Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2024, 20:05
Static task
static1
Behavioral task
behavioral1
Sample
432778db0a49ff403c4d65dca836c0fa_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
432778db0a49ff403c4d65dca836c0fa_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
432778db0a49ff403c4d65dca836c0fa_JaffaCakes118.html
-
Size
35KB
-
MD5
432778db0a49ff403c4d65dca836c0fa
-
SHA1
144e43a392bdf6bf137064eb0ccefa279dd03631
-
SHA256
b3027134d3867487913dec267bfc067283364cc325ee99767b531e23d0f4ec72
-
SHA512
d959f0fc9cfa3c8bcf5d66d51b05055a9a0073e2d11ae55f31fa86f31f92186884418037798577dc4ee68c4705fad28bdf9f6d51bafa60acd1308d11ee591e5c
-
SSDEEP
768:ZjgduATgr+vgc20A5sbJan2+OJr8NNst8NyJ/vjR6OTPRGmgQoPv:ZjIuATgr+vgcDJandOJr0Nst8NyJ/vjQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1912 msedge.exe 1912 msedge.exe 5020 msedge.exe 5020 msedge.exe 2832 identity_helper.exe 2832 identity_helper.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5020 wrote to memory of 404 5020 msedge.exe 85 PID 5020 wrote to memory of 404 5020 msedge.exe 85 PID 5020 wrote to memory of 3500 5020 msedge.exe 86 PID 5020 wrote to memory of 3500 5020 msedge.exe 86 PID 5020 wrote to memory of 3500 5020 msedge.exe 86 PID 5020 wrote to memory of 3500 5020 msedge.exe 86 PID 5020 wrote to memory of 3500 5020 msedge.exe 86 PID 5020 wrote to memory of 3500 5020 msedge.exe 86 PID 5020 wrote to memory of 3500 5020 msedge.exe 86 PID 5020 wrote to memory of 3500 5020 msedge.exe 86 PID 5020 wrote to memory of 3500 5020 msedge.exe 86 PID 5020 wrote to memory of 3500 5020 msedge.exe 86 PID 5020 wrote to memory of 3500 5020 msedge.exe 86 PID 5020 wrote to memory of 3500 5020 msedge.exe 86 PID 5020 wrote to memory of 3500 5020 msedge.exe 86 PID 5020 wrote to memory of 3500 5020 msedge.exe 86 PID 5020 wrote to memory of 3500 5020 msedge.exe 86 PID 5020 wrote to memory of 3500 5020 msedge.exe 86 PID 5020 wrote to memory of 3500 5020 msedge.exe 86 PID 5020 wrote to memory of 3500 5020 msedge.exe 86 PID 5020 wrote to memory of 3500 5020 msedge.exe 86 PID 5020 wrote to memory of 3500 5020 msedge.exe 86 PID 5020 wrote to memory of 3500 5020 msedge.exe 86 PID 5020 wrote to memory of 3500 5020 msedge.exe 86 PID 5020 wrote to memory of 3500 5020 msedge.exe 86 PID 5020 wrote to memory of 3500 5020 msedge.exe 86 PID 5020 wrote to memory of 3500 5020 msedge.exe 86 PID 5020 wrote to memory of 3500 5020 msedge.exe 86 PID 5020 wrote to memory of 3500 5020 msedge.exe 86 PID 5020 wrote to memory of 3500 5020 msedge.exe 86 PID 5020 wrote to memory of 3500 5020 msedge.exe 86 PID 5020 wrote to memory of 3500 5020 msedge.exe 86 PID 5020 wrote to memory of 3500 5020 msedge.exe 86 PID 5020 wrote to memory of 3500 5020 msedge.exe 86 PID 5020 wrote to memory of 3500 5020 msedge.exe 86 PID 5020 wrote to memory of 3500 5020 msedge.exe 86 PID 5020 wrote to memory of 3500 5020 msedge.exe 86 PID 5020 wrote to memory of 3500 5020 msedge.exe 86 PID 5020 wrote to memory of 3500 5020 msedge.exe 86 PID 5020 wrote to memory of 3500 5020 msedge.exe 86 PID 5020 wrote to memory of 3500 5020 msedge.exe 86 PID 5020 wrote to memory of 3500 5020 msedge.exe 86 PID 5020 wrote to memory of 1912 5020 msedge.exe 87 PID 5020 wrote to memory of 1912 5020 msedge.exe 87 PID 5020 wrote to memory of 2612 5020 msedge.exe 88 PID 5020 wrote to memory of 2612 5020 msedge.exe 88 PID 5020 wrote to memory of 2612 5020 msedge.exe 88 PID 5020 wrote to memory of 2612 5020 msedge.exe 88 PID 5020 wrote to memory of 2612 5020 msedge.exe 88 PID 5020 wrote to memory of 2612 5020 msedge.exe 88 PID 5020 wrote to memory of 2612 5020 msedge.exe 88 PID 5020 wrote to memory of 2612 5020 msedge.exe 88 PID 5020 wrote to memory of 2612 5020 msedge.exe 88 PID 5020 wrote to memory of 2612 5020 msedge.exe 88 PID 5020 wrote to memory of 2612 5020 msedge.exe 88 PID 5020 wrote to memory of 2612 5020 msedge.exe 88 PID 5020 wrote to memory of 2612 5020 msedge.exe 88 PID 