Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30/05/2024, 00:25
Static task
static1
Behavioral task
behavioral1
Sample
827ef2e3cc4410639a36b26d419dee67_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
827ef2e3cc4410639a36b26d419dee67_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
827ef2e3cc4410639a36b26d419dee67_JaffaCakes118.html
-
Size
4KB
-
MD5
827ef2e3cc4410639a36b26d419dee67
-
SHA1
a6ae32e0d0789346aa4c7a16e45017ac7249a9e3
-
SHA256
d590976ec663e17ab92fa11937046031e638348aac5d2d8fab63093319d82028
-
SHA512
05a9f5b13f2357f7e3b639bf4b29cfd2d10f025eec9e508513ce931061884b08a7d269b325ad215583f674bfb37b2dcd229e5e30597a62350b85f571ffaaa530
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oWid:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1068 msedge.exe 1068 msedge.exe 2956 msedge.exe 2956 msedge.exe 4208 identity_helper.exe 4208 identity_helper.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2956 wrote to memory of 744 2956 msedge.exe 85 PID 2956 wrote to memory of 744 2956 msedge.exe 85 PID 2956 wrote to memory of 1524 2956 msedge.exe 86 PID 2956 wrote to memory of 1524 2956 msedge.exe 86 PID 2956 wrote to memory of 1524 2956 msedge.exe 86 PID 2956 wrote to memory of 1524 2956 msedge.exe 86 PID 2956 wrote to memory of 1524 2956 msedge.exe 86 PID 2956 wrote to memory of 1524 2956 msedge.exe 86 PID 2956 wrote to memory of 1524 2956 msedge.exe 86 PID 2956 wrote to memory of 1524 2956 msedge.exe 86 PID 2956 wrote to memory of 1524 2956 msedge.exe 86 PID 2956 wrote to memory of 1524 2956 msedge.exe 86 PID 2956 wrote to memory of 1524 2956 msedge.exe 86 PID 2956 wrote to memory of 1524 2956 msedge.exe 86 PID 2956 wrote to memory of 1524 2956 msedge.exe 86 PID 2956 wrote to memory of 1524 2956 msedge.exe 86 PID 2956 wrote to memory of 1524 2956 msedge.exe 86 PID 2956 wrote to memory of 1524 2956 msedge.exe 86 PID 2956 wrote to memory of 1524 2956 msedge.exe 86 PID 2956 wrote to memory of 1524 2956 msedge.exe 86 PID 2956 wrote to memory of 1524 2956 msedge.exe 86 PID 2956 wrote to memory of 1524 2956 msedge.exe 86 PID 2956 wrote to memory of 1524 2956 msedge.exe 86 PID 2956 wrote to memory of 1524 2956 msedge.exe 86 PID 2956 wrote to memory of 1524 2956 msedge.exe 86 PID 2956 wrote to memory of 1524 2956 msedge.exe 86 PID 2956 wrote to memory of 1524 2956 msedge.exe 86 PID 2956 wrote to memory of 1524 2956 msedge.exe 86 PID 2956 wrote to memory of 1524 2956 msedge.exe 86 PID 2956 wrote to memory of 1524 2956 msedge.exe 86 PID 2956 wrote to memory of 1524 2956 msedge.exe 86 PID 2956 wrote to memory of 1524 2956 msedge.exe 86 PID 2956 wrote to memory of 1524 2956 msedge.exe 86 PID 2956 wrote to memory of 1524 2956 msedge.exe 86 PID 2956 wrote to memory of 1524 2956 msedge.exe 86 PID 2956 wrote to memory of 1524 2956 msedge.exe 86 PID 2956 wrote to memory of 1524 2956 msedge.exe 86 PID 2956 wrote to memory of 1524 2956 msedge.exe 86 PID 2956 wrote to memory of 1524 2956 msedge.exe 86 PID 2956 wrote to memory of 1524 2956 msedge.exe 86 PID 2956 wrote to memory of 1524 2956 msedge.exe 86 PID 2956 wrote to memory of 1524 2956 msedge.exe 86 PID 2956 wrote to memory of 1068 2956 msedge.exe 87 PID 2956 wrote to memory of 1068 2956 msedge.exe 87 PID 2956 wrote to memory of 3572 2956 msedge.exe 88 PID 2956 wrote to memory of 3572 2956 msedge.exe 88 PID 2956 wrote to memory of 3572 2956 msedge.exe 88 PID 2956 wrote to memory of 3572 2956 msedge.exe 88 PID 2956 wrote to memory of 3572 2956 msedge.exe 88 PID 2956 wrote to memory of 3572 2956 msedge.exe 88 PID 2956 wrote to memory of 3572 2956 msedge.exe 88 PID 2956 wrote to memory of 3572 2956 msedge.exe 88 PID 2956 wrote