Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2024, 13:47
Static task
static1
Behavioral task
behavioral1
Sample
80f3187bc649d7609a0d77b5dfde0968_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
80f3187bc649d7609a0d77b5dfde0968_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
80f3187bc649d7609a0d77b5dfde0968_JaffaCakes118.html
-
Size
33KB
-
MD5
80f3187bc649d7609a0d77b5dfde0968
-
SHA1
f6e6f596140794d192e5d0defa1d6f9c96e8f039
-
SHA256
a9260df192ccafd6b982b48306aa33eeeae1274c945ec69d0781324e0689ba50
-
SHA512
cf454171a091590ab785a31a2dfb4def7e971fb12305646ce739622f8c8ed4bf1085826eabfe5e96462910515ec1b4fca6d83579843ee9d885497de322711d15
-
SSDEEP
768:WIRIOITIwIgIiKZgNDfIwIGI5IVJ7SqIRIOITIwIgIiKZgNDfIwIGI5IVJ7SZC/g:WIRIOITIwIgIiKZgNDfIwIGI5IVJ7SqQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2904 msedge.exe 2904 msedge.exe 2680 msedge.exe 2680 msedge.exe 1372 identity_helper.exe 1372 identity_helper.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2680 wrote to memory of 2064 2680 msedge.exe 83 PID 2680 wrote to memory of 2064 2680 msedge.exe 83 PID 2680 wrote to memory of 4128 2680 msedge.exe 84 PID 2680 wrote to memory of 4128 2680 msedge.exe 84 PID 2680 wrote to memory of 4128 2680 msedge.exe 84 PID 2680 wrote to memory of 4128 2680 msedge.exe 84 PID 2680 wrote to memory of 4128 2680 msedge.exe 84 PID 2680 wrote to memory of 4128 2680 msedge.exe 84 PID 2680 wrote to memory of 4128 2680 msedge.exe 84 PID 2680 wrote to memory of 4128 2680 msedge.exe 84 PID 2680 wrote to memory of 4128 2680 msedge.exe 84 PID 2680 wrote to memory of 4128 2680 msedge.exe 84 PID 2680 wrote to memory of 4128 2680 msedge.exe 84 PID 2680 wrote to memory of 4128 2680 msedge.exe 84 PID 2680 wrote to memory of 4128 2680 msedge.exe 84 PID 2680 wrote to memory of 4128 2680 msedge.exe 84 PID 2680 wrote to memory of 4128 2680 msedge.exe 84 PID 2680 wrote to memory of 4128 2680 msedge.exe 84 PID 2680 wrote to memory of 4128 2680 msedge.exe 84 PID 2680 wrote to memory of 4128 2680 msedge.exe 84 PID 2680 wrote to memory of 4128 2680 msedge.exe 84 PID 2680 wrote to memory of 4128 2680 msedge.exe 84 PID 2680 wrote to memory of 4128 2680 msedge.exe 84 PID 2680 wrote to memory of 4128 2680 msedge.exe 84 PID 2680 wrote to memory of 4128 2680 msedge.exe 84 PID 2680 wrote to memory of 4128 2680 msedge.exe 84 PID 2680 wrote to memory of 4128 2680 msedge.exe 84 PID 2680 wrote to memory of 4128 2680 msedge.exe 84 PID 2680 wrote to memory of 4128 2680 msedge.exe 84 PID 2680 wrote to memory of 4128 2680 msedge.exe 84 PID 2680 wrote to memory of 4128 2680 msedge.exe 84 PID 2680 wrote to memory of 4128 2680 msedge.exe 84 PID 2680 wrote to memory of 4128 2680 msedge.exe 84 PID 2680 wrote to memory of 4128 2680 msedge.exe 84 PID 2680 wrote to memory of 4128 2680 msedge.exe 84 PID 2680 wrote to memory of 4128 2680 msedge.exe 84 PID 2680 wrote to memory of 4128 2680 msedge.exe 84 PID 2680 wrote to memory of 4128 2680 msedge.exe 84 PID 2680 wrote to memory of 4128 2680 msedge.exe 84 PID 2680 wrote to memory of 4128 2680 msedge.exe 84 PID 2680 wrote to memory of 4128 2680 msedge.exe 84 PID 2680 wrote to memory of 4128 2680 msedge.exe 84 PID 2680 wrote to memory of 2904 2680 msedge.exe 85 PID 2680 wrote to memory of 2904 2680 msedge.exe 85 PID 2680 wrote to memory of 3440 2680 msedge.exe 86 PID 2680 wrote to memory of 3440 2680 msedge.exe 86 PID 2680 wrote to memory of 3440 2680 msedge.exe 86 PID 2680 wrote to memory of 3440 2680 msedge.exe 86 PID 2680 wrote to memory of 3440 2680 msedge.exe 86 PID 2680 wrote to memory of 3440 2680 msedge.exe 86 PID 2680 wrote to memory of 3440 2680 msedge.exe 86 PID 2680 wrote to memory of 3440 2680 msedge.exe 86 PID 2680 wrote to memory of 3440 2680 msedge.exe 86 PID 2680 wrote to memory of 3440 2680 msedge.exe 86 PID 2680 wrote to memory of 3440 2680 msedge.exe 86 PID 2680 wrote