedge.exe 85 PID 1472 wrote to memory of 1900 1472 msedge.exe 85 PID 1472 wrote to memory of 1900 1472 msedge.exe 85 PID 1472 wrote to memory of 1900 1472 msedge.exe 85 PID 1472 wrote to memory of 1900 1472 msedge.exe 85 PID 1472 wrote to memory of 1900 1472 msedge.exe 85 PID 1472 wrote to memory of 1900 1472 msedge.exe 85 PID 1472 wrote to memory of 1900 1472 msedge.exe 85 PID 1472 wrote to memory of 1900 1472 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\791ee81057f8d3b351d0a200116b81f9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe986b46f8,0x7ffe986b4708,0x7ffe986b47182⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1924,9278613700974846134,11336986551261905718,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1952 /prefetch:22⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1924,9278613700974846134,11336986551261905718,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2444 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1924,9278613700974846134,11336986551261905718,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,9278613700974846134,11336986551261905718,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,9278613700974846134,11336986551261905718,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1924,9278613700974846134,11336986551261905718,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1924,9278613700974846134,11336986551261905718,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,9278613700974846134,11336986551261905718,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:12⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,9278613700974846134,11336986551261905718,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,9278613700974846134,11336986551261905718,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,9278613700974846134,11336986551261905718,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3464 /prefetch:12⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1924,9278613700974846134,11336986551261905718,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5508 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1620
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4988
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4944
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
292B
MD5656db35b7fc41b7c3525baae149b0628
SHA1e986a674067a9d41455923d974c5b9302f1657c0
SHA256b0bf6383331c69f455eaeba7f4c1e776f56c3abd95d940daef39f39aa3f164c0
SHA5123b2f75fd8b072fbe72bd43225248809decc959950c15b2348b7e346757b049496a51131aa751348377f2cf9dd30e2c66c1864c6a6f7222eacd14947f6d0c2568
-
Filesize
5KB
MD50b13f5798a1a8cb6fc01804942ff5e63
SHA19f15128ec2c9b1dfac0602382f787bb485f518d3
SHA2569cc9e1eb1f2d19be815223df6760df228b39ef3d57cb0f1bda303b9c00415787
SHA51279ffe8944499588ea7e9901dc5b69f4f0e392cdc001682519573606f1c30738ff61d17eed75776f83d5dee013d337e7fd76efaa5297fb1fc4be9035a44e5a5c2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\b2c91d7b-dd82-4eb9-afbf-e9ce732a2e3d.tmp
Filesize6KB
MD59ed41cc4c9d74315eb9a0af4c796fd6a
SHA13ff077486d69aa5ba8a0231c1d0c6552aff44206
SHA256b9c90388e9a630031ed40adfa3d1eac926dd93fb9365bb9b4607f79edfdba2f8
SHA512cba90bf5b6a18949cfce916d45da21d9d9b0760b13ca489e2756108e1a961014560185d70fecc2c353e748047444396eb80b7ad6818e026460f1f6c14c5fab4b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f4ded04da9c99244c46f9e8e9f084297
SHA19d77aa9f75873ff3916b7774bc4508c368c6eadb
SHA256cfdbd737243227648bb1f069e9f5b5c8383b7473412ed6dcf02dfd2a64153bd7
SHA5123296bbb23b0988877b4b2e8df6409b8605f135f8213519fb4b1d850fbcb20b4ab791edb61c6a07ece858bc11073970865bf30deb72c77031e6c3dc715c8be204