Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 14:05
Static task
static1
Behavioral task
behavioral1
Sample
79582c4ee2fc811539d8f07f76bba60c_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
79582c4ee2fc811539d8f07f76bba60c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
79582c4ee2fc811539d8f07f76bba60c_JaffaCakes118.html
-
Size
36KB
-
MD5
79582c4ee2fc811539d8f07f76bba60c
-
SHA1
f2a7165a40f033523259d18feefe2cd82ca3a5a3
-
SHA256
fef5825f741114027f66cd04e543e032ac146471b958016d85897985fc137231
-
SHA512
c7e68a6fea0f3e38136e331d5e397f97b95e70b1fb88a3fb7ca68e6a0b0cc7339cf72ac84484b6f86333c24844adc4e996b221307f1334538182cb86081e918e
-
SSDEEP
768:zwx/MDTHGY88hARMZPXnE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6ThZOg6f9U56lLRc:Q/jbJxNVNufSM/P8lK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4168 msedge.exe 4168 msedge.exe 5108 msedge.exe 5108 msedge.exe 468 identity_helper.exe 468 identity_helper.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5108 wrote to memory of 4864 5108 msedge.exe 83 PID 5108 wrote to memory of 4864 5108 msedge.exe 83 PID 5108 wrote to memory of 1000 5108 msedge.exe 84 PID 5108 wrote to memory of 1000 5108 msedge.exe 84 PID 5108 wrote to memory of 1000 5108 msedge.exe 84 PID 5108 wrote to memory of 1000 5108 msedge.exe 84 PID 5108 wrote to memory of 1000 5108 msedge.exe 84 PID 5108 wrote to memory of 1000 5108 msedge.exe 84 PID 5108 wrote to memory of 1000 5108 msedge.exe 84 PID 5108 wrote to memory of 1000 5108 msedge.exe 84 PID 5108 wrote to memory of 1000 5108 msedge.exe 84 PID 5108 wrote to memory of 1000 5108 msedge.exe 84 PID 5108 wrote to memory of 1000 5108 msedge.exe 84 PID 5108 wrote to memory of 1000 5108 msedge.exe 84 PID 5108 wrote to memory of 1000 5108 msedge.exe 84 PID 5108 wrote to memory of 1000 5108 msedge.exe 84 PID 5108 wrote to memory of 1000 5108 msedge.exe 84 PID 5108 wrote to memory of 1000 5108 msedge.exe 84 PID 5108 wrote to memory of 1000 5108 msedge.exe 84 PID 5108 wrote to memory of 1000 5108 msedge.exe 84 PID 5108 wrote to memory of 1000 5108 msedge.exe 84 PID 5108 wrote to memory of 1000 5108 msedge.exe 84 PID 5108 wrote to memory of 1000 5108 msedge.exe 84 PID 5108 wrote to memory of 1000 5108 msedge.exe 84 PID 5108 wrote to memory of 1000 5108 msedge.exe 84 PID 5108 wrote to memory of 1000 5108 msedge.exe 84 PID 5108 wrote to memory of 1000 5108 msedge.exe 84 PID 5108 wrote to memory of 1000 5108 msedge.exe 84 PID 5108 wrote to memory of 1000 5108 msedge.exe 84 PID 5108 wrote to memory of 1000 5108 msedge.exe 84 PID 5108 wrote to memory of 1000 5108 msedge.exe 84 PID 5108 wrote to memory of 1000 5108 msedge.exe 84 PID 5108 wrote to memory of 1000 5108 msedge.exe 84 PID 5108 wrote to memory of 1000 5108 msedge.exe 84 PID 5108 wrote to memory of 1000 5108 msedge.exe 84 PID 5108 wrote to memory of 1000 5108 msedge.exe 84 PID 5108 wrote to memory of 1000 5108 msedge.exe 84 PID 5108 wrote to memory of 1000 5108 msedge.exe 84 PID 5108 wrote to memory of 1000 5108 msedge.exe 84 PID 5108 wrote to memory of 1000 5108 msedge.exe 84 PID 5108 wrote to memory of 1000 5108 msedge.exe 84 PID 5108 wrote to memory of 1000 5108 msedge.exe 84 PID 5108 wrote to memory of 4168 5108 msedge.exe 85 PID 5108 wrote to memory of 4168 5108 msedge.exe 85 PID 5108 wrote to memory of 4540 5108 msedge.exe 86 PID 5108 wrote to memory of 4540 5108 msedge.exe 86 PID 5108 wrote to memory of 4540 5108 msedge.exe 86 PID 5108 wrote to memory of 4540 5108 msedge.exe 86 PID 5108 wrote to memory of 4540 5108 msedge.exe 86 PID 5108 wrote to memory of 4540 5108 msedge.exe 86 PID 5108 wrote to memory of 4540 5108 msedge.exe 86 PID 5108 wrote to memory of 4540 5108 msedge.exe 86 PID 5108 wrote to memory of 4540 5108 