Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
31-05-2024 16:14
Static task
static1
Behavioral task
behavioral1
Sample
87988080d22505649a3a68cf35de212c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
87988080d22505649a3a68cf35de212c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
87988080d22505649a3a68cf35de212c_JaffaCakes118.html
-
Size
22KB
-
MD5
87988080d22505649a3a68cf35de212c
-
SHA1
79a9d6d165ae3b6ea180672359b0d147734a091f
-
SHA256
e74f921c75396d114da8bcab13841b47e5cbe4fac62e16e130e45794e46d877d
-
SHA512
a4b94dbe2ef35a6c900a187042d4fec44584282987d3fea1b1c7ebe9352b5c16559dfa60a34084ec37d4f1a94a83e7c0b7052bde17949a2dd5e337d70404b2e6
-
SSDEEP
384:wn3uDr6mxZ+idW25E4cYB5udV8vlCqK+LW+qWRW4WTW6WcWlWMWVyrej0srlhC6u:w3feqkWUjE5zINOx59grjCQVQy7rPFIo
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4420 msedge.exe 4420 msedge.exe 1192 msedge.exe 1192 msedge.exe 1112 identity_helper.exe 1112 identity_helper.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1192 wrote to memory of 3788 1192 msedge.exe 83 PID 1192 wrote to memory of 3788 1192 msedge.exe 83 PID 1192 wrote to memory of 4320 1192 msedge.exe 84 PID 1192 wrote to memory of 4320 1192 msedge.exe 84 PID 1192 wrote to memory of 4320 1192 msedge.exe 84 PID 1192 wrote to memory of 4320 1192 msedge.exe 84 PID 1192 wrote to memory of 4320 1192 msedge.exe 84 PID 1192 wrote to memory of 4320 1192 msedge.exe 84 PID 1192 wrote to memory of 4320 1192 msedge.exe 84 PID 1192 wrote to memory of 4320 1192 msedge.exe 84 PID 1192 wrote to memory of 4320 1192 msedge.exe 84 PID 1192 wrote to memory of 4320 1192 msedge.exe 84 PID 1192 wrote to memory of 4320 1192 msedge.exe 84 PID 1192 wrote to memory of 4320 1192 msedge.exe 84 PID 1192 wrote to memory of 4320 1192 msedge.exe 84 PID 1192 wrote to memory of 4320 1192 msedge.exe 84 PID 1192 wrote to memory of 4320 1192 msedge.exe 84 PID 1192 wrote to memory of 4320 1192 msedge.exe 84 PID 1192 wrote to memory of 4320 1192 msedge.exe 84 PID 1192 wrote to memory of 4320 1192 msedge.exe 84 PID 1192 wrote to memory of 4320 1192 msedge.exe 84 PID 1192 wrote to memory of 4320 1192 msedge.exe 84 PID 1192 wrote to memory of 4320 1192 msedge.exe 84 PID 1192 wrote to memory of 4320 1192 msedge.exe 84 PID 1192 wrote to memory of 4320 1192 msedge.exe 84 PID 1192 wrote to memory of 4320 1192 msedge.exe 84 PID 1192 wrote to memory of 4320 1192 msedge.exe 84 PID 1192 wrote to memory of 4320 1192 msedge.exe 84 PID 1192 wrote to memory of 4320 1192 msedge.exe 84 PID 1192 wrote to memory of 4320 1192 msedge.exe 84 PID 1192 wrote to memory of 4320 1192 msedge.exe 84 PID 1192 wrote to memory of 4320 1192 msedge.exe 84 PID 1192 wrote to memory of 4320 1192 msedge.exe 84 PID 1192 wrote to memory of 4320 1192 msedge.exe 84 PID 1192 wrote to memory of 4320 1192 msedge.exe 84 PID 1192 wrote to memory of 4320 1192 msedge.exe 84 PID 1192 wrote to memory of 4320 1192 msedge.exe 84 PID 1192 wrote to memory of 4320 1192 msedge.exe 84 PID 1192 wrote to memory of 4320 1192 msedge.exe 84 PID 1192 wrote to memory of 4320 1192 msedge.exe 84 PID 1192 wrote to memory of 4320 1192 msedge.exe 84 PID 1192 wrote to memory of 4320 1192 msedge.exe 84 PID 1192 wrote to memory of 4420 1192 msedge.exe 85 PID 1192 wrote to memory of 4420 1192 msedge.exe 85 PID 1192 wrote to memory of 2532 1192 msedge.exe 86 PID 1192 wrote to memory of 2532 1192 msedge.exe 86 PID 1192 wrote to memory of 2532 1192 msedge.exe 86 PID 1192 wrote to memory of 2532 1192 msedge.exe 86 PID 1192 wrote to memory of 2532 1192 msedge.exe 86 PID 1192 wrote to memory of 2532 1192 msedge.exe 86 PID 1192 wrote to memory of 2532 1192 msedge.exe 86 PID 1192 wrote to memory of 2532 1192 msedge.exe 86 PID 1192 wrote to memory of 2532 1192 msedge.exe 