Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29-05-2024 15:29
Static task
static1
Behavioral task
behavioral1
Sample
813348488d63c7df7cdd0ad79db9df75_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
813348488d63c7df7cdd0ad79db9df75_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
813348488d63c7df7cdd0ad79db9df75_JaffaCakes118.html
-
Size
118KB
-
MD5
813348488d63c7df7cdd0ad79db9df75
-
SHA1
b1f17e99af95e1166e7b4b6181bec53738854a36
-
SHA256
2722a8e69c6a91856bee6936eb3629f11bf95425212084f41cb9013d5b96b260
-
SHA512
0cedc29f82ebfc95bca71db4a78fbe5ce66b90d3af180e750700d45d1433ef207a836251136cc0580ad2c9a59c7c6c05726fd8c84cec194c39ca4b69e389efcb
-
SSDEEP
1536:eD/uqZL77YXZ+MDuX8ZVMDQwXZgMDQTqZgMDk9UZVMDSVAZQMDFOmZaMDf41ZgMR:eqfUrfUrNW
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 400 msedge.exe 400 msedge.exe 4564 msedge.exe 4564 msedge.exe 4172 identity_helper.exe 4172 identity_helper.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4564 wrote to memory of 920 4564 msedge.exe 83 PID 4564 wrote to memory of 920 4564 msedge.exe 83 PID 4564 wrote to memory of 3612 4564 msedge.exe 84 PID 4564 wrote to memory of 3612 4564 msedge.exe 84 PID 4564 wrote to memory of 3612 4564 msedge.exe 84 PID 4564 wrote to memory of 3612 4564 msedge.exe 84 PID 4564 wrote to memory of 3612 4564 msedge.exe 84 PID 4564 wrote to memory of 3612 4564 msedge.exe 84 PID 4564 wrote to memory of 3612 4564 msedge.exe 84 PID 4564 wrote to memory of 3612 4564 msedge.exe 84 PID 4564 wrote to memory of 3612 4564 msedge.exe 84 PID 4564 wrote to memory of 3612 4564 msedge.exe 84 PID 4564 wrote to memory of 3612 4564 msedge.exe 84 PID 4564 wrote to memory of 3612 4564 msedge.exe 84 PID 4564 wrote to memory of 3612 4564 msedge.exe 84 PID 4564 wrote to memory of 3612 4564 msedge.exe 84 PID 4564 wrote to memory of 3612 4564 msedge.exe 84 PID 4564 wrote to memory of 3612 4564 msedge.exe 84 PID 4564 wrote to memory of 3612 4564 msedge.exe 84 PID 4564 wrote to memory of 3612 4564 msedge.exe 84 PID 4564 wrote to memory of 3612 4564 msedge.exe 84 PID 4564 wrote to memory of 3612 4564 msedge.exe 84 PID 4564 wrote to memory of 3612 4564 msedge.exe 84 PID 4564 wrote to memory of 3612 4564 msedge.exe 84 PID 4564 wrote to memory of 3612 4564 msedge.exe 84 PID 4564 wrote to memory of 3612 4564 msedge.exe 84 PID 4564 wrote to memory of 3612 4564 msedge.exe 84 PID 4564 wrote to memory of 3612 4564 msedge.exe 84 PID 4564 wrote to memory of 3612 4564 msedge.exe 84 PID 4564 wrote to memory of 3612 4564 msedge.exe 84 PID 4564 wrote to memory of 3612 4564 msedge.exe 84 PID 4564 wrote to memory of 3612 4564 msedge.exe 84 PID 4564 wrote to memory of 3612 4564 msedge.exe 84 PID 4564 wrote to memory of 3612 4564 msedge.exe 84 PID 4564 wrote to memory of 3612 4564 msedge.exe 84 PID 4564 wrote to memory of 3612 4564 msedge.exe 84 PID 4564 wrote to memory of 3612 4564 msedge.exe 84 PID 4564 wrote to memory of 3612 4564 msedge.exe 84 PID 4564 wrote to memory of 3612 4564 msedge.exe 84 PID 4564 wrote to memory of 3612 4564 msedge.exe 84 PID 4564 wrote to memory of 3612 4564 msedge.exe 84 PID 4564 wrote to memory of 3612 4564 msedge.exe 84 PID 4564 wrote to memory of 400 4564 msedge.exe 85 PID 4564 wrote to memory of 400 4564 msedge.exe 85 PID 4564 wrote to memory of 4800 4564 msedge.exe 86 PID 4564 wrote to memory of 4800 4564 msedge.exe 86 PID 4564 wrote to memory of 4800 4564 msedge.exe 86 PID 4564 wrote to memory of 4800 4564 msedge.exe 86 PID 4564 wrote to memory of 4800 4564 msedge.exe 86 PID 4564 wrote to memory of 4800 4564 