Analysis
-
max time kernel
143s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
31/05/2024, 15:51
Static task
static1
Behavioral task
behavioral1
Sample
878a55e746768b646894d0fafbd1f4a1_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
878a55e746768b646894d0fafbd1f4a1_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
878a55e746768b646894d0fafbd1f4a1_JaffaCakes118.html
-
Size
30KB
-
MD5
878a55e746768b646894d0fafbd1f4a1
-
SHA1
4f904d697475e163b7d45481316140f2aee4a007
-
SHA256
58678c3d3464b86c8ddf278593c1b65d35b4794aa8f90fe33342edc78f777fd7
-
SHA512
747e612ab8bbb8054e6d500e700d3cf0dd612b10d11b0910e247d7c2d386a0ff27e5d38131947fa8112f22063c78efbeb44f201754b10cf76c758056e15afe7f
-
SSDEEP
192:uWrHb5nf057nQjxn5Q/jnQieqNncnQOkEntJFnQTbnhnQ+XCxAp9E5kcwqHAHhnR:vQ/3MfYhn93
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1720 msedge.exe 1720 msedge.exe 3372 msedge.exe 3372 msedge.exe 4780 identity_helper.exe 4780 identity_helper.exe 776 msedge.exe 776 msedge.exe 776 msedge.exe 776 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3372 wrote to memory of 228 3372 msedge.exe 83 PID 3372 wrote to memory of 228 3372 msedge.exe 83 PID 3372 wrote to memory of 3092 3372 msedge.exe 84 PID 3372 wrote to memory of 3092 3372 msedge.exe 84 PID 3372 wrote to memory of 3092 3372 msedge.exe 84 PID 3372 wrote to memory of 3092 3372 msedge.exe 84 PID 3372 wrote to memory of 3092 3372 msedge.exe 84 PID 3372 wrote to memory of 3092 3372 msedge.exe 84 PID 3372 wrote to memory of 3092 3372 msedge.exe 84 PID 3372 wrote to memory of 3092 3372 msedge.exe 84 PID 3372 wrote to memory of 3092 3372 msedge.exe 84 PID 3372 wrote to memory of 3092 3372 msedge.exe 84 PID 3372 wrote to memory of 3092 3372 msedge.exe 84 PID 3372 wrote to memory of 3092 3372 msedge.exe 84 PID 3372 wrote to memory of 3092 3372 msedge.exe 84 PID 3372 wrote to memory of 3092 3372 msedge.exe 84 PID 3372 wrote to memory of 3092 3372 msedge.exe 84 PID 3372 wrote to memory of 3092 3372 msedge.exe 84 PID 3372 wrote to memory of 3092 3372 msedge.exe 84 PID 3372 wrote to memory of 3092 3372 msedge.exe 84 PID 3372 wrote to memory of 3092 3372 msedge.exe 84 PID 3372 wrote to memory of 3092 3372 msedge.exe 84 PID 3372 wrote to memory of 3092 3372 msedge.exe 84 PID 3372 wrote to memory of 3092 3372 msedge.exe 84 PID 3372 wrote to memory of 3092 3372 msedge.exe 84 PID 3372 wrote to memory of 3092 3372 msedge.exe 84 PID 3372 wrote to memory of 3092 3372 msedge.exe 84 PID 3372 wrote to memory of 3092 3372 msedge.exe 84 PID 3372 wrote to memory of 3092 3372 msedge.exe 84 PID 3372 wrote to memory of 3092 3372 msedge.exe 84 PID 3372 wrote to memory of 3092 3372 msedge.exe 84 PID 3372 wrote to memory of 3092 3372 msedge.exe 84 PID 3372 wrote to memory of 3092 3372 msedge.exe 84 PID 3372 wrote to memory of 3092 3372 msedge.exe 84 PID 3372 wrote to memory of 3092 3372 msedge.exe 84 PID 3372 wrote to memory of 3092 3372 msedge.exe 84 PID 3372 wrote to memory of 3092 3372 msedge.exe 84 PID 3372 wrote to memory of 3092 3372 msedge.exe 84 PID 3372 wrote to memory of 3092 3372 msedge.exe 84 PID 3372 wrote to memory of 3092 3372 msedge.exe 84 PID 3372 wrote to memory of 3092 3372 msedge.exe 84 PID 3372 wrote to memory of 3092 3372 msedge.exe 84 PID 3372 wrote to memory of 1720 3372 msedge.exe 85 PID 3372 wrote to memory of 1720 3372 msedge.exe 85 PID 3372 wrote to memory of 4860 3372 msedge.exe 86 PID 3372 wrote to memory of 4860 3372 msedge.exe 86 PID 3372 wrote to memory of 4860 3372 msedge.exe 86 PID 3372 wrote to memory of 4860 3372 msedge.exe 86 PID 3372 wrote to memory of 4860 3372 msedge.exe 86 PID 3372 wrote to memory of 