Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2024, 13:23
Static task
static1
Behavioral task
behavioral1
Sample
80e32a65ebd39eac6efe4f5577ac5984_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
80e32a65ebd39eac6efe4f5577ac5984_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
80e32a65ebd39eac6efe4f5577ac5984_JaffaCakes118.html
-
Size
175KB
-
MD5
80e32a65ebd39eac6efe4f5577ac5984
-
SHA1
e40318bedfc01776efcc85fb0447f909af92ca8f
-
SHA256
6885cd2f1a877d5907f8bf36049bf8ca7886939050fbdc3764c5a2754cd93298
-
SHA512
c828471f40940ecdc47cb126ca5008d4afff5b5fccd842cff421c0888e718b02a0c1a95f96ea8fd135d12966fd632360b0b902b0dc8305824391a2a79810232c
-
SSDEEP
1536:Sqtz8hd8Wu8pI8Cd8hd8dQg0H//3oS31GNkFZYfBCJisY+aeTH+WK/Lf1/hmnVSV:SOoT31/F8BCJiSm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3156 msedge.exe 3156 msedge.exe 1768 msedge.exe 1768 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1768 wrote to memory of 1512 1768 msedge.exe 83 PID 1768 wrote to memory of 1512 1768 msedge.exe 83 PID 1768 wrote to memory of 5092 1768 msedge.exe 84 PID 1768 wrote to memory of 5092 1768 msedge.exe 84 PID 1768 wrote to memory of 5092 1768 msedge.exe 84 PID 1768 wrote to memory of 5092 1768 msedge.exe 84 PID 1768 wrote to memory of 5092 1768 msedge.exe 84 PID 1768 wrote to memory of 5092 1768 msedge.exe 84 PID 1768 wrote to memory of 5092 1768 msedge.exe 84 PID 1768 wrote to memory of 5092 1768 msedge.exe 84 PID 1768 wrote to memory of 5092 1768 msedge.exe 84 PID 1768 wrote to memory of 5092 1768 msedge.exe 84 PID 1768 wrote to memory of 5092 1768 msedge.exe 84 PID 1768 wrote to memory of 5092 1768 msedge.exe 84 PID 1768 wrote to memory of 5092 1768 msedge.exe 84 PID 1768 wrote to memory of 5092 1768 msedge.exe 84 PID 1768 wrote to memory of 5092 1768 msedge.exe 84 PID 1768 wrote to memory of 5092 1768 msedge.exe 84 PID 1768 wrote to memory of 5092 1768 msedge.exe 84 PID 1768 wrote to memory of 5092 1768 msedge.exe 84 PID 1768 wrote to memory of 5092 1768 msedge.exe 84 PID 1768 wrote to memory of 5092 1768 msedge.exe 84 PID 1768 wrote to memory of 5092 1768 msedge.exe 84 PID 1768 wrote to memory of 5092 1768 msedge.exe 84 PID 1768 wrote to memory of 5092 1768 msedge.exe 84 PID 1768 wrote to memory of 5092 1768 msedge.exe 84 PID 1768 wrote to memory of 5092 1768 msedge.exe 84 PID 1768 wrote to memory of 5092 1768 msedge.exe 84 PID 1768 wrote to memory of 5092 1768 msedge.exe 84 PID 1768 wrote to memory of 5092 1768 msedge.exe 84 PID 1768 wrote to memory of 5092 1768 msedge.exe 84 PID 1768 wrote to memory of 5092 1768 msedge.exe 84 PID 1768 wrote to memory of 5092 1768 msedge.exe 84 PID 1768 wrote to memory of 5092 1768 msedge.exe 84 PID 1768 wrote to memory of 5092 1768 msedge.exe 84 PID 1768 wrote to memory of 5092 1768 msedge.exe 84 PID 1768 wrote to memory of 5092 1768 msedge.exe 84 PID 1768 wrote to memory of 5092 1768 msedge.exe 84 PID 1768 wrote to memory of 5092 1768 msedge.exe 84 PID 1768 wrote to memory of 5092 1768 msedge.exe 84 PID 1768 wrote to memory of 5092 1768 msedge.exe 84 PID 1768 wrote to memory of 5092 1768 msedge.exe 84 PID 1768 wrote to memory of 3156 1768 msedge.exe 85 PID 1768 wrote to memory of 3156 1768 msedge.exe 85 PID 1768 wrote to memory of 4932 1768 msedge.exe 86 PID 1768 wrote to memory of 4932 1768 msedge.exe 86 PID 1768 wrote to memory of 4932 1768 msedge.exe 86 PID 1768 wrote to memory of 4932 1768 msedge.exe 