Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 09:05
Static task
static1
Behavioral task
behavioral1
Sample
12b33f321fd84690fd79dfdc7984d501_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
12b33f321fd84690fd79dfdc7984d501_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
12b33f321fd84690fd79dfdc7984d501_JaffaCakes118.html
-
Size
23KB
-
MD5
12b33f321fd84690fd79dfdc7984d501
-
SHA1
2daed315aadd3f09f4dea7f3047051873687e796
-
SHA256
a5c23f1908ceb974e9019fe5394939094ce02303d79857f1a8b577995cc845ac
-
SHA512
4d4f52583e79f9c312af866ecd025d52dd3d35fe085de980320306ad915a0836cf52aae380116905e274f992b0b50211a4b193c5aac5f8f6bb30d9df97847f92
-
SSDEEP
384:Sg44MzYiyoimWTnjCE+pQojiWpVdSTZwedCQrjaIpBRfvkpnw9vQ:SScbtimWTnjCE+pQoS1BrjaIpPww9I
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 3484 msedge.exe 3484 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4840 identity_helper.exe 4840 identity_helper.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4428 wrote to memory of 4652 4428 msedge.exe 82 PID 4428 wrote to memory of 4652 4428 msedge.exe 82 PID 4428 wrote to memory of 1960 4428 msedge.exe 83 PID 4428 wrote to memory of 1960 4428 msedge.exe 83 PID 4428 wrote to memory of 1960 4428 msedge.exe 83 PID 4428 wrote to memory of 1960 4428 msedge.exe 83 PID 4428 wrote to memory of 1960 4428 msedge.exe 83 PID 4428 wrote to memory of 1960 4428 msedge.exe 83 PID 4428 wrote to memory of 1960 4428 msedge.exe 83 PID 4428 wrote to memory of 1960 4428 msedge.exe 83 PID 4428 wrote to memory of 1960 4428 msedge.exe 83 PID 4428 wrote to memory of 1960 4428 msedge.exe 83 PID 4428 wrote to memory of 1960 4428 msedge.exe 83 PID 4428 wrote to memory of 1960 4428 msedge.exe 83 PID 4428 wrote to memory of 1960 4428 msedge.exe 83 PID 4428 wrote to memory of 1960 4428 msedge.exe 83 PID 4428 wrote to memory of 1960 4428 msedge.exe 83 PID 4428 wrote to memory of 1960 4428 msedge.exe 83 PID 4428 wrote to memory of 1960 4428 msedge.exe 83 PID 4428 wrote to memory of 1960 4428 msedge.exe 83 PID 4428 wrote to memory of 1960 4428 msedge.exe 83 PID 4428 wrote to memory of 1960 4428 msedge.exe 83 PID 4428 wrote to memory of 1960 4428 msedge.exe 83 PID 4428 wrote to memory of 1960 4428 msedge.exe 83 PID 4428 wrote to memory of 1960 4428 msedge.exe 83 PID 4428 wrote to memory of 1960 4428 msedge.exe 83 PID 4428 wrote to memory of 1960 4428 msedge.exe 83 PID 4428 wrote to memory of 1960 4428 msedge.exe 83 PID 4428 wrote to memory of 1960 4428 msedge.exe 83 PID 4428 wrote to memory of 1960 4428 msedge.exe 83 PID 4428 wrote to memory of 1960 4428 msedge.exe 83 PID 4428 wrote to memory of 1960 4428 msedge.exe 83 PID 4428 wrote to memory of 1960 4428 msedge.exe 83 PID 4428 wrote to memory of 1960 4428 msedge.exe 83 PID 4428 wrote to memory of 1960 4428 msedge.exe 83 PID 4428 wrote to memory of 1960 4428 msedge.exe 83 PID 4428 wrote to memory of 1960 4428 msedge.exe 83 PID 4428 wrote to memory of 1960 4428 msedge.exe 83 PID 4428 wrote to memory of 1960 4428 msedge.exe 83 PID 4428 wrote to memory of 1960 4428 msedge.exe 83 PID 4428 wrote to memory of 1960 4428 msedge.exe 83 PID 4428 wrote to memory of 1960 4428 msedge.exe 83 PID 4428 wrote to memory of 3484 4428 msedge.exe 84 PID 4428 wrote to memory of 3484 4428 msedge.exe 84 PID 4428 wrote to memory of 3600 4428 msedge.exe 85 PID 4428 wrote to memory of 3600 4428 msedge.exe 85 PID 4428 wrote to memory of 3600 4428 msedge.exe 85 PID 4428 wrote to memory of 3600 4428 msedge.exe 85 PID 4428 wrote to memory of 3600 4428 msedge.exe 85 PID 4428 wrote to memory of 3600 4428 msedge.exe 85 PID 4428 wrote to memory of 3600 4428 msedge.exe 