Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
29/04/2024, 02:40
Static task
static1
Behavioral task
behavioral1
Sample
06a41f22a8e573888902577578463a3a_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
06a41f22a8e573888902577578463a3a_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
06a41f22a8e573888902577578463a3a_JaffaCakes118.html
-
Size
29KB
-
MD5
06a41f22a8e573888902577578463a3a
-
SHA1
9805f561837ce12a0e56f1d5c249ace5fd533ec5
-
SHA256
b8a22f847d7dd4651071d8616f2ccd1d00067da1b6b3333b9ea47d5b8b50185e
-
SHA512
5eb5bc62debed52a8973da4e7ed942a5d11117ddbe69423281a6843e60ca37f27d526a6bb0a317f6218b7495ee3b67b1dcd9dc7702110ff9b0a2e95c6dd6205a
-
SSDEEP
192:uWzeb5nxAsnQjxn5Q/4nQiebNnCnQOkEntI6nQTbnVnQpMCFA0Buz0EA3KSmdHso:1hQ/uT1Xl290e8C+Ox
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4880 msedge.exe 4880 msedge.exe 408 msedge.exe 408 msedge.exe 5084 identity_helper.exe 5084 identity_helper.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 408 wrote to memory of 5116 408 msedge.exe 83 PID 408 wrote to memory of 5116 408 msedge.exe 83 PID 408 wrote to memory of 3196 408 msedge.exe 84 PID 408 wrote to memory of 3196 408 msedge.exe 84 PID 408 wrote to memory of 3196 408 msedge.exe 84 PID 408 wrote to memory of 3196 408 msedge.exe 84 PID 408 wrote to memory of 3196 408 msedge.exe 84 PID 408 wrote to memory of 3196 408 msedge.exe 84 PID 408 wrote to memory of 3196 408 msedge.exe 84 PID 408 wrote to memory of 3196 408 msedge.exe 84 PID 408 wrote to memory of 3196 408 msedge.exe 84 PID 408 wrote to memory of 3196 408 msedge.exe 84 PID 408 wrote to memory of 3196 408 msedge.exe 84 PID 408 wrote to memory of 3196 408 msedge.exe 84 PID 408 wrote to memory of 3196 408 msedge.exe 84 PID 408 wrote to memory of 3196 408 msedge.exe 84 PID 408 wrote to memory of 3196 408 msedge.exe 84 PID 408 wrote to memory of 3196 408 msedge.exe 84 PID 408 wrote to memory of 3196 408 msedge.exe 84 PID 408 wrote to memory of 3196 408 msedge.exe 84 PID 408 wrote to memory of 3196 408 msedge.exe 84 PID 408 wrote to memory of 3196 408 msedge.exe 84 PID 408 wrote to memory of 3196 408 msedge.exe 84 PID 408 wrote to memory of 3196 408 msedge.exe 84 PID 408 wrote to memory of 3196 408 msedge.exe 84 PID 408 wrote to memory of 3196 408 msedge.exe 84 PID 408 wrote to memory of 3196 408 msedge.exe 84 PID 408 wrote to memory of 3196 408 msedge.exe 84 PID 408 wrote to memory of 3196 408 msedge.exe 84 PID 408 wrote to memory of 3196 408 msedge.exe 84 PID 408 wrote to memory of 3196 408 msedge.exe 84 PID 408 wrote to memory of 3196 408 msedge.exe 84 PID 408 wrote to memory of 3196 408 msedge.exe 84 PID 408 wrote to memory of 3196 408 msedge.exe 84 PID 408 wrote to memory of 3196 408 msedge.exe 84 PID 408 wrote to memory of 3196 408 msedge.exe 84 PID 408 wrote to memory of 3196 408 msedge.exe 84 PID 408 wrote to memory of 3196 408 msedge.exe 84 PID 408 wrote to memory of 3196 408 msedge.exe 84 PID 408 wrote to memory of 3196 408 msedge.exe 84 PID 408 wrote to memory of 3196 408 msedge.exe 84 PID 408 wrote to memory of 3196 408 msedge.exe 84 PID 408 wrote to memory of 4880 408 msedge.exe 85 PID 408 wrote to memory of 4880 408 msedge.exe 85 PID 408 wrote to memory of 1760 408 msedge.exe 86 PID 408 wrote to memory of 1760 408 msedge.exe 86 PID 408 wrote to memory of 1760 408 msedge.exe 86 PID 408 wrote to memory of 1760 408 msedge.exe 86 PID 408 wrote to memory of 1760 408 msedge.exe 86 PID 408 wrote to memory of 1760 408 msedge.exe 86 PID 408 wrote to memory of 1760 408 msedge.exe 86 PID 408 wrote to memory of 1760 408 msedge.exe 86 PID 408 wrote to memory of 1760 408 msedge.exe 86 PID 408 wrote to memory of 1760 408 msedge.exe 86 PID 408 wrote to memory of 1760 408 msedge.exe 86 PID 408 wrote to memory of 1760 408 msedge.exe 86 PID 408 wrote to memory of 1760 408 msedge.exe 86 PID 408 wrote to memory of 1760 408 