5020 wrote to memory of 2612 5020 msedge.exe 88 PID 5020 wrote to memory of 2612 5020 msedge.exe 88 PID 5020 wrote to memory of 2612 5020 msedge.exe 88 PID 5020 wrote to memory of 2612 5020 msedge.exe 88 PID 5020 wrote to memory of 2612 5020 msedge.exe 88 PID 5020 wrote to memory of 2612 5020 msedge.exe 88 PID 5020 wrote to memory of 2612 5020 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\432778db0a49ff403c4d65dca836c0fa_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9e45146f8,0x7ff9e4514708,0x7ff9e45147182⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,17253261072731286036,5253938405269162968,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,17253261072731286036,5253938405269162968,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,17253261072731286036,5253938405269162968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2944 /prefetch:82⤵PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17253261072731286036,5253938405269162968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17253261072731286036,5253938405269162968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,17253261072731286036,5253938405269162968,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,17253261072731286036,5253938405269162968,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17253261072731286036,5253938405269162968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17253261072731286036,5253938405269162968,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17253261072731286036,5253938405269162968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3528 /prefetch:12⤵PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17253261072731286036,5253938405269162968,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3476 /prefetch:12⤵PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,17253261072731286036,5253938405269162968,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2632 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3540
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:640
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5584971c8ba88c824fd51a05dddb45a98
SHA1b7c9489b4427652a9cdd754d1c1b6ac4034be421
SHA256e2d8de6c2323bbb3863ec50843d9b58a22e911fd626d31430658b9ea942cd307
SHA5125dbf1a4631a04d1149d8fab2b8e0e43ccd97b7212de43b961b9128a8bf03329164fdeb480154a8ffea5835f28417a7d2b115b8bf8d578d00b13c3682aa5ca726
-
Filesize
152B
MD5b28ef7d9f6d74f055cc49876767c886c
SHA1d6b3267f36c340979f8fc3e012fdd02c468740bf
SHA256fa6804456884789f4bdf9c3f5a4a8f29e0ededde149c4384072f3d8cc85bcc37
SHA512491f893c8f765e5d629bce8dd5067cef4e2ebc558d43bfb05e358bca43e1a66ee1285519bc266fd0ff5b5e09769a56077b62ac55fa8797c1edf6205843356e75
-
Filesize
187B
MD56bc881fa8b603558de556c16afa4adc1
SHA155a36aeaec8b5ef89b5ad05b816928e21cf5523a
SHA2563e6d4faec9e64cac42d817d0a25063227e058b81079ec5dad4232b63350aab90
SHA5125952514db8d59748f735d6467fda025d0a5ee065144486102eafb01d3f3024579810b9475307ae1396e49b381b8dc8dce6728ea833f1587987a5fc529220c093
-
Filesize
6KB
MD559925c09d34a7289d8b1441ab4774aa9
SHA1a76a2a8673cc17a8df8ca3a109598271f0873056
SHA2567d95f1ad6e320feb4d0a0f4fb5e35771f5193bf4baa49cca44ef75b294c9546b
SHA51299f77ae38440a42e0dc61251bfe5036a522e1344e0df7a098360c08b9f14b87645e4fb1e6363cc7ce26c1d41377707f02a4b013394368e6966a49b69f2e8f53c
-
Filesize
6KB
MD590ff9160a818425c92f8c54f86755892
SHA109ff019b7085a20d3ec5d89b9d0a183a4634bb77
SHA25652d33ecc11abb38a7e8f227e0d2d52f5f6da5ac4cb58d5327c34f40d58ba747b
SHA512dff2415c5fccb209ecea0dd154027eb9a34bb706e73625940437f4af00a9fc35912cdb6d7ebf1f91acc96a8d86f1f137023d84bb78c5be7d75d20e530c06426f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5763faa2f84973ca527719f47a5bf6fe2
SHA1166f7b2916356c1b1f5b943e483bebd8e706fe2f
SHA256ece6cdbc901d8ce110dbb64f7744bf9110e1c11c5b6db249389e3cc9bf63dcab
SHA51220bde15849bba21fe7904b2a247a704fe84d1671d1947e70b9e0d41b7d4464b22eea3db33283787a9364e9dae60eef1591569b311c62eae6658c79021ce4e332