Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06-07-2024 10:25
Static task
static1
Behavioral task
behavioral1
Sample
28372ac2d93e0270856f6c42ea026f7c_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
28372ac2d93e0270856f6c42ea026f7c_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
28372ac2d93e0270856f6c42ea026f7c_JaffaCakes118.html
-
Size
20KB
-
MD5
28372ac2d93e0270856f6c42ea026f7c
-
SHA1
bd7a0f846ebe5ecdda552d30443996ba5795e256
-
SHA256
97112f6f343cb4bc6b61f9352c461b5ac89f1ca7d7b5107762a734c6c74223c9
-
SHA512
7aa6342cf8478c6bd1cd0429b2a888ad05692ee67a8a94494ff0754869a0e90f46b4abbcaed8b66183a291fc07d312738e62e8ffe138908e0a6d16ec0f31dbee
-
SSDEEP
192:EYak/aQH4RhB/MaqH1durqn5txZnOA5PXHNy5LllsgoHyXYeQFjXZeXPd/gwuanh:EGbM161durCXb5vYUbT9Xcd/gw06f41C
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1472 msedge.exe 1472 msedge.exe 3624 msedge.exe 3624 msedge.exe 3968 identity_helper.exe 3968 identity_helper.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3624 wrote to memory of 4948 3624 msedge.exe 82 PID 3624 wrote to memory of 4948 3624 msedge.exe 82 PID 3624 wrote to memory of 1480 3624 msedge.exe 83 PID 3624 wrote to memory of 1480 3624 msedge.exe 83 PID 3624 wrote to memory of 1480 3624 msedge.exe 83 PID 3624 wrote to memory of 1480 3624 msedge.exe 83 PID 3624 wrote to memory of 1480 3624 msedge.exe 83 PID 3624 wrote to memory of 1480 3624 msedge.exe 83 PID 3624 wrote to memory of 1480 3624 msedge.exe 83 PID 3624 wrote to memory of 1480 3624 msedge.exe 83 PID 3624 wrote to memory of 1480 3624 msedge.exe 83 PID 3624 wrote to memory of 1480 3624 msedge.exe 83 PID 3624 wrote to memory of 1480 3624 msedge.exe 83 PID 3624 wrote to memory of 1480 3624 msedge.exe 83 PID 3624 wrote to memory of 1480 3624 msedge.exe 83 PID 3624 wrote to memory of 1480 3624 msedge.exe 83 PID 3624 wrote to memory of 1480 3624 msedge.exe 83 PID 3624 wrote to memory of 1480 3624 msedge.exe 83 PID 3624 wrote to memory of 1480 3624 msedge.exe 83 PID 3624 wrote to memory of 1480 3624 msedge.exe 83 PID 3624 wrote to memory of 1480 3624 msedge.exe 83 PID 3624 wrote to memory of 1480 3624 msedge.exe 83 PID 3624 wrote to memory of 1480 3624 msedge.exe 83 PID 3624 wrote to memory of 1480 3624 msedge.exe 83 PID 3624 wrote to memory of 1480 3624 msedge.exe 83 PID 3624 wrote to memory of 1480 3624 msedge.exe 83 PID 3624 wrote to memory of 1480 3624 msedge.exe 83 PID 3624 wrote to memory of 1480 3624 msedge.exe 83 PID 3624 wrote to memory of 1480 3624 msedge.exe 83 PID 3624 wrote to memory of 1480 3624 msedge.exe 83 PID 3624 wrote to memory of 1480 3624 msedge.exe 83 PID 3624 wrote to memory of 1480 3624 msedge.exe 83 PID 3624 wrote to memory of 1480 3624 msedge.exe 83 PID 3624 wrote to memory of 1480 3624 msedge.exe 83 PID 3624 wrote to memory of 1480 3624 msedge.exe 83 PID 3624 wrote to memory of 1480 3624 msedge.exe 83 PID 3624 wrote to memory of 1480 3624 msedge.exe 83 PID 3624 wrote to memory of 1480 3624 msedge.exe 83 PID 3624 wrote to memory of 1480 3624 msedge.exe 83 PID 3624 wrote to memory of 1480 3624 msedge.exe 83 PID 3624 wrote to memory of 1480 3624 msedge.exe 83 PID 3624 wrote to memory of 1480 3624 msedge.exe 83 PID 3624 wrote to memory of 1472 3624 msedge.exe 84 PID 3624 wrote to memory of 1472 3624 msedge.exe 84 PID 3624 wrote to memory of 1160 3624 msedge.exe 85 PID 3624 wrote to memory of 1160 3624 msedge.exe 85 PID 3624 wrote to memory of 1160 3624 msedge.exe 85 PID 3624 wrote to memory of 1160 3624 msedge.exe 85 PID 3624 wrote to memory of 1160 3624 msedge.exe 85 PID 3624 wrote to memory of 1160 3624 msedge.exe 85 PID 3624 wrote to memory of 1160 3624 msedge.exe 85 PID 3624 wrote to memory of 1160 3624 msedge.exe 85 PID 3624 wrote to memory of 1160 3624 msedge.exe 85 PID 3624 wrote to memory of 1160 3624 msedge.exe 85 PID 3624 wrote to memory of 1160 3624 msedge.exe 85 PID 3624 wrote to memory of 1160 3624 msedge.exe 85 PID 3624 wrote to memory of 1160 3624 msedge.exe 85 PID 3624 wrote to memory of 1160 3624 msedge.exe 85 PID 3624 wrote to memory of 1160 3624 msedge.exe 85 PID 3624 wrote to memory of 1160 3624 msedge.exe 85 PID 3624 wrote to memory of 1160 3624 msedge.exe 85 PID 3624 