msedge.exe 86 PID 408 wrote to memory of 1760 408 msedge.exe 86 PID 408 wrote to memory of 1760 408 msedge.exe 86 PID 408 wrote to memory of 1760 408 msedge.exe 86 PID 408 wrote to memory of 1760 408 msedge.exe 86 PID 408 wrote to memory of 1760 408 msedge.exe 86 PID 408 wrote to memory of 1760 408 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\06a41f22a8e573888902577578463a3a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc2acd46f8,0x7ffc2acd4708,0x7ffc2acd47182⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,1106015611293307055,14706986291253472985,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1996 /prefetch:22⤵PID:3196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1976,1106015611293307055,14706986291253472985,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1976,1106015611293307055,14706986291253472985,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:1760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,1106015611293307055,14706986291253472985,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,1106015611293307055,14706986291253472985,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1976,1106015611293307055,14706986291253472985,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4960 /prefetch:82⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1976,1106015611293307055,14706986291253472985,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4960 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,1106015611293307055,14706986291253472985,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,1106015611293307055,14706986291253472985,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,1106015611293307055,14706986291253472985,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4588 /prefetch:12⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,1106015611293307055,14706986291253472985,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4032 /prefetch:12⤵PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,1106015611293307055,14706986291253472985,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4380 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3200
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4316
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3192
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52a70f1bd4da893a67660d6432970788d
SHA1ddf4047e0d468f56ea0c0d8ff078a86a0bb62873
SHA256c550af5ba51f68ac4d18747edc5dea1a655dd212d84bad1e6168ba7a97745561
SHA51226b9a365e77df032fc5c461d85d1ba313eafead38827190608c6537ec12b2dfdbed4e1705bfd1e61899034791ad6fa88ea7490c3a48cdaec4d04cd0577b11343
-
Filesize
152B
MD5fbe1ce4d182aaffb80de94263be1dd35
SHA1bc6c9827aa35a136a7d79be9e606ff359e2ac3ea
SHA2560021f72dbca789f179762b0e17c28fe0b93a12539b08294800e47469905aeb51
SHA5123fb0a3b38e7d4a30f5560594b1d14e6e58419e274255fb68dfe0ca897aa181f9ce8cb2048403f851fd36a17b0e34d272d03927769d41a500b2fe64806354902f
-
Filesize
6KB
MD57c3b0e2b2344db41c5ab9766ee249c63
SHA16894119e15ee132c9f19d99e2c73626bc7639b82
SHA2564672cc37c0277f3db7c34d69688884b9b2c471fc800308f48c3536c3484d3978
SHA5121352f6bd0dbeb3c935cfa4397a2885fb4b36b0e7d272bc65e25a8e6ffa80aaa24394211a4912620102d88919e1212a95fe5277b6a91031ef064c149d01338c41
-
Filesize
6KB
MD5c32a86dff0ef884433431c0f9545de70
SHA108a84d79d92d42477ea22d258611e05eb830db57
SHA256d273c37396691ec2d9d84d7785e0b075835afe3182d23cc93728c27035b40a34
SHA512da24c69959dd42c41eef614b7e8a69a09d0a847f24a5a94c76603a81ac7c37373a87064a4657c9b5f85344a0af7855c02a2f7bb1ab7632d8585d0559291dcaf0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD575a90149dd849b9b0903b0c524372609
SHA1a17bb48f991e4858067c142738be906ac5759c5f
SHA256c02ddf1f5987ccc7d8854cc103b763dcecd5c924fb136bf34003988283114130
SHA512868a0d1541019ae4edc444fa75998879931a46ec57456f1fd816cbc20d790e6769cda5fabcf4aafdf5ae620d200149dced8b46eb2c7d4f2e8cd09defdd0fc42c