Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2024, 14:47
Static task
static1
Behavioral task
behavioral1
Sample
811bdfc33d063e159ef5660584438f36_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
811bdfc33d063e159ef5660584438f36_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
811bdfc33d063e159ef5660584438f36_JaffaCakes118.html
-
Size
35KB
-
MD5
811bdfc33d063e159ef5660584438f36
-
SHA1
4aa5e871ba220d50f96fb0c400237ea13bf50f3f
-
SHA256
098af3ed07f49af35bb0c263f41bbefe776838872f3a97337312eb54a12a78cb
-
SHA512
3b3eb8b25c6bbeba11711b61c566b10b5280c8a5e0954359e4fa10dd4bea80591fbe147e8e6c706a5add7652f0825c1c9d4c1ae0cfd0003700b5a8ace060e956
-
SSDEEP
768:zwx/MDTH8G88hARHZPXveE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6TIZOX6sggh6lLP:Q/rbJxNVvu0Sx/P8KK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5072 msedge.exe 5072 msedge.exe 2760 msedge.exe 2760 msedge.exe 924 identity_helper.exe 924 identity_helper.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2760 wrote to memory of 1284 2760 msedge.exe 82 PID 2760 wrote to memory of 1284 2760 msedge.exe 82 PID 2760 wrote to memory of 5216 2760 msedge.exe 83 PID 2760 wrote to memory of 5216 2760 msedge.exe 83 PID 2760 wrote to memory of 5216 2760 msedge.exe 83 PID 2760 wrote to memory of 5216 2760 msedge.exe 83 PID 2760 wrote to memory of 5216 2760 msedge.exe 83 PID 2760 wrote to memory of 5216 2760 msedge.exe 83 PID 2760 wrote to memory of 5216 2760 msedge.exe 83 PID 2760 wrote to memory of 5216 2760 msedge.exe 83 PID 2760 wrote to memory of 5216 2760 msedge.exe 83 PID 2760 wrote to memory of 5216 2760 msedge.exe 83 PID 2760 wrote to memory of 5216 2760 msedge.exe 83 PID 2760 wrote to memory of 5216 2760 msedge.exe 83 PID 2760 wrote to memory of 5216 2760 msedge.exe 83 PID 2760 wrote to memory of 5216 2760 msedge.exe 83 PID 2760 wrote to memory of 5216 2760 msedge.exe 83 PID 2760 wrote to memory of 5216 2760 msedge.exe 83 PID 2760 wrote to memory of 5216 2760 msedge.exe 83 PID 2760 wrote to memory of 5216 2760 msedge.exe 83 PID 2760 wrote to memory of 5216 2760 msedge.exe 83 PID 2760 wrote to memory of 5216 2760 msedge.exe 83 PID 2760 wrote to memory of 5216 2760 msedge.exe 83 PID 2760 wrote to memory of 5216 2760 msedge.exe 83 PID 2760 wrote to memory of 5216 2760 msedge.exe 83 PID 2760 wrote to memory of 5216 2760 msedge.exe 83 PID 2760 wrote to memory of 5216 2760 msedge.exe 83 PID 2760 wrote to memory of 5216 2760 msedge.exe 83 PID 2760 wrote to memory of 5216 2760 msedge.exe 83 PID 2760 wrote to memory of 5216 2760 msedge.exe 83 PID 2760 wrote to memory of 5216 2760 msedge.exe 83 PID 2760 wrote to memory of 5216 2760 msedge.exe 83 PID 2760 wrote to memory of 5216 2760 msedge.exe 83 PID 2760 wrote to memory of 5216 2760 msedge.exe 83 PID 2760 wrote to memory of 5216 2760 msedge.exe 83 PID 2760 wrote to memory of 5216 2760 msedge.exe 83 PID 2760 wrote to memory of 5216 2760 msedge.exe 83 PID 2760 wrote to memory of 5216 2760 msedge.exe 83 PID 2760 wrote to memory of 5216 2760 msedge.exe 83 PID 2760 wrote to memory of 5216 2760 msedge.exe 83 PID 2760 wrote to memory of 5216 2760 msedge.exe 83 PID 2760 wrote to memory of 5216 2760 msedge.exe 83 PID 2760 wrote to memory of 5072 2760 msedge.exe 84 PID 2760 wrote to memory of 5072 2760 msedge.exe 84 PID 2760 wrote to memory of 3628 2760 msedge.exe 85 PID 2760 wrote to memory of 3628 2760 msedge.exe 85 PID 2760 wrote to memory of 3628 2760 msedge.exe 85 PID 2760 wrote to memory of 3628 2760 msedge.exe 85 PID 2760 wrote to memory of 3628 2760 msedge.exe 85 PID 2760 wrote to memory of 3628 2760 msedge.exe 85 PID 2760 wrote to memory of 3628 2760 msedge.exe 85 PID 2760 wrote to memory of 