wrote to memory of 1160 3624 msedge.exe 85 PID 3624 wrote to memory of 1160 3624 msedge.exe 85 PID 3624 wrote to memory of 1160 3624 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\28372ac2d93e0270856f6c42ea026f7c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd535a46f8,0x7ffd535a4708,0x7ffd535a47182⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,2941091609870113537,16492130791363456492,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2184,2941091609870113537,16492130791363456492,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2184,2941091609870113537,16492130791363456492,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,2941091609870113537,16492130791363456492,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,2941091609870113537,16492130791363456492,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,2941091609870113537,16492130791363456492,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,2941091609870113537,16492130791363456492,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,2941091609870113537,16492130791363456492,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5528 /prefetch:82⤵PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,2941091609870113537,16492130791363456492,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5528 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,2941091609870113537,16492130791363456492,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:12⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,2941091609870113537,16492130791363456492,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:3192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,2941091609870113537,16492130791363456492,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6132 /prefetch:12⤵PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,2941091609870113537,16492130791363456492,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5976 /prefetch:12⤵PID:2960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,2941091609870113537,16492130791363456492,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4856 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2992
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:224
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2296
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e1fe3a26bd35b84102bb4203f31e74c7
SHA145fdfa8433789b575eb64e116718e62e0e0cf4a0
SHA25626e0d51529de906dd285ba48288e25eaf5213c0f0bab9bc5f119ecbc5e1b93ee
SHA512d528db2e9b917d4fbe24b1b5c6f4cb274f4f91c84f63e5119e041fa89ae0cd01a370e314f8b6aca9d6fa958e79feabc720f4b54b3d8aed69aab11fa84cad36bd
-
Filesize
152B
MD52915233ace3b11bc8898c958f245aa9a
SHA168c6aa983da303b825d656ac3284081db682f702
SHA256b2cb442f2ca27619c8df087f56fcbbb53186c53f8fd131af886ee3712220477e
SHA512e3f1b70d39b615e212f84d587ee816598236ee6ce144d919593894fcce4a0900343a9e8b837a0d1bd10921fff1c976c84c4a570eda776fe84d374a69e7a54890
-
Filesize
928B
MD54d7fdefdb246960a78e34947eea457ad
SHA1d3f0aa362590a06f380ae6ca1ae256ac9e423c79
SHA256c03f43443db05f70a472d356030430a8178a6cb8935fe81a67f5997d60847198
SHA512d1dc18825de9fc19bdf1036390fac4f9dee8917d1ac0084e04f83254aff7a1416811aa4a912eefe2a1d6ce7ca39db65d2bb8f1dc1b0b40382458b49a9abde455
-
Filesize
6KB
MD5c0980f97837a837f34abf67ba5c5220c
SHA15659221c0539830022c14a6497d60669843b9e68
SHA256510be7c442666546b47991bdb6211e761dd2cac1bb0c194b2becf043c4f72ca9
SHA512b3772b699cb3c39bfddb85dae9c246edefbb3db22a480d4e05b00d6d2110ca9554c0421a047bdea5eaeaf053d0d71f09f731f11f2884d23506b9f2dbab464992
-
Filesize
6KB
MD5acdfc55a45c26b236c6a11abf6fd788b
SHA1566396bbe838a4647223ec814da7031f0dce8005
SHA256d5470c0c229c28a63324e69c3f1c6391a05d29c4d4e364567e443f72794ad4b0
SHA5123db71393fe64ec88a4cd6d0bbe10e9c05991db65cf4ba24d0fadff318497e01648e64a3cadcf1e0cb7e316af20a02ad4443724ec069a955b0924c328e20b6e1b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50a235ab6028fc393354960b4f2b7f736
SHA118ede110cf3514cee4f8f48657b45e07e5658c55
SHA25654ae99ef3502aa9feb98025332680588af5a4243cbf672b35240cf12c6fa07cb
SHA512305074913abd7561502e52a0f70aa225bd6fbc0ceeefd36743418e55ca1a3cb205495372d462a9e57d150490609a1f38763a86e3301552a58829c520e7e9023c