Analysis
-
max time kernel
0s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
05/06/2024, 15:15
Static task
static1
Behavioral task
behavioral1
Sample
9879270eb3fb7c955343c3160a552d78_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9879270eb3fb7c955343c3160a552d78_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9879270eb3fb7c955343c3160a552d78_JaffaCakes118.html
-
Size
141KB
-
MD5
9879270eb3fb7c955343c3160a552d78
-
SHA1
86d849ac9052e4d35165324c5d6cf563d251c3d0
-
SHA256
6e134d44d548d6a949df5592bcd3021f4ffb9640349199cbe056e46c175c9286
-
SHA512
f64024362ed3d811969006f7a5ff8487ded05894b50c2bae68b88e7ce58a49362c99dfef41733abcf4a60f523a8d391da34d824d3628f3e7afa9ed7fad35519e
-
SSDEEP
3072:cuRPPHAb+sK94i0oP4qNbC1TWaPQJcBEQh/P7wzui41dwEe+pA1w+V2oCnkz4dA3:cuRPPHAbykTWaPQJcBEQh/P7wzuiYdwf
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 1764 wrote to memory of 1076 1764 msedge.exe 82 PID 1764 wrote to memory of 1076 1764 msedge.exe 82 PID 1764 wrote to memory of 4232 1764 msedge.exe 84 PID 1764 wrote to memory of 4232 1764 msedge.exe 84 PID 1764 wrote to memory of 4232 1764 msedge.exe 84 PID 1764 wrote to memory of 4232 1764 msedge.exe 84 PID 1764 wrote to memory of 4232 1764 msedge.exe 84 PID 1764 wrote to memory of 4232 1764 msedge.exe 84 PID 1764 wrote to memory of 4232 1764 msedge.exe 84 PID 1764 wrote to memory of 4232 1764 msedge.exe 84 PID 1764 wrote to memory of 4232 1764 msedge.exe 84 PID 1764 wrote to memory of 4232 1764 msedge.exe 84 PID 1764 wrote to memory of 4232 1764 msedge.exe 84 PID 1764 wrote to memory of 4232 1764 msedge.exe 84 PID 1764 wrote to memory of 4232 1764 msedge.exe 84 PID 1764 wrote to memory of 4232 1764 msedge.exe 84 PID 1764 wrote to memory of 4232 1764 msedge.exe 84 PID 1764 wrote to memory of 4232 1764 msedge.exe 84 PID 1764 wrote to memory of 4232 1764 msedge.exe 84 PID 1764 wrote to memory of 4232 1764 msedge.exe 84 PID 1764 wrote to memory of 4232 1764 msedge.exe 84 PID 1764 wrote to memory of 4232 1764 msedge.exe 84 PID 1764 wrote to memory of 4232 1764 msedge.exe 84 PID 1764 wrote to memory of 4232 1764 msedge.exe 84 PID 1764 wrote to memory of 4232 1764 msedge.exe 84 PID 1764 wrote to memory of 4232 1764 msedge.exe 84 PID 1764 wrote to memory of 4232 1764 msedge.exe 84 PID 1764 wrote to memory of 4232 1764 msedge.exe 84 PID 1764 wrote to memory of 4232 1764 msedge.exe 84 PID 1764 wrote to memory of 4232 1764 msedge.exe 84 PID 1764 wrote to memory of 4232 1764 msedge.exe 84 PID 1764 wrote to memory of 4232 1764 msedge.exe 84 PID 1764 wrote to memory of 4232 1764 msedge.exe 84 PID 1764 wrote to memory of 4232 1764 msedge.exe 84 PID 1764 wrote to memory of 4232 1764 msedge.exe 84 PID 1764 wrote to memory of 4232 1764 msedge.exe 84 PID 1764 wrote to memory of 4232 1764 msedge.exe 84 PID 1764 wrote to memory of 4232 1764 msedge.exe 84 PID 1764 wrote to memory of 4232 1764 msedge.exe 84 PID 1764 wrote to memory of 4232 1764 msedge.exe 84 PID 1764 wrote to memory of 4232 1764 msedge.exe 84 PID 1764 wrote to memory of 4232 1764 msedge.exe 84 PID 1764 wrote to memory of 1420 1764 msedge.exe 85 PID 1764 wrote to memory of 1420 1764 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9879270eb3fb7c955343c3160a552d78_JaffaCakes118.html1⤵
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed0d246f8,0x7ffed0d24708,0x7ffed0d247182⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,12983672552620735469,9660022875125014447,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,12983672552620735469,9660022875125014447,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2528 /prefetch:32⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,12983672552620735469,9660022875125014447,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,12983672552620735469,9660022875125014447,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,12983672552620735469,9660022875125014447,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,12983672552620735469,9660022875125014447,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6020 /prefetch:82⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,12983672552620735469,9660022875125014447,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6020 /prefetch:82⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,12983672552620735469,9660022875125014447,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,12983672552620735469,9660022875125014447,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,12983672552620735469,9660022875125014447,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4132 /prefetch:12⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,12983672552620735469,9660022875125014447,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3456 /prefetch:12⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,12983672552620735469,9660022875125014447,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4684 /prefetch:22⤵PID:368
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3576
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3660
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
6KB
MD51c98f2648a8df749ad24977d1d68d3b6
SHA143fc98f95af40b2aa8373b8ba2b9461fa6a4f7c5
SHA256b804b2b4e927deb5f1e7eb9528c6ec6921c6a84935c71ba30bd6f6e6ae9bdf6f
SHA512ae959ad2ab63053bd857aef1015d6c19d9f132e83cbdc8d313d15be0316a20e2f6104aab322bf9fb32071b5d95371e02950305371adf535508319d5d54042147
-
Filesize
5KB
MD5685ca306b69ec618cded4f892f761d23
SHA10272322ff37760e127c9830fb88fc28f07691d59
SHA256bb970f1a01484ffb5530f6f9094d7731a88cda6e0eb25c875154a49e60398472
SHA51278361e1610499c63f0f22df6f092192b181ecae5bb95b2f28ebfae0d4dad035b0c688ac0b624cf31e5c451bf2511db5ff32ba5f3320780ef476eb5a91fe3d080
-
Filesize
6KB
MD503a883aead49c0f24e26a297b54b1253
SHA1ca4d059b122dbaff5f3ca29b7fdc9e9792fbb60e
SHA256c63c76ee44e7e95ec56ad532b8deb39aba25c400edfcbed3526bd2410972e2b2
SHA5126230986e80b353c64c145f53a603d36ba9adecc447531d26dcceb78e56c60a39a46abb5d526641da7ca8044327e7c31734a4cb3954bcc34fb8a72d6aa2602e4d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD50265d9c83a1f446ad3e6686199069bb2
SHA1633fa38879fd2da5df4f5073264ac2d2280b90e1
SHA256552f56b2e22c25757b01a98e29f556151932260068173a1ecd16180a5c36791d
SHA512f235476a656e8e58f53551a1f560843c57bc5360088d636fe9dbad5b7c38d72025a6aeaddb15d32950e464f5a7650f5c05ec11a86c5a844578b7dd6b98df5d19