Analysis
-
max time kernel
143s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2024, 15:37
Static task
static1
Behavioral task
behavioral1
Sample
8137c050fd61b2eaf82628af50456dab_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8137c050fd61b2eaf82628af50456dab_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8137c050fd61b2eaf82628af50456dab_JaffaCakes118.html
-
Size
27KB
-
MD5
8137c050fd61b2eaf82628af50456dab
-
SHA1
9330434dbed68c06e4f2fd37f4247eb12df43f36
-
SHA256
17347ffd90ce5419e03c3938b7cde924ef82e363de5ee403c75cdaddbe980cc7
-
SHA512
bae8770df0829616204aaa8bb1e941873ee1f47d455b962e221fb3d2f85f6f8e72b1070c61ced0c26c3fe269eef759ee6eacb6d79b69ebf95627229b7f81774d
-
SSDEEP
192:NmOoKqvb5nlnQjLntQ/vnQievnZnQOkrntd+nQTbn6nQ4MCHAfpdE7wuMOAQWMlI:8OoxUQ//05Y4g
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3152 msedge.exe 3152 msedge.exe 2180 msedge.exe 2180 msedge.exe 3580 identity_helper.exe 3580 identity_helper.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2180 wrote to memory of 1740 2180 msedge.exe 82 PID 2180 wrote to memory of 1740 2180 msedge.exe 82 PID 2180 wrote to memory of 4848 2180 msedge.exe 83 PID 2180 wrote to memory of 4848 2180 msedge.exe 83 PID 2180 wrote to memory of 4848 2180 msedge.exe 83 PID 2180 wrote to memory of 4848 2180 msedge.exe 83 PID 2180 wrote to memory of 4848 2180 msedge.exe 83 PID 2180 wrote to memory of 4848 2180 msedge.exe 83 PID 2180 wrote to memory of 4848 2180 msedge.exe 83 PID 2180 wrote to memory of 4848 2180 msedge.exe 83 PID 2180 wrote to memory of 4848 2180 msedge.exe 83 PID 2180 wrote to memory of 4848 2180 msedge.exe 83 PID 2180 wrote to memory of 4848 2180 msedge.exe 83 PID 2180 wrote to memory of 4848 2180 msedge.exe 83 PID 2180 wrote to memory of 4848 2180 msedge.exe 83 PID 2180 wrote to memory of 4848 2180 msedge.exe 83 PID 2180 wrote to memory of 4848 2180 msedge.exe 83 PID 2180 wrote to memory of 4848 2180 msedge.exe 83 PID 2180 wrote to memory of 4848 2180 msedge.exe 83 PID 2180 wrote to memory of 4848 2180 msedge.exe 83 PID 2180 wrote to memory of 4848 2180 msedge.exe 83 PID 2180 wrote to memory of 4848 2180 msedge.exe 83 PID 2180 wrote to memory of 4848 2180 msedge.exe 83 PID 2180 wrote to memory of 4848 2180 msedge.exe 83 PID 2180 wrote to memory of 4848 2180 msedge.exe 83 PID 2180 wrote to memory of 4848 2180 msedge.exe 83 PID 2180 wrote to memory of 4848 2180 msedge.exe 83 PID 2180 wrote to memory of 4848 2180 msedge.exe 83 PID 2180 wrote to memory of 4848 2180 msedge.exe 83 PID 2180 wrote to memory of 4848 2180 msedge.exe 83 PID 2180 wrote to memory of 4848 2180 msedge.exe 83 PID 2180 wrote to memory of 4848 2180 msedge.exe 83 PID 2180 wrote to memory of 4848 2180 msedge.exe 83 PID 2180 wrote to memory of 4848 2180 msedge.exe 83 PID 2180 wrote to memory of 4848 2180 msedge.exe 83 PID 2180 wrote to memory of 4848 2180 msedge.exe 83 PID 2180 wrote to memory of 4848 2180 msedge.exe 83 PID 2180 wrote to memory of 4848 2180 msedge.exe 83 PID 2180 wrote to memory of 4848 2180 msedge.exe 83 PID 2180 wrote to memory of 4848 2180 msedge.exe 83 PID 2180 wrote to memory of 4848 2180 msedge.exe 83 PID 2180 wrote to memory of 4848 2180 msedge.exe 83 PID 2180 wrote to memory of 3152 2180 msedge.exe 84 PID 2180 wrote to memory of 3152 2180 msedge.exe 84 PID 2180 wrote to memory of 2920 2180 msedge.exe 85 PID 2180 wrote to memory of 2920 2180 msedge.exe 85 PID 2180 wrote to memory of 2920 2180 msedge.exe 85 PID 2180 wrote to memory of 2920 2180 msedge.exe 85 PID 2180 wrote to memory of 2920 2180 msedge.exe 85 PID 2180 wrote to memory of 2920 2180 msedge.exe 85 PID 2180 wrote to memory of 2920 2180 msedge.exe 85 PID 2180 wrote to memory of 2920 2180 msedge.exe 85 PID 2180 wrote to