Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
31-05-2024 06:21
Static task
static1
Behavioral task
behavioral1
Sample
8632e8403792d8f5d35ebba182e705f2_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8632e8403792d8f5d35ebba182e705f2_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8632e8403792d8f5d35ebba182e705f2_JaffaCakes118.html
-
Size
461KB
-
MD5
8632e8403792d8f5d35ebba182e705f2
-
SHA1
7f31afd62ff50262d3225a8e54d22d2438fc0d1c
-
SHA256
4630a1098099c27119f481b259be395507c56a0c01bcf4527274929a35f43d8d
-
SHA512
3a02f88756776c1aa481849a9460a0b0817f17c21afcc6414fb0dfde959f7c484996174ff65738c67749a0afe39801ffcef95877fa5370535b82e668d1c3fc82
-
SSDEEP
6144:SgsMYod+X3oI+YYsMYod+X3oI+YPsMYod+X3oI+YLsMYod+X3oI+YQ:j5d+X345d+X3F5d+X315d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4088 msedge.exe 4088 msedge.exe 512 msedge.exe 512 msedge.exe 2656 identity_helper.exe 2656 identity_helper.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 512 wrote to memory of 1648 512 msedge.exe 81 PID 512 wrote to memory of 1648 512 msedge.exe 81 PID 512 wrote to memory of 3876 512 msedge.exe 82 PID 512 wrote to memory of 3876 512 msedge.exe 82 PID 512 wrote to memory of 3876 512 msedge.exe 82 PID 512 wrote to memory of 3876 512 msedge.exe 82 PID 512 wrote to memory of 3876 512 msedge.exe 82 PID 512 wrote to memory of 3876 512 msedge.exe 82 PID 512 wrote to memory of 3876 512 msedge.exe 82 PID 512 wrote to memory of 3876 512 msedge.exe 82 PID 512 wrote to memory of 3876 512 msedge.exe 82 PID 512 wrote to memory of 3876 512 msedge.exe 82 PID 512 wrote to memory of 3876 512 msedge.exe 82 PID 512 wrote to memory of 3876 512 msedge.exe 82 PID 512 wrote to memory of 3876 512 msedge.exe 82 PID 512 wrote to memory of 3876 512 msedge.exe 82 PID 512 wrote to memory of 3876 512 msedge.exe 82 PID 512 wrote to memory of 3876 512 msedge.exe 82 PID 512 wrote to memory of 3876 512 msedge.exe 82 PID 512 wrote to memory of 3876 512 msedge.exe 82 PID 512 wrote to memory of 3876 512 msedge.exe 82 PID 512 wrote to memory of 3876 512 msedge.exe 82 PID 512 wrote to memory of 3876 512 msedge.exe 82 PID 512 wrote to memory of 3876 512 msedge.exe 82 PID 512 wrote to memory of 3876 512 msedge.exe 82 PID 512 wrote to memory of 3876 512 msedge.exe 82 PID 512 wrote to memory of 3876 512 msedge.exe 82 PID 512 wrote to memory of 3876 512 msedge.exe 82 PID 512 wrote to memory of 3876 512 msedge.exe 82 PID 512 wrote to memory of 3876 512 msedge.exe 82 PID 512 wrote to memory of 3876 512 msedge.exe 82 PID 512 wrote to memory of 3876 512 msedge.exe 82 PID 512 wrote to memory of 3876 512 msedge.exe 82 PID 512 wrote to memory of 3876 512 msedge.exe 82 PID 512 wrote to memory of 3876 512 msedge.exe 82 PID 512 wrote to memory of 3876 512 msedge.exe 82 PID 512 wrote to memory of 3876 512 msedge.exe 82 PID 512 wrote to memory of 3876 512 msedge.exe 82 PID 512 wrote to memory of 3876 512 msedge.exe 82 PID 512 wrote to memory of 3876 512 msedge.exe 82 PID 512 wrote to memory of 3876 512 msedge.exe 82 PID 512 wrote to memory of 3876 512 msedge.exe 82 PID 512 wrote to memory of 4088 512 msedge.exe 83 PID 512 wrote to memory of 4088 512 msedge.exe 83 PID 512 wrote to memory of 3124 512 msedge.exe 84 PID 512 wrote to memory of 3124 512 msedge.exe 84 PID 512 wrote to memory of 3124 512 msedge.exe 84 PID 512 wrote to memory of 3124 512 msedge.exe 84 PID 512 wrote to memory of 3124 512 msedge.exe 