Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2024, 19:20
Static task
static1
Behavioral task
behavioral1
Sample
25f600d455d261be7bbe2d3640bb3244_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
25f600d455d261be7bbe2d3640bb3244_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
25f600d455d261be7bbe2d3640bb3244_JaffaCakes118.html
-
Size
21KB
-
MD5
25f600d455d261be7bbe2d3640bb3244
-
SHA1
3fc88bccb34464e83327845fe64c389e55ca8228
-
SHA256
70fb5e0b02ad5dfe0f46a04aeea57ad28f1e94ab8c14361c975b991749022795
-
SHA512
111a77d28a1d5f268255b71a764034be98ca252ff6c965cf69da44f79cccb13ac09872d9fb15173ddf92f4fe7bf97bce3eb683db32f2b47f4dcf11d6870a58e7
-
SSDEEP
384:1zEQ140Jj57cm9ZzWK/IkTujnoBWTM9x7PMumSI:1zEf4vWKgou/T+c
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4124 msedge.exe 4124 msedge.exe 4884 msedge.exe 4884 msedge.exe 2580 identity_helper.exe 2580 identity_helper.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4884 wrote to memory of 3924 4884 msedge.exe 80 PID 4884 wrote to memory of 3924 4884 msedge.exe 80 PID 4884 wrote to memory of 1292 4884 msedge.exe 81 PID 4884 wrote to memory of 1292 4884 msedge.exe 81 PID 4884 wrote to memory of 1292 4884 msedge.exe 81 PID 4884 wrote to memory of 1292 4884 msedge.exe 81 PID 4884 wrote to memory of 1292 4884 msedge.exe 81 PID 4884 wrote to memory of 1292 4884 msedge.exe 81 PID 4884 wrote to memory of 1292 4884 msedge.exe 81 PID 4884 wrote to memory of 1292 4884 msedge.exe 81 PID 4884 wrote to memory of 1292 4884 msedge.exe 81 PID 4884 wrote to memory of 1292 4884 msedge.exe 81 PID 4884 wrote to memory of 1292 4884 msedge.exe 81 PID 4884 wrote to memory of 1292 4884 msedge.exe 81 PID 4884 wrote to memory of 1292 4884 msedge.exe 81 PID 4884 wrote to memory of 1292 4884 msedge.exe 81 PID 4884 wrote to memory of 1292 4884 msedge.exe 81 PID 4884 wrote to memory of 1292 4884 msedge.exe 81 PID 4884 wrote to memory of 1292 4884 msedge.exe 81 PID 4884 wrote to memory of 1292 4884 msedge.exe 81 PID 4884 wrote to memory of 1292 4884 msedge.exe 81 PID 4884 wrote to memory of 1292 4884 msedge.exe 81 PID 4884 wrote to memory of 1292 4884 msedge.exe 81 PID 4884 wrote to memory of 1292 4884 msedge.exe 81 PID 4884 wrote to memory of 1292 4884 msedge.exe 81 PID 4884 wrote to memory of 1292 4884 msedge.exe 81 PID 4884 wrote to memory of 1292 4884 msedge.exe 81 PID 4884 wrote to memory of 1292 4884 msedge.exe 81 PID 4884 wrote to memory of 1292 4884 msedge.exe 81 PID 4884 wrote to memory of 1292 4884 msedge.exe 81 PID 4884 wrote to memory of 1292 4884 msedge.exe 81 PID 4884 wrote to memory of 1292 4884 msedge.exe 81 PID 4884 wrote to memory of 1292 4884 msedge.exe 81 PID 4884 wrote to memory of 1292 4884 msedge.exe 81 PID 4884 wrote to memory of 1292 4884 msedge.exe 81 PID 4884 wrote to memory of 1292 4884 msedge.exe 81 PID 4884 wrote to memory of 1292 4884 msedge.exe 81 PID 4884 wrote to memory of 1292 4884 msedge.exe 81 PID 4884 wrote to memory of 1292 4884 msedge.exe 81 PID 4884 wrote to memory of 1292 4884 msedge.exe 81 PID 4884 wrote to memory of 1292 4884 msedge.exe 81 PID 4884 wrote to memory of 1292 4884 msedge.exe 81 PID 4884 wrote to memory of 4124 4884 msedge.exe 82 PID 4884 wrote to memory of 4124 4884 msedge.exe 82 PID 4884 wrote to memory of 4500 4884 msedge.exe 83 PID 4884 wrote to memory of 4500 4884 msedge.exe 83 PID 4884 wrote to memory of 4500 4884 msedge.exe 83 PID 4884 wrote to memory of 4500 4884 msedge.exe 83 PID 4884 wrote to memory of 4500 4884 msedge.exe 83 PID 4884 wrote to memory of 4500 4884 msedge.exe 83 PID 4884 wrote to memory of 4500 4884 msedge.exe 83 PID 4884 