4860 3372 msedge.exe 86 PID 3372 wrote to memory of 4860 3372 msedge.exe 86 PID 3372 wrote to memory of 4860 3372 msedge.exe 86 PID 3372 wrote to memory of 4860 3372 msedge.exe 86 PID 3372 wrote to memory of 4860 3372 msedge.exe 86 PID 3372 wrote to memory of 4860 3372 msedge.exe 86 PID 3372 wrote to memory of 4860 3372 msedge.exe 86 PID 3372 wrote to memory of 4860 3372 msedge.exe 86 PID 3372 wrote to memory of 4860 3372 msedge.exe 86 PID 3372 wrote to memory of 4860 3372 msedge.exe 86 PID 3372 wrote to memory of 4860 3372 msedge.exe 86 PID 3372 wrote to memory of 4860 3372 msedge.exe 86 PID 3372 wrote to memory of 4860 3372 msedge.exe 86 PID 3372 wrote to memory of 4860 3372 msedge.exe 86 PID 3372 wrote to memory of 4860 3372 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\878a55e746768b646894d0fafbd1f4a1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed41746f8,0x7ffed4174708,0x7ffed41747182⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,4331867110881937466,15786285979511769485,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,4331867110881937466,15786285979511769485,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,4331867110881937466,15786285979511769485,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,4331867110881937466,15786285979511769485,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,4331867110881937466,15786285979511769485,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,4331867110881937466,15786285979511769485,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:82⤵PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,4331867110881937466,15786285979511769485,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,4331867110881937466,15786285979511769485,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:12⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,4331867110881937466,15786285979511769485,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,4331867110881937466,15786285979511769485,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,4331867110881937466,15786285979511769485,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,4331867110881937466,15786285979511769485,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3460 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:776
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4536
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD5bd48d2f35487502eace0f5eb104b1310
SHA1f567ce901c26c63596f455694e566b2bf8b398dc
SHA256e4b35c8636ce0756112e356450cb5af171bb5e071589e9931b7ded51a096fe51
SHA512c12a8ffe3181c05a71cca1d5020adae95e4d6144f014bc9c47565ca6f13453f1c9d9a63ca3f82ac72d6fd1efa785cc288f8845684ddb71fb353ef4c08ab8dd27
-
Filesize
6KB
MD574034cf29d4ebd5e2e6193a7e5553bc5
SHA195ebe29a7ea264fcfa97896aad57965c7c8dc757
SHA25642b586a5d26c0bc733e2fc2ebf922e58c716f88f82ffdd178877dca939997cf8
SHA5127a0739435a37bb0f58a74b330625d75c63d096ff24d14e850ef313d284982c324f87dab55125343a32bcdc69a598860ba7254260dfaac325f7acf378ac9b0532
-
Filesize
6KB
MD5b4593de076e5a6d7d9cb7270f406be6c
SHA1a070af3c5c2c5a1fbed0cce174fde64b5ea8bb90
SHA2566318e6a66bd481e38b6b56b574a39de8c2a10508b4df582cd0a2217e84354913
SHA512cf68bc19865075c804a49097750f946b0f920b6708cdd3ff98f1b47fa367984f7e57bc62649c00c6c6df57f9dda916c83f1ed8dd4e0d647a59922ad40fda0ae6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD572ac3ebdd2109fb879661b0d184c31a4
SHA1ca4c71c88a2d5bca776ec1b1cdbc9700acad54de
SHA25633e5737721f7e4884ea3d39404a72ace6b8daa58edc4cf30d3deee502adb2825
SHA5124e4f66f178258716da7de56da132f99d83f5107502ef34e542cfa7e6e0112fa1704546ab203bebe801cf220d8e374210375631e86eda4c370b7474cd633c0673