msedge.exe 86 PID 5108 wrote to memory of 4540 5108 msedge.exe 86 PID 5108 wrote to memory of 4540 5108 msedge.exe 86 PID 5108 wrote to memory of 4540 5108 msedge.exe 86 PID 5108 wrote to memory of 4540 5108 msedge.exe 86 PID 5108 wrote to memory of 4540 5108 msedge.exe 86 PID 5108 wrote to memory of 4540 5108 msedge.exe 86 PID 5108 wrote to memory of 4540 5108 msedge.exe 86 PID 5108 wrote to memory of 4540 5108 msedge.exe 86 PID 5108 wrote to memory of 4540 5108 msedge.exe 86 PID 5108 wrote to memory of 4540 5108 msedge.exe 86 PID 5108 wrote to memory of 4540 5108 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\79582c4ee2fc811539d8f07f76bba60c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xe0,0xe4,0xd8,0xdc,0x108,0x7ffdf58f46f8,0x7ffdf58f4708,0x7ffdf58f47182⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,10865505632782175026,9785446310253696809,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:1000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,10865505632782175026,9785446310253696809,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2388 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,10865505632782175026,9785446310253696809,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10865505632782175026,9785446310253696809,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10865505632782175026,9785446310253696809,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,10865505632782175026,9785446310253696809,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5516 /prefetch:82⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,10865505632782175026,9785446310253696809,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5516 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10865505632782175026,9785446310253696809,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:12⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10865505632782175026,9785446310253696809,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10865505632782175026,9785446310253696809,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:2124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10865505632782175026,9785446310253696809,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,10865505632782175026,9785446310253696809,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2732 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1816
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2256
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
614B
MD577ad29d970f711bbefca21301f6d5da3
SHA1240cfa44a890f39fb6e1514de0e14f8aa8e4453b
SHA2569bc7293731b6865c09e8ca62cea03f79b7d33344364685d7e23a4d370de666e4
SHA512e17c7dd4a98e3acac1964d70c6afd0a75bae6f79af6f7aa6737511c8f81526e4a1c696d08bebf291f47a730fbb7d3b01a2c77ccec34c3773a772247ffd13fbf8
-
Filesize
5KB
MD592e4bce27fb242d6cae62e1b2b6c7663
SHA17a351b5da30209ec237165ec3ef4612f6337cce2
SHA2561c00503f35c491b0aaf5313e479a32c7a138e9047566efed1e5fe4c945a93b0e
SHA51299f617f32351c6aa1d2e01d13dbbe0d0438c43011d1954a917b05fbfc14a03079f8477d816cf1db3db212259c8690e5f09d8b1f38239448deecb396148fc7fd6
-
Filesize
6KB
MD52e3952410b7796eab4ac925568f52aef
SHA13cedf42752e18668704d9c85cdf6c923209bfcf1
SHA2560df70e26bb4ce421e8fb3fec3c914f1d6a6a71ae96480d9664a83680982849f9
SHA51293ce409ac5d78d0132d4493f24112f39a6904f2a9a990de107d87b2b16bf54056fd5d05669782fb39188395252391584f8aa8188654da2ef9b96687a91496813
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d651834f3ed09f062a992fa916241241
SHA1ad7aa3888e6bb12fd793d8e056b210036c1186a8
SHA256f5068257b6904780b1fcddfb05a399cb028f52ce363b3d587826ab270b4078aa
SHA5127d4615fa6cdc7ad0cff05ac550a6019ba41df9b39184492243f750c97c02326914e8c237de088e1200debf363007dda0b065c71e62d9e7814282a22cf5c14259