to memory of 3440 2680 msedge.exe 86 PID 2680 wrote to memory of 3440 2680 msedge.exe 86 PID 2680 wrote to memory of 3440 2680 msedge.exe 86 PID 2680 wrote to memory of 3440 2680 msedge.exe 86 PID 2680 wrote to memory of 3440 2680 msedge.exe 86 PID 2680 wrote to memory of 3440 2680 msedge.exe 86 PID 2680 wrote to memory of 3440 2680 msedge.exe 86 PID 2680 wrote to memory of 3440 2680 msedge.exe 86 PID 2680 wrote to memory of 3440 2680 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\80f3187bc649d7609a0d77b5dfde0968_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff871a346f8,0x7ff871a34708,0x7ff871a347182⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,16306834425722866522,5798749863648129900,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,16306834425722866522,5798749863648129900,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,16306834425722866522,5798749863648129900,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16306834425722866522,5798749863648129900,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16306834425722866522,5798749863648129900,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,16306834425722866522,5798749863648129900,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6008 /prefetch:82⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,16306834425722866522,5798749863648129900,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6008 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16306834425722866522,5798749863648129900,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16306834425722866522,5798749863648129900,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:1716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16306834425722866522,5798749863648129900,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16306834425722866522,5798749863648129900,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:12⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,16306834425722866522,5798749863648129900,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4828 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4224
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:668
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
743B
MD53d3c139548570c4a796618a84c1ca0d6
SHA138fbc5d2d3bc3a70db91c878064a29ab4c0df0c1
SHA2564ca9723624288c75395c9e887711efba854e2d24ae0a2dd3ab208313de200cd0
SHA5123f99215445817f9e7a10b7dd9d68709c4ce0eecd62cb12dbefe8878bf745497581d61155aae812c02b1281e1565b04751823392bfbf7496bfbc712714ca499b5
-
Filesize
6KB
MD5f9816a9b8b50d72fbdde9cf6b4276af8
SHA183ea83c9a8ced4bb5b2a566c518467c865b61e42
SHA256175f33fabbb3b04e131ad74a5dcd3ceaf24391725bd974a0a3bced7f3750dee7
SHA512041b7a39220672ddbdbbab420e2ac1e8775ba8fb5cd1df66b57d88be08f7124ac41b111cacc8c38891c7d832b45246b7dd32c9aed2fda6c0d7ac9cbc66396f16
-
Filesize
6KB
MD5fc156ea502f5ba221df7fde150199164
SHA1f35cd86698606ae55c6e8a94d76d3d70bdd9a861
SHA2566db2a052ebc252d7831554d98e61daf59791a2754ab8d5b65fc818d78c7a8e03
SHA51299d7584213b34d31b2abff5540ebb2e2c57d54d29c067f456678cc969418d5b39fda1dd55061521ad24ad22e7ab675c0571dc6d2318a146da05aa1ce641151c8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\d5536e60-7e4c-4c5f-be6c-e10902f6b4c3.tmp
Filesize5KB
MD57e5bbff1fe806b6cdce33ee406e25ec9
SHA11ee1b2897292729a165fcb233eb368b9677f8022
SHA256c32bfdc32c13e37400e6399b39566a988e2bd15625e815dc13bdb33caa95e088
SHA5129d49f8e4b370db97a401cfe0f416d03ef30c7702dd54fa19fc781c9f777a12669c8736a99dca8a4933828bfe1e812137300eae77b2f8c907c922e640bbfd025f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD58b54894a67f8417094774726e6184bad
SHA17690e85da2d571a4d36f2b7e73cf6ba388b4f9f3
SHA2568e1421447f4cbc08fe10410ac8499f242a20fcf6c445af94fd3b0008f4a0bfe6
SHA51206ac366aca0f47b44da4d1107876e6e621f22453f62816fce2423b745d796cf7e06f2c32b64de63ecaf79cceb3c474e8b5379ee496d6b441e59232498dfd243e