Analysis
-
max time kernel
145s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04-07-2024 18:09
Static task
static1
Behavioral task
behavioral1
Sample
25bc824385e42b85be0cc2a51190fb6e_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
25bc824385e42b85be0cc2a51190fb6e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
25bc824385e42b85be0cc2a51190fb6e_JaffaCakes118.html
-
Size
51KB
-
MD5
25bc824385e42b85be0cc2a51190fb6e
-
SHA1
a06275e1f515b5998c960c8d8ec2c50d3ad6881a
-
SHA256
8605e35f87fe1042eb9bcdee55ab5dd91a57b1c6515824e849d91c24d62d1b2d
-
SHA512
c55d9be48981b55c401e698e2b1bbb46aaf9787bfdf1f03bae114f25f18c1236b1f93778ba480cbb682b21dd1129b89ab842a986d48ee3cb53aa88032f6525b0
-
SSDEEP
384:qr1C8ldpEt/e6vSjkx0SfoaluApuntcvd6v+SWkaS0ajf78cVHDMu0ncTw07x9CJ:qB3xAcq7hn+7wuVzMM6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5100 msedge.exe 5100 msedge.exe 1472 msedge.exe 1472 msedge.exe 4784 identity_helper.exe 4784 identity_helper.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1472 wrote to memory of 3232 1472 msedge.exe 80 PID 1472 wrote to memory of 3232 1472 msedge.exe 80 PID 1472 wrote to memory of 916 1472 msedge.exe 81 PID 1472 wrote to memory of 916 1472 msedge.exe 81 PID 1472 wrote to memory of 916 1472 msedge.exe 81 PID 1472 wrote to memory of 916 1472 msedge.exe 81 PID 1472 wrote to memory of 916 1472 msedge.exe 81 PID 1472 wrote to memory of 916 1472 msedge.exe 81 PID 1472 wrote to memory of 916 1472 msedge.exe 81 PID 1472 wrote to memory of 916 1472 msedge.exe 81 PID 1472 wrote to memory of 916 1472 msedge.exe 81 PID 1472 wrote to memory of 916 1472 msedge.exe 81 PID 1472 wrote to memory of 916 1472 msedge.exe 81 PID 1472 wrote to memory of 916 1472 msedge.exe 81 PID 1472 wrote to memory of 916 1472 msedge.exe 81 PID 1472 wrote to memory of 916 1472 msedge.exe 81 PID 1472 wrote to memory of 916 1472 msedge.exe 81 PID 1472 wrote to memory of 916 1472 msedge.exe 81 PID 1472 wrote to memory of 916 1472 msedge.exe 81 PID 1472 wrote to memory of 916 1472 msedge.exe 81 PID 1472 wrote to memory of 916 1472 msedge.exe 81 PID 1472 wrote to memory of 916 1472 msedge.exe 81 PID 1472 wrote to memory of 916 1472 msedge.exe 81 PID 1472 wrote to memory of 916 1472 msedge.exe 81 PID 1472 wrote to memory of 916 1472 msedge.exe 81 PID 1472 wrote to memory of 916 1472 msedge.exe 81 PID 1472 wrote to memory of 916 1472 msedge.exe 81 PID 1472 wrote to memory of 916 1472 msedge.exe 81 PID 1472 wrote to memory of 916 1472 msedge.exe 81 PID 1472 wrote to memory of 916 1472 msedge.exe 81 PID 1472 wrote to memory of 916 1472 msedge.exe 81 PID 1472 wrote to memory of 916 1472 msedge.exe 81 PID 1472 wrote to memory of 916 1472 msedge.exe 81 PID 1472 wrote to memory of 916 1472 msedge.exe 81 PID 1472 wrote to memory of 916 1472 msedge.exe 81 PID 1472 wrote to memory of 916 1472 msedge.exe 81 PID 1472 wrote to memory of 916 1472 msedge.exe 81 PID 1472 wrote to memory of 916 1472 msedge.exe 81 PID 1472 wrote to memory of 916 1472 msedge.exe 81 PID 1472 wrote to memory of 916 1472 msedge.exe 81 PID 1472 wrote to memory of 916 1472 msedge.exe 81 PID 1472 wrote to memory of 916 1472 msedge.exe 81 PID 1472 wrote to memory of 5100 1472 msedge.exe 82 PID 1472 wrote to memory of 5100 1472 msedge.exe 82 PID 1472 wrote to memory of 512 1472 msedge.exe 83 PID 1472 wrote to memory of 512 1472 msedge.exe 83 PID 1472 wrote to memory of 512 1472 msedge.exe 83 PID 1472 wrote to memory of 512 1472 msedge.exe 83 PID 1472 wrote to memory of 512 1472 msedge.exe 83 PID 1472 wrote to memory of 512 1472 msedge.exe 83 