86 PID 1192 wrote to memory of 2532 1192 msedge.exe 86 PID 1192 wrote to memory of 2532 1192 msedge.exe 86 PID 1192 wrote to memory of 2532 1192 msedge.exe 86 PID 1192 wrote to memory of 2532 1192 msedge.exe 86 PID 1192 wrote to memory of 2532 1192 msedge.exe 86 PID 1192 wrote to memory of 2532 1192 msedge.exe 86 PID 1192 wrote to memory of 2532 1192 msedge.exe 86 PID 1192 wrote to memory of 2532 1192 msedge.exe 86 PID 1192 wrote to memory of 2532 1192 msedge.exe 86 PID 1192 wrote to memory of 2532 1192 msedge.exe 86 PID 1192 wrote to memory of 2532 1192 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\87988080d22505649a3a68cf35de212c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff85efe46f8,0x7ff85efe4708,0x7ff85efe47182⤵PID:3788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,11178704280232578215,7749122358059699125,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,11178704280232578215,7749122358059699125,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,11178704280232578215,7749122358059699125,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:82⤵PID:2532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11178704280232578215,7749122358059699125,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11178704280232578215,7749122358059699125,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,11178704280232578215,7749122358059699125,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6056 /prefetch:82⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,11178704280232578215,7749122358059699125,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6056 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11178704280232578215,7749122358059699125,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4176 /prefetch:12⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11178704280232578215,7749122358059699125,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4164 /prefetch:12⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11178704280232578215,7749122358059699125,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:1268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11178704280232578215,7749122358059699125,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,11178704280232578215,7749122358059699125,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4848 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4104
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1688
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
5KB
MD5f17a219734023709b6ea329b358fe643
SHA1a046340f93351c96cbcdd93c9435c6c44df4d3c6
SHA2565d26db45a2960e51fc3d6010d45dab94f5a5cc09aad5e843f1d997b729b0e4e4
SHA5122fd343953102fb47afcf6a423d5270eba1ceb564e8729864f66f07b50dd7aae5ef103bb63abeffae0d2e7c8ea8df17a425974bf6f31e972f01799813337d4885
-
Filesize
6KB
MD54314d73d36ebeaaf09cc0267992dc6fa
SHA138662d009da97bdd25c7efe411581106dfd2c651
SHA2565e7a8e1cd7cb320107651fab2a21fa58e79d6f73706c36919f5040d260dfe805
SHA512d105c846f7ae61a049563141e43e0f5c35fe07d94acda67a782fae063f4c51d613d1e024acefb9963ebeaac5dbc88db63b380a55e92df68a6b407f4ebbf6ee9a
-
Filesize
6KB
MD59000c7e6efe3cbad7574e767d6e4998c
SHA10a48db08d72215bc8b9f6cadc734ae636710ff15
SHA256d81110aeebc833e81473c3d6781a82a9bb96151c59ef6603a0bfaf936a58d6af
SHA51222b1c72c6671620d52e3277967a057b0751ab873b2375b37cf2e9d92065eadf407fac5d9d825c986c99b715a1c82aa4427d7a7e957b50b8cd8e74c4a0467c63f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD55239d59576684e090d8c1a4ea614e73b
SHA1e99ce8109224dcc3ca1eccb443066ecfc5e61c92
SHA256addef37ba697b8abc1da5165e6e129cbdbef9f6dcd5682fb9e8326be8d003681
SHA51295fac3d84b32166089f59a42651dd3389e323ef29a4770c8a57b08438d1691773472aa68c2085727305590bd31c618656b672ec3ad1437adf800e008b3f6c938