3628 2760 msedge.exe 85 PID 2760 wrote to memory of 3628 2760 msedge.exe 85 PID 2760 wrote to memory of 3628 2760 msedge.exe 85 PID 2760 wrote to memory of 3628 2760 msedge.exe 85 PID 2760 wrote to memory of 3628 2760 msedge.exe 85 PID 2760 wrote to memory of 3628 2760 msedge.exe 85 PID 2760 wrote to memory of 3628 2760 msedge.exe 85 PID 2760 wrote to memory of 3628 2760 msedge.exe 85 PID 2760 wrote to memory of 3628 2760 msedge.exe 85 PID 2760 wrote to memory of 3628 2760 msedge.exe 85 PID 2760 wrote to memory of 3628 2760 msedge.exe 85 PID 2760 wrote to memory of 3628 2760 msedge.exe 85 PID 2760 wrote to memory of 3628 2760 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\811bdfc33d063e159ef5660584438f36_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9a4f946f8,0x7ff9a4f94708,0x7ff9a4f947182⤵PID:1284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,16466139783535609772,14453295936144840151,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:5216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,16466139783535609772,14453295936144840151,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,16466139783535609772,14453295936144840151,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,16466139783535609772,14453295936144840151,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,16466139783535609772,14453295936144840151,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,16466139783535609772,14453295936144840151,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,16466139783535609772,14453295936144840151,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,16466139783535609772,14453295936144840151,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:5188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,16466139783535609772,14453295936144840151,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,16466139783535609772,14453295936144840151,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,16466139783535609772,14453295936144840151,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:5784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,16466139783535609772,14453295936144840151,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4856 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3380
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4092
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2388
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
613B
MD5461a084cd82db302627e00f311eb9847
SHA1b6f460f1e574e849663c20617018e51b07109b71
SHA256776b525c95a77d13c9e8be5de91241b3ae68e7de7f16184e04c3520e53130844
SHA512e283278686ced03f5b0c8d327be66eb62f8894ad40a7aaf335fe18ba5f00236a38e3971c1635cf02398e116acbb564326f83f431d5a2b3e9f0c05e846151845b
-
Filesize
5KB
MD52a5ee1a2e5aa715ab0608bb6840ebb35
SHA1779d31cfb6841e612c0a21945015ce22079ae632
SHA256cff745095dfa02fc7a933052a15813b0078ed765f0ef19a0bde6b9c27ffe43df
SHA512958b394cd04ee5b815b1f98d757647de5244457e16e0d359589d12b41457936e9eadf375475e57694e7cbaf8f3982f9e35ce54f79431311d4456ce6f0253f014
-
Filesize
6KB
MD518d0675e8aa17d236f7c4a4bb24ede29
SHA1104f9201b16f6bc9c49917b9027edcd3c848d0f3
SHA256d80b358e141305523cc0433fde236ef2c9794187723193093d3cb447dfc6df9d
SHA512ba6a3acf19fcae775af5f9dbe883785bb8a779cf7abed8833d7d52f982d350d07b305c17eb9545335950bfea8f1a00ba5ffb2763276a1e93c331022bdb00ba19
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD582b795d10fc9ab1ce5ac6b1415b9dc69
SHA131d7ef86f0bbdd037f3deabed706ac7ed7c25c9d
SHA256758df48b7d00b941c767e7ca6962a6fedc8ceaebb06053584acdbd081ae8ce16
SHA51296a1cd4c2b9914ff17376b74ef4645cdd2e2e3a12354e3710d9e172b855f5f27cb7a01072b3fa5b6a67f4bbfe512abbcb1f16714e390049676f60421aae6d09d