PID 1472 wrote to memory of 512 1472 msedge.exe 83 PID 1472 wrote to memory of 512 1472 msedge.exe 83 PID 1472 wrote to memory of 512 1472 msedge.exe 83 PID 1472 wrote to memory of 512 1472 msedge.exe 83 PID 1472 wrote to memory of 512 1472 msedge.exe 83 PID 1472 wrote to memory of 512 1472 msedge.exe 83 PID 1472 wrote to memory of 512 1472 msedge.exe 83 PID 1472 wrote to memory of 512 1472 msedge.exe 83 PID 1472 wrote to memory of 512 1472 msedge.exe 83 PID 1472 wrote to memory of 512 1472 msedge.exe 83 PID 1472 wrote to memory of 512 1472 msedge.exe 83 PID 1472 wrote to memory of 512 1472 msedge.exe 83 PID 1472 wrote to memory of 512 1472 msedge.exe 83 PID 1472 wrote to memory of 512 1472 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\25bc824385e42b85be0cc2a51190fb6e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff8c3c46f8,0x7fff8c3c4708,0x7fff8c3c47182⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,8152449445105618636,15565156318690180469,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,8152449445105618636,15565156318690180469,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,8152449445105618636,15565156318690180469,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:82⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,8152449445105618636,15565156318690180469,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,8152449445105618636,15565156318690180469,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,8152449445105618636,15565156318690180469,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4944 /prefetch:82⤵PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,8152449445105618636,15565156318690180469,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4944 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,8152449445105618636,15565156318690180469,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4936 /prefetch:12⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,8152449445105618636,15565156318690180469,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,8152449445105618636,15565156318690180469,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3956 /prefetch:12⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,8152449445105618636,15565156318690180469,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,8152449445105618636,15565156318690180469,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1908 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3784
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4720
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5af56d974134d503bfcbbacce3d30b070
SHA1dc32a0ed7d8438bbf02031d60b6740acbb1ed7ab
SHA256d174699d764793201517d5788140141f873c5cfb472562714d956d0ab6d5cca6
SHA512496a44dc1304d7c3d8742f3b584d911e6305abd9240fb72e2f43d52f454c833f0c79f52d4fc5597c846f18ba3c92d641624b3bedec3c01bad77687d2bd7ad8b9
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD56dca086e8e7645fd5a4f8c7d3529578d
SHA1340e204b67054e11a6f2cd2d97cc204416137c72
SHA256fd0caf4d579da00939e5ebbfb0474a177a92d25d4433f3391d3b704379da2c98
SHA51240554dd69a21836d705629ecd49442c269ab3949924434a250b1d6941ed51ebcea23f98f05fedbc48cd0f17e1394b11415562f78b5fb950497ceabba0b16053a
-
Filesize
6KB
MD50903f6529757581c5e6851c70d905d9b
SHA1a95220735d11687a98ceb947b33ba0b2fc93c662
SHA256c967a5241e478849c03d9b2ed9a8890f8d17af27436d940e99d78ebbf334fa36
SHA512b53964c52e167545c9d9f4be8349c56d313dda99577e5be552fa76a93d309a10d9273564e2f3d50800d0a69939d45aca0b4c34d46e7ab909c2fb502cdce40374
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389