84 PID 512 wrote to memory of 3124 512 msedge.exe 84 PID 512 wrote to memory of 3124 512 msedge.exe 84 PID 512 wrote to memory of 3124 512 msedge.exe 84 PID 512 wrote to memory of 3124 512 msedge.exe 84 PID 512 wrote to memory of 3124 512 msedge.exe 84 PID 512 wrote to memory of 3124 512 msedge.exe 84 PID 512 wrote to memory of 3124 512 msedge.exe 84 PID 512 wrote to memory of 3124 512 msedge.exe 84 PID 512 wrote to memory of 3124 512 msedge.exe 84 PID 512 wrote to memory of 3124 512 msedge.exe 84 PID 512 wrote to memory of 3124 512 msedge.exe 84 PID 512 wrote to memory of 3124 512 msedge.exe 84 PID 512 wrote to memory of 3124 512 msedge.exe 84 PID 512 wrote to memory of 3124 512 msedge.exe 84 PID 512 wrote to memory of 3124 512 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8632e8403792d8f5d35ebba182e705f2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff80c8546f8,0x7ff80c854708,0x7ff80c8547182⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1940,16961973508467924464,11516813502445948917,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2044 /prefetch:22⤵PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1940,16961973508467924464,11516813502445948917,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1940,16961973508467924464,11516813502445948917,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,16961973508467924464,11516813502445948917,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,16961973508467924464,11516813502445948917,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1940,16961973508467924464,11516813502445948917,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 /prefetch:82⤵PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1940,16961973508467924464,11516813502445948917,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,16961973508467924464,11516813502445948917,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,16961973508467924464,11516813502445948917,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,16961973508467924464,11516813502445948917,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,16961973508467924464,11516813502445948917,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3476 /prefetch:12⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1940,16961973508467924464,11516813502445948917,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5060
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2712
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
5KB
MD5be35e1bfd3408785b236eeea88db986a
SHA13fc86f235aa2d74c8e9888c9825e9e30e1a82910
SHA2561ec62cce4d940a9ed75441bf932984a18217688f6a96d38bb3c820419ea7467c
SHA512a79855f781f15e31786c1f5e43e8b5a6bf35b3f325c113af6f86e29659d8ab7b9d337ccc617554e5b0df0f51d07e96909efb21005eae9cefad8c8f2640e0eb48
-
Filesize
6KB
MD55b3ae1becc3929e5095acf8814e1c322
SHA1a5a8e30cbbadfdbae21c3725dba3cc26c3f1b8c9
SHA256c04a419484f0bdaab0be28f4400da0d3cd9803347f1fecd56aeeb1262448b4af
SHA5123452c64fb0e45d4c69973af4a8552cf2701a2575ab13b766af1674fe73467a147d917e5a3cb3bdece8871e0011813047b8ec4b29fd0ef61e636d1d323f1dacfd
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD562ffac08e60eecee0efe84598002d76a
SHA15259ade3d82a81e54aacc88b63eb495cfc272e90
SHA256b9c95c0eea7fe9ce64728b10325b65198d9c8e86e6e6efea267248ec463da745
SHA5120ce5cbfbc96d04ccafd28435e8aece01ec3f092b20557ab6edc7f5ecab6d00d850591aad56a087e4e8eff5f0111725dffa6f86cbd6c88a2556fcf659230fed77