Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30/05/2024, 02:39
Static task
static1
Behavioral task
behavioral1
Sample
82ca42450083c018480a3dde8277e3d2_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
82ca42450083c018480a3dde8277e3d2_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
82ca42450083c018480a3dde8277e3d2_JaffaCakes118.html
-
Size
33KB
-
MD5
82ca42450083c018480a3dde8277e3d2
-
SHA1
6620a4c4b3351af860b57c858ded40b925106dc3
-
SHA256
15f1d0ad0f9b3094b6ba754a2c69c4c38460c524bc67502ed3a264bda3f29ee2
-
SHA512
ea07945f4cc32af2157b6cde20ac7a8dd8b26afc3896dae5ed21c988da452cc436104f76e8cdc0c08743b0062fa0ad38d9ba8af62bcb5cfe61c46cedffa152d7
-
SSDEEP
768:s1pFmCHCoCmNoVIYL2CelXL+XliP0a65qwI7eCOhk8wnqKyJGIY74kO9Na0/T8qe:3+7FNuap7+1rgqG6w8rLAR2XUda+L
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2352 msedge.exe 2352 msedge.exe 1652 msedge.exe 1652 msedge.exe 448 identity_helper.exe 448 identity_helper.exe 6012 msedge.exe 6012 msedge.exe 6012 msedge.exe 6012 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1652 wrote to memory of 5000 1652 msedge.exe 83 PID 1652 wrote to memory of 5000 1652 msedge.exe 83 PID 1652 wrote to memory of 1632 1652 msedge.exe 84 PID 1652 wrote to memory of 1632 1652 msedge.exe 84 PID 1652 wrote to memory of 1632 1652 msedge.exe 84 PID 1652 wrote to memory of 1632 1652 msedge.exe 84 PID 1652 wrote to memory of 1632 1652 msedge.exe 84 PID 1652 wrote to memory of 1632 1652 msedge.exe 84 PID 1652 wrote to memory of 1632 1652 msedge.exe 84 PID 1652 wrote to memory of 1632 1652 msedge.exe 84 PID 1652 wrote to memory of 1632 1652 msedge.exe 84 PID 1652 wrote to memory of 1632 1652 msedge.exe 84 PID 1652 wrote to memory of 1632 1652 msedge.exe 84 PID 1652 wrote to memory of 1632 1652 msedge.exe 84 PID 1652 wrote to memory of 1632 1652 msedge.exe 84 PID 1652 wrote to memory of 1632 1652 msedge.exe 84 PID 1652 wrote to memory of 1632 1652 msedge.exe 84 PID 1652 wrote to memory of 1632 1652 msedge.exe 84 PID 1652 wrote to memory of 1632 1652 msedge.exe 84 PID 1652 wrote to memory of 1632 1652 msedge.exe 84 PID 1652 wrote to memory of 1632 1652 msedge.exe 84 PID 1652 wrote to memory of 1632 1652 msedge.exe 84 PID 1652 wrote to memory of 1632 1652 msedge.exe 84 PID 1652 wrote to memory of 1632 1652 msedge.exe 84 PID 1652 wrote to memory of 1632 1652 msedge.exe 84 PID 1652 wrote to memory of 1632 1652 msedge.exe 84 PID 1652 wrote to memory of 1632 1652 msedge.exe 84 PID 1652 wrote to memory of 1632 1652 msedge.exe 84 PID 1652 wrote to memory of 1632 1652 msedge.exe 84 PID 1652 wrote to memory of 1632 1652 msedge.exe 84 PID 1652 wrote to memory of 1632 1652 msedge.exe 84 PID 1652 wrote to memory of 1632 1652 msedge.exe 84 PID 1652 wrote to memory of 1632 1652 msedge.exe 84 PID 1652 wrote to memory of 1632 1652 msedge.exe 84 PID 1652 wrote to memory of 1632 1652 msedge.exe 84 PID 1652 wrote to memory of 1632 1652 msedge.exe 84 PID 1652 wrote to memory of 1632 1652 msedge.exe 84 PID 1652 wrote to memory of 1632 1652 msedge.exe 84 PID 1652 wrote to memory of 1632 1652 msedge.exe 84 PID 1652 wrote to memory of 1632 1652 msedge.exe 84 PID 1652 wrote to memory of 1632 1652 msedge.exe 84 PID 1652 wrote to memory of 1632 1652 msedge.exe 84 PID 1652 wrote to memory of 2352 1652 msedge.exe 85 PID 1652 wrote to memory of 2352 1652 msedge.exe 85 PID 1652 wrote to memory of 4332 1652 msedge.exe 86 PID 1652 wrote to memory of 4332 1652 msedge.exe 86 PID 1652 wrote to memory of 4332 1652 msedge.exe 86 PID 1652 wrote to memory of 4332 1652 msedge.exe 86 PID 1652 wrote to memory of 4332 1652 msedge.exe 86 PID 1652 wrote to memory of 4332 1652 msedge.exe 86 PID 1652 wrote to memory of 4332 1652 msedge.exe 86 PID 1652 wrote to memory of 4332 1652 msedge.exe 86 PID 1652 wrote to memory of 4332 1652 msedge.exe 86 PID 1652 wrote to