msedge.exe 86 PID 4564 wrote to memory of 4800 4564 msedge.exe 86 PID 4564 wrote to memory of 4800 4564 msedge.exe 86 PID 4564 wrote to memory of 4800 4564 msedge.exe 86 PID 4564 wrote to memory of 4800 4564 msedge.exe 86 PID 4564 wrote to memory of 4800 4564 msedge.exe 86 PID 4564 wrote to memory of 4800 4564 msedge.exe 86 PID 4564 wrote to memory of 4800 4564 msedge.exe 86 PID 4564 wrote to memory of 4800 4564 msedge.exe 86 PID 4564 wrote to memory of 4800 4564 msedge.exe 86 PID 4564 wrote to memory of 4800 4564 msedge.exe 86 PID 4564 wrote to memory of 4800 4564 msedge.exe 86 PID 4564 wrote to memory of 4800 4564 msedge.exe 86 PID 4564 wrote to memory of 4800 4564 msedge.exe 86 PID 4564 wrote to memory of 4800 4564 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\813348488d63c7df7cdd0ad79db9df75_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffae94e46f8,0x7ffae94e4708,0x7ffae94e47182⤵PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,2960287607787404702,17177764520574684835,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,2960287607787404702,17177764520574684835,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2484 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,2960287607787404702,17177764520574684835,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,2960287607787404702,17177764520574684835,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,2960287607787404702,17177764520574684835,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,2960287607787404702,17177764520574684835,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,2960287607787404702,17177764520574684835,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5548 /prefetch:82⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,2960287607787404702,17177764520574684835,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5548 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,2960287607787404702,17177764520574684835,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,2960287607787404702,17177764520574684835,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,2960287607787404702,17177764520574684835,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:12⤵PID:1484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,2960287607787404702,17177764520574684835,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,2960287607787404702,17177764520574684835,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5020 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1284
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2600
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD5008fe099fdc65bef755ae6064c4016ed
SHA19f24c5152d072b27ae66fad14d827a9e700f2b7b
SHA2568babfa4d4a86d551f8d4e5cdee805b110c651355abd5ccb893af2f1fd54d571e
SHA512155da1e09f0dd030b3119782ae3bdf15e711b59b6713d04c9ca094679403e20c211eb9e04bb029fa5907244a0927b548389d519ac6542da2e525778542ea9cdc
-
Filesize
6KB
MD5020f209f0c4c446795a6d42d62360d7d
SHA1f05000e3e90a2ff37d5661bdced5e7ff761c8b51
SHA25603fe5528a2db5ad8d87c1f34b4ebfcc75c6fb822bf6b87cc98a077a3130ffd90
SHA51252148b6c5f2b672b537ee4a27b99b0e1f7cd77a3fbcbae9c0287dc0bb0b1255f53e931cc7d2e2075ee268ea12e2ea33a55e13e9c0c2573df30e1a8422e8bcba2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5dc340a6a6662be4fa18b3974df62e9bd
SHA1c261210aee999c455193efca10399d896e4fe6c8
SHA256630c910eb869619d5e0bcbe67fffa28d2ff9c76b38bc5b24b65f7a36a7db73ff
SHA5121b562e226e96fa44555299f16e2302dfe50551b583645a8953370befc3874f40e8348386c16d2ce27d56c5380a27b8e733c715d7e7a0e01563e383a41ac2cebb