85 PID 4428 wrote to memory of 3600 4428 msedge.exe 85 PID 4428 wrote to memory of 3600 4428 msedge.exe 85 PID 4428 wrote to memory of 3600 4428 msedge.exe 85 PID 4428 wrote to memory of 3600 4428 msedge.exe 85 PID 4428 wrote to memory of 3600 4428 msedge.exe 85 PID 4428 wrote to memory of 3600 4428 msedge.exe 85 PID 4428 wrote to memory of 3600 4428 msedge.exe 85 PID 4428 wrote to memory of 3600 4428 msedge.exe 85 PID 4428 wrote to memory of 3600 4428 msedge.exe 85 PID 4428 wrote to memory of 3600 4428 msedge.exe 85 PID 4428 wrote to memory of 3600 4428 msedge.exe 85 PID 4428 wrote to memory of 3600 4428 msedge.exe 85 PID 4428 wrote to memory of 3600 4428 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\12b33f321fd84690fd79dfdc7984d501_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd70fd46f8,0x7ffd70fd4708,0x7ffd70fd47182⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,5998659749456578361,1195919016730895634,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,5998659749456578361,1195919016730895634,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,5998659749456578361,1195919016730895634,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,5998659749456578361,1195919016730895634,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,5998659749456578361,1195919016730895634,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,5998659749456578361,1195919016730895634,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:82⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,5998659749456578361,1195919016730895634,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,5998659749456578361,1195919016730895634,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,5998659749456578361,1195919016730895634,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,5998659749456578361,1195919016730895634,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2276 /prefetch:12⤵PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,5998659749456578361,1195919016730895634,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,5998659749456578361,1195919016730895634,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4780 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1352
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1952
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3556
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
190B
MD5f6f048acd0374a4b0bf29c7b1b0fcaf2
SHA19cc5263298ccdb5ad3e560ca1b9e3c63b5fdb2b1
SHA256ca46a68ec53e7724cc0ce2c8e42cd93187d4745a92a22b445406ae93a198d739
SHA512741865d0a76429c12cee89138ec65578bd768ae6af78f6ca62e2000abcc40b97f960614eb91fa3e8a083b921093acc306a2666bffac8e18eb4abd8608aaeff76
-
Filesize
5KB
MD5ecfbd0c38ffbf96c58b2e91da0d759b9
SHA1daa57961cff1f7e912b4de13681be36e03f50af9
SHA25675d8efed3469afbeba16b31f8532c1b18f523bb58144c804b2d7d6651a81c26d
SHA512fff99d703a7440fddc2b052f28daa5857d01a725709cb7edd78713ea0cfdd8133595576f58730bbf15b4de3572e88571d0aec012aed2af5dfcf4ccf1938bd84b
-
Filesize
6KB
MD5b2b22228312dcb36ee621f40d45bd033
SHA16952aa544aa2d7a39b40514af982bcbaaf32d963
SHA25623ec71bf0badff5590083689ca46260b381d459ee32442843b47af67c5f65c46
SHA51250458c71bfdb5b6d4c33ee77679ee1ae39c223958243c83ee79af8d26e0ba11a6ce45a2d576db99fb6449e9818d7674f127dcbff90149f9d7bdbd296e213277f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD50066dc9b6bf4dfcb231a8049c48b0c07
SHA146733c77dc4fc07a96b0c5d1e9c0fcfe067e5440
SHA256ad72888caa78228bac0394aaec91726a6ad9f187665fb12c1be57df5e5d64643
SHA512f855cce96d9b14669a4e40c92d2ebff4c01ea32abe97dc0a6a354f7fbd4d28a84ffb9eacb58baaf1bc137609a31e233106b7228e5ce00dea72978dbdb8a16b6e