memory of 4332 1652 msedge.exe 86 PID 1652 wrote to memory of 4332 1652 msedge.exe 86 PID 1652 wrote to memory of 4332 1652 msedge.exe 86 PID 1652 wrote to memory of 4332 1652 msedge.exe 86 PID 1652 wrote to memory of 4332 1652 msedge.exe 86 PID 1652 wrote to memory of 4332 1652 msedge.exe 86 PID 1652 wrote to memory of 4332 1652 msedge.exe 86 PID 1652 wrote to memory of 4332 1652 msedge.exe 86 PID 1652 wrote to memory of 4332 1652 msedge.exe 86 PID 1652 wrote to memory of 4332 1652 msedge.exe 86 PID 1652 wrote to memory of 4332 1652 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\82ca42450083c018480a3dde8277e3d2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff825a646f8,0x7ff825a64708,0x7ff825a647182⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,9119224677995578141,6236358828903490633,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,9119224677995578141,6236358828903490633,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,9119224677995578141,6236358828903490633,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,9119224677995578141,6236358828903490633,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3116 /prefetch:12⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,9119224677995578141,6236358828903490633,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3156 /prefetch:12⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,9119224677995578141,6236358828903490633,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4648 /prefetch:12⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,9119224677995578141,6236358828903490633,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:82⤵PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,9119224677995578141,6236358828903490633,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,9119224677995578141,6236358828903490633,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,9119224677995578141,6236358828903490633,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,9119224677995578141,6236358828903490633,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4496 /prefetch:12⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,9119224677995578141,6236358828903490633,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4884 /prefetch:12⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,9119224677995578141,6236358828903490633,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4932 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6012
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3248
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
262B
MD58c5bd48250406a0ca7eb2b3c75adb820
SHA1ffeacf3a1eb1e0549219b6428ec4af8c5054e060
SHA256a13323db9208c5d8edff0eab641bc5b9ef44044a8b4773b7e026661388089e1b
SHA512b58eebc062b32b6c526160393b9f8758024d09a9b14c0583f2252effb82bff52b83b48efdd10ff814c04bb417e93eedf5bb27d14c224681084ec64b27ae40f00
-
Filesize
5KB
MD5b5ca666e5d7e3ce5f04d049295086be7
SHA1ca09fbfb5202a41c808e07c33574d546f6866c88
SHA25678eaf6f737c944dec3ac52f624904e0ba71c4714b0d748086a5cd2c1674480e8
SHA51221ce50969ebd08d1af24b2bdc4d465b4e7483b57f4198fdbea4b32ad208e85d00c365dbeb8dea0e05b38169f7ee323321da6dd7247ea612e8d95933f684f25ab
-
Filesize
6KB
MD5bf7d7d98c40321a90543caede31f248a
SHA1bd3d737050734c982e8372a5165376ae1e8aec3c
SHA256d7dd14bb16b3fe6d7d11a963fce13e6f239c13f9fab1b205b74a2f15f306ea21
SHA5124aa22401c45ff3a58ebbeff5da56e95a5c5686d9d27296020ddcec61091799cc14d1a9c5eb8ca2171353c1617c51f111f49f56926493a9e5585fce7b5f8c1bdb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57e98c438b42e7ae7461eb8a9b90335e1
SHA1f9439a25b4c8ba353ddbeb830a63e2324df88b10
SHA2566f03a4db8ae3d0cca64d078aee56e8cb862eb5d0012dba866c9cda1d190a9bb3
SHA5123f47900f14ce33e3d7942049c8a5f650e95d69472f4fdf99a8ea827aaec6f842f65e9743c1561eaf6857d44c74c6fae77afbc6e85ef24c18ac7202ca1a856bf3