86 PID 1768 wrote to memory of 4932 1768 msedge.exe 86 PID 1768 wrote to memory of 4932 1768 msedge.exe 86 PID 1768 wrote to memory of 4932 1768 msedge.exe 86 PID 1768 wrote to memory of 4932 1768 msedge.exe 86 PID 1768 wrote to memory of 4932 1768 msedge.exe 86 PID 1768 wrote to memory of 4932 1768 msedge.exe 86 PID 1768 wrote to memory of 4932 1768 msedge.exe 86 PID 1768 wrote to memory of 4932 1768 msedge.exe 86 PID 1768 wrote to memory of 4932 1768 msedge.exe 86 PID 1768 wrote to memory of 4932 1768 msedge.exe 86 PID 1768 wrote to memory of 4932 1768 msedge.exe 86 PID 1768 wrote to memory of 4932 1768 msedge.exe 86 PID 1768 wrote to memory of 4932 1768 msedge.exe 86 PID 1768 wrote to memory of 4932 1768 msedge.exe 86 PID 1768 wrote to memory of 4932 1768 msedge.exe 86 PID 1768 wrote to memory of 4932 1768 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\80e32a65ebd39eac6efe4f5577ac5984_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdc2ac46f8,0x7ffdc2ac4708,0x7ffdc2ac47182⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,7417642495995339961,12664183686818244288,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,7417642495995339961,12664183686818244288,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,7417642495995339961,12664183686818244288,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7417642495995339961,12664183686818244288,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7417642495995339961,12664183686818244288,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7417642495995339961,12664183686818244288,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7417642495995339961,12664183686818244288,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:12⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7417642495995339961,12664183686818244288,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7417642495995339961,12664183686818244288,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,7417642495995339961,12664183686818244288,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1768 /prefetch:22⤵PID:2608
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3088
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
378B
MD5c0af9c48536dc317d84c0dd3bd34f0de
SHA1049c33f41eb87848672a8903dfb2250dc9725ab8
SHA25681e3fcfb977a4b2a0276eab521f06764d09e828640a606ef2a64ac8ccd5f4ccc
SHA51249ac9fb24676dc05b2674307b81f3a67412ada1fc551e727a5b968cadd9ede72cece1a45765337af583f0f16782c9d609b1f15a39934601b90d041d93d8d4563
-
Filesize
5KB
MD56cf30735d83af855b3a592916318bb0d
SHA146e5fbbe7df4cfcbf1b71ba40523baa0e61095f5
SHA2564037409c0aef532dc23dae0147a2737923dc390ba38b8b64e1c680f9cf8e9dce
SHA5127567a2731a0b188d1c53fbd3336cb03da44299227058d358f1fb02a907e90c626453bf15d329670767595b3364a30ed2911b6f4e5cb862cfd3dd10f4798eb28f
-
Filesize
6KB
MD5151ac4b466ac72b437e0941081e95cc7
SHA1a571030644d9670a1dd715acba69ccd3952185e0
SHA256bc31aeef37a01523ee6960973f9621daf599074ddaa29c4d50952bc517460c11
SHA512ddc68efeb496f4082a4a62f08c4b0981a990b9a8a2439104891a3fc667a8b401857d6d284f4af43d88fbb2c0aef08568dd418516dd65202199db95ce4d9341bf
-
Filesize
11KB
MD59061dfddc75a4fa9062d17975f53ed92
SHA19e144adda49067c042b30765fcf77d0f08d63088
SHA25656aa415b01baabac133eb557a1dc6ba2d025543d017e844a0d79ff584d006553
SHA51248af62115f3ab37a09b61560383cfb28bdfdf34e787c42bdc798e4371ae73bb9a8cad385cae2cbb44a216256d1ff7b278df029addfee72b2cd732e2caa894056