to memory of 3572 2956 msedge.exe 88 PID 2956 wrote to memory of 3572 2956 msedge.exe 88 PID 2956 wrote to memory of 3572 2956 msedge.exe 88 PID 2956 wrote to memory of 3572 2956 msedge.exe 88 PID 2956 wrote to memory of 3572 2956 msedge.exe 88 PID 2956 wrote to memory of 3572 2956 msedge.exe 88 PID 2956 wrote to memory of 3572 2956 msedge.exe 88 PID 2956 wrote to memory of 3572 2956 msedge.exe 88 PID 2956 wrote to memory of 3572 2956 msedge.exe 88 PID 2956 wrote to memory of 3572 2956 msedge.exe 88 PID 2956 wrote to memory of 3572 2956 msedge.exe 88 PID 2956 wrote to memory of 3572 2956 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\827ef2e3cc4410639a36b26d419dee67_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdf58f46f8,0x7ffdf58f4708,0x7ffdf58f47182⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,8850958024834975029,16971255554587389101,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,8850958024834975029,16971255554587389101,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,8850958024834975029,16971255554587389101,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2648 /prefetch:82⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8850958024834975029,16971255554587389101,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8850958024834975029,16971255554587389101,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,8850958024834975029,16971255554587389101,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 /prefetch:82⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,8850958024834975029,16971255554587389101,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8850958024834975029,16971255554587389101,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:12⤵PID:2472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8850958024834975029,16971255554587389101,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8850958024834975029,16971255554587389101,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3940 /prefetch:12⤵PID:2552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8850958024834975029,16971255554587389101,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,8850958024834975029,16971255554587389101,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1984 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4804
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2028
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
292B
MD58e8c4318f96ceed8b83e2bff3299d519
SHA124914f2fe1d5951175b01be861e1fdf941ea5c17
SHA25685d3ad140cb5b066d8fabc6ce233230ccfbfbf8fe2b10e01e095d393604bf0ae
SHA512b1d445ca228f226bdfbba90bf520632a616f78fdf7faeb863f30d41170ef1a2d0960a6460092c835ff35f6c63b870999e406ce1b76f905cabf2f038cd21c9a51
-
Filesize
5KB
MD5bc3ea1afac3ab31af6cf698542fee236
SHA1f328ac3ec3c5f7b466c68618467760917536d7d7
SHA256b3a20d5646c4c50f53a40bd21d3348897e42ddd3c35cd56d24ecb62b44e23f6e
SHA512761690caf6d2d883e1e21f8646a72042e1f3b1169a22beb44b39939b8bef210cee3f2d07ce51f1f5a3998cef66b0da77ee9b8fd74bef5a3308b0a2b2c6c6f60d
-
Filesize
6KB
MD58065d99de3f90843ba6b4366de6787ad
SHA1ffc63365aa1a47b552ab5096230e7591f68fd3a1
SHA2569a309fc099c5ff7ad86849d675047b930bd8c538a0e00e328119309b312d4129
SHA512fb10e97f3929a094e68c1a79be8b51ee83d97de1adc16000271f42ab5c2230897b25ce9c29a9d51e09226c35d4f737c8737793a843e0a4b677602b4c40df0672
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c723260e714ddacb2c71e1c68be5aac3
SHA1f2bab42862321fc9299e7d83c7c547a6bbd947c5
SHA2568be67b3bb2e9c43964900b50a83d1bed5aba17934eb9fd077aa0b099d3b2af30
SHA512bb75cf7ba467968599a68576cf61b9e02ffe104fa8135a0bca24cf6d448ceab64ec09f0d43d04bd120bc507f3984ae6ad0fffbff2d20f57b5cfd2f6eb2e77dc6