memory of 2920 2180 msedge.exe 85 PID 2180 wrote to memory of 2920 2180 msedge.exe 85 PID 2180 wrote to memory of 2920 2180 msedge.exe 85 PID 2180 wrote to memory of 2920 2180 msedge.exe 85 PID 2180 wrote to memory of 2920 2180 msedge.exe 85 PID 2180 wrote to memory of 2920 2180 msedge.exe 85 PID 2180 wrote to memory of 2920 2180 msedge.exe 85 PID 2180 wrote to memory of 2920 2180 msedge.exe 85 PID 2180 wrote to memory of 2920 2180 msedge.exe 85 PID 2180 wrote to memory of 2920 2180 msedge.exe 85 PID 2180 wrote to memory of 2920 2180 msedge.exe 85 PID 2180 wrote to memory of 2920 2180 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8137c050fd61b2eaf82628af50456dab_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc752146f8,0x7ffc75214708,0x7ffc752147182⤵PID:1740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1968,7188567206051221298,10581409942905271338,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1968,7188567206051221298,10581409942905271338,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1968,7188567206051221298,10581409942905271338,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,7188567206051221298,10581409942905271338,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,7188567206051221298,10581409942905271338,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1968,7188567206051221298,10581409942905271338,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5924 /prefetch:82⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1968,7188567206051221298,10581409942905271338,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5924 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,7188567206051221298,10581409942905271338,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:1116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,7188567206051221298,10581409942905271338,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,7188567206051221298,10581409942905271338,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3104 /prefetch:12⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,7188567206051221298,10581409942905271338,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1968,7188567206051221298,10581409942905271338,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3448 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:220
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1312
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:736
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
5KB
MD58d6192067511200685ea10544534e875
SHA1a6625735f68b60d15ea07f8cb7fe0b108bb7cd04
SHA2562550bc7bc428d140f2a73b9e68d0fd4a95eb38072763e47664b1c463799e822e
SHA512c2973eb3dee17d78efc0e89af7b1ce89569d1243d4d2037ceaf66a9ce309292067a3e8d6a3f63461aa90fd62c34a9b551a419535be87ac61dd7ae280e8ab6e96
-
Filesize
6KB
MD591f95982fca24d6a7159d57ee887ad51
SHA1bfe29a44c88fc3ec80c4b43412cfcc1686e54a98
SHA256fc190062529e18acef9b5bc75d0f26d8c35caed09a271fd6b61a9780b34b2cb5
SHA5120b8e99d9d09505b41a85bf801947f16fd30861bbdc6c7d1390d677da8a528f000a5d37e610b2b0fb40006a56646ebac212046d7f0a086dcee9a3eae23981ed87
-
Filesize
6KB
MD578addc620bb605802e5f3ddb21aa704f
SHA121919eb135d37fbb1078dbefbb25655189d3f250
SHA256e09dcc7b2900cc2512d79a57d5fb9700468fc1d5a4dede35689222c9308cc7a1
SHA5123752f5737de556f3e88e846a07a873d36601f982de64ceb94c0a959a44bea3440a26993aedd1b191328f317e2b85aee243af01c75371b881a5878b50fc39eb0b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a867c67522f4b07d053e45bd974c97dd
SHA1b9cdb85ff89a79377922ee8fc2024ab8d1d56028
SHA2561787c8882e3eaab1a4722969ab4207a9e7c89cb174816b5cebf68b86af4640a7
SHA5129585f858dd04fe74550862bfc13378257046048ab007f309a4c1b0969ca000a954126aad6c120509afb357cf9e777e44909950912a67bf3f17112f48da05eb6d