wrote to memory of 4500 4884 msedge.exe 83 PID 4884 wrote to memory of 4500 4884 msedge.exe 83 PID 4884 wrote to memory of 4500 4884 msedge.exe 83 PID 4884 wrote to memory of 4500 4884 msedge.exe 83 PID 4884 wrote to memory of 4500 4884 msedge.exe 83 PID 4884 wrote to memory of 4500 4884 msedge.exe 83 PID 4884 wrote to memory of 4500 4884 msedge.exe 83 PID 4884 wrote to memory of 4500 4884 msedge.exe 83 PID 4884 wrote to memory of 4500 4884 msedge.exe 83 PID 4884 wrote to memory of 4500 4884 msedge.exe 83 PID 4884 wrote to memory of 4500 4884 msedge.exe 83 PID 4884 wrote to memory of 4500 4884 msedge.exe 83 PID 4884 wrote to memory of 4500 4884 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\25f600d455d261be7bbe2d3640bb3244_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc6f0146f8,0x7ffc6f014708,0x7ffc6f0147182⤵PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,16802118186299730579,8373543802204254571,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵PID:1292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2180,16802118186299730579,8373543802204254571,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2180,16802118186299730579,8373543802204254571,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16802118186299730579,8373543802204254571,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16802118186299730579,8373543802204254571,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,16802118186299730579,8373543802204254571,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4992 /prefetch:82⤵PID:2812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,16802118186299730579,8373543802204254571,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4992 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16802118186299730579,8373543802204254571,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:12⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16802118186299730579,8373543802204254571,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4636 /prefetch:12⤵PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16802118186299730579,8373543802204254571,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3608 /prefetch:12⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16802118186299730579,8373543802204254571,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:3732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,16802118186299730579,8373543802204254571,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2016 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2768
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:408
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
5KB
MD5a928cd31a1c212f31976efaa478dd144
SHA15e71744456248fc2c094c9097a95b4a05e0e0764
SHA256b89b007e317238ae00513c2cf5c49537b870057765a7cd21c12165cb2d409959
SHA512f6cc7a0372dce2f16b32c75399bc543a66ca9288f5db0dc652668321502d66c2baa560846c46dda8da6d30d06a719b913a24ff652ee532456f00eb634700b7d6
-
Filesize
6KB
MD5774c405e0289252d4a5e37b01e8fded0
SHA156075faf66eebf44ba396b9e3ffad7e018e29406
SHA25699db044fe3200855943d0b05f81b9303b53f240d79b5cf5921077144177622ae
SHA5129c7bd151f296e39d694f3382bb9ef9e6e5d9a4e85b068525dcde3ed0fb6a1853c4be4a8004a0c30c20149985a9c5cc62417d894f077d40e1ecc3447fa02bf6a7
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
8KB
MD521b5de7a3c009458a81e5875530eff99
SHA1485204b8a864f79d6b53db57510f79fa4c42abfc
SHA256735b3cc297778976c8015c30fe19e581ca637e4d986ebdb3a42da773148311de
SHA512a8328f9fbee59666f208b18516634953dfc8c9b8d1638dc03292e7d5bb3ad39be07efb0f005c37dc6ca90117d2cf25eb66fa705ef48797b6fe12ba5b9a9efcb5