Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 09:51
Static task
static1
Behavioral task
behavioral1
Sample
62de015af6db13913b808cb12a173c4d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
62de015af6db13913b808cb12a173c4d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
62de015af6db13913b808cb12a173c4d_JaffaCakes118.html
-
Size
18KB
-
MD5
62de015af6db13913b808cb12a173c4d
-
SHA1
ff4e51d2d48a4c988224531f1008bf8000686b61
-
SHA256
c97282be179e5b4641360080fbb5f13c612b412943040c7895a7438a344bda3a
-
SHA512
ed41ed1951c932542ba2697b30eccaab1ca913a79a51d2b7024885b489b7e9df394fc51345c0491991e46a5fe3474de91840a419ebb8a7ff8f7fa5b68c6d515d
-
SSDEEP
384:IRzB04OjA/y4GAvpqctcXku+VSaEuvtZodGqVNlMhJvuYVP:IR90FjA/y4GAhqcuXkhQaEOFMbQJvB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2952 msedge.exe 2952 msedge.exe 1824 msedge.exe 1824 msedge.exe 3568 identity_helper.exe 3568 identity_helper.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1824 wrote to memory of 928 1824 msedge.exe 83 PID 1824 wrote to memory of 928 1824 msedge.exe 83 PID 1824 wrote to memory of 1400 1824 msedge.exe 84 PID 1824 wrote to memory of 1400 1824 msedge.exe 84 PID 1824 wrote to memory of 1400 1824 msedge.exe 84 PID 1824 wrote to memory of 1400 1824 msedge.exe 84 PID 1824 wrote to memory of 1400 1824 msedge.exe 84 PID 1824 wrote to memory of 1400 1824 msedge.exe 84 PID 1824 wrote to memory of 1400 1824 msedge.exe 84 PID 1824 wrote to memory of 1400 1824 msedge.exe 84 PID 1824 wrote to memory of 1400 1824 msedge.exe 84 PID 1824 wrote to memory of 1400 1824 msedge.exe 84 PID 1824 wrote to memory of 1400 1824 msedge.exe 84 PID 1824 wrote to memory of 1400 1824 msedge.exe 84 PID 1824 wrote to memory of 1400 1824 msedge.exe 84 PID 1824 wrote to memory of 1400 1824 msedge.exe 84 PID 1824 wrote to memory of 1400 1824 msedge.exe 84 PID 1824 wrote to memory of 1400 1824 msedge.exe 84 PID 1824 wrote to memory of 1400 1824 msedge.exe 84 PID 1824 wrote to memory of 1400 1824 msedge.exe 84 PID 1824 wrote to memory of 1400 1824 msedge.exe 84 PID 1824 wrote to memory of 1400 1824 msedge.exe 84 PID 1824 wrote to memory of 1400 1824 msedge.exe 84 PID 1824 wrote to memory of 1400 1824 msedge.exe 84 PID 1824 wrote to memory of 1400 1824 msedge.exe 84 PID 1824 wrote to memory of 1400 1824 msedge.exe 84 PID 1824 wrote to memory of 1400 1824 msedge.exe 84 PID 1824 wrote to memory of 1400 1824 msedge.exe 84 PID 1824 wrote to memory of 1400 1824 msedge.exe 84 PID 1824 wrote to memory of 1400 1824 msedge.exe 84 PID 1824 wrote to memory of 1400 1824 msedge.exe 84 PID 1824 wrote to memory of 1400 1824 msedge.exe 84 PID 1824 wrote to memory of 1400 1824 msedge.exe 84 PID 1824 wrote to memory of 1400 1824 msedge.exe 84 PID 1824 wrote to memory of 1400 1824 msedge.exe 84 PID 1824 wrote to memory of 1400 1824 msedge.exe 84 PID 1824 wrote to memory of 1400 1824 msedge.exe 84 PID 1824 wrote to memory of 1400 1824 msedge.exe 84 PID 1824 wrote to memory of 1400 1824 msedge.exe 84 PID 1824 wrote to memory of 1400 1824 msedge.exe 84 PID 1824 wrote to memory of 1400 1824 msedge.exe 84 PID 1824 wrote to memory of 1400 1824 msedge.exe 84 PID 1824 wrote to memory of 2952 1824 msedge.exe 85 PID 1824 wrote to memory of 2952 1824 msedge.exe 85 PID 1824 wrote to memory of 4200 1824 msedge.exe 86 PID 1824 wrote to memory of 4200 1824 msedge.exe 86 PID 1824 wrote to memory of 4200 1824 msedge.exe 86 PID 1824 wrote to memory of 4200 1824 msedge.exe 86 PID 1824 wrote to memory of 4200 1824 msedge.exe 86 PID 1824 wrote to memory of 4200 1824 msedge.exe 86 PID 1824 wrote to memory of 4200 1824 msedge.exe 86 PID 1824 wrote to memory of 4200 1824 msedge.exe 86 PID 1824 wrote to memory of 4200 1824 msedge.exe 86 PID 1824 wrote to memory of 4200 1824 msedge.exe 86 PID 1824 wrote to memory of 4200 1824 msedge.exe 86 PID 1824 wrote to memory of 4200 1824 msedge.exe 86 PID 1824 wrote to memory of 4200 1824 msedge.exe 86 PID 1824 wrote to memory of 4200 1824 msedge.exe 86 PID 1824 wrote to memory of 4200 1824 msedge.exe 86 PID 1824 wrote to memory of 4200 1824 msedge.exe 86 PID 1824 wrote to memory of 4200 1824 msedge.exe 86 PID 1824 wrote to memory of 4200 1824 msedge.exe 86 PID 1824 wrote to memory of 4200 1824 msedge.exe 86 PID 1824 wrote to memory of 4200 1824 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\62de015af6db13913b808cb12a173c4d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff825a646f8,0x7ff825a64708,0x7ff825a647182⤵PID:928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,15566239083648428826,2945660625827750256,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,15566239083648428826,2945660625827750256,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,15566239083648428826,2945660625827750256,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:82⤵PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15566239083648428826,2945660625827750256,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3116 /prefetch:12⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15566239083648428826,2945660625827750256,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,15566239083648428826,2945660625827750256,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 /prefetch:82⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,15566239083648428826,2945660625827750256,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15566239083648428826,2945660625827750256,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:2964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15566239083648428826,2945660625827750256,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15566239083648428826,2945660625827750256,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15566239083648428826,2945660625827750256,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,15566239083648428826,2945660625827750256,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1904 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4560
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3568
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
553B
MD58c5532ee2e7df4c85384bc2795971b57
SHA10d02237d51c488bd5a75885925c093b507046f43
SHA2563f9f24b96423126da994662a292cebafe8cbd41980cbc6b450aa1166a5cf359d
SHA51235e4edd608790c30070684b92bfe8158914a4d42e363fdd624ea113c4321cd013ad07e74d10622ec993d5df8fb561f7194d2f3bd0de9b22a8e4ef1a31c35e1e4
-
Filesize
5KB
MD5385862e82c35d7ebd95c40e48f760c0e
SHA17a3c4eb7a38c0c8d2157e83b1f398ce7724636c4
SHA256c415dee2dbdc12638eb2998bc950040eb80dcd6666629467958b2edf472174ee
SHA5122f8315751bbbe4816a4f346356cb13e3290ace8ba386ceea63ccfd8a0758f013618186839e448e592444c7f0e335800497864e02a437be6f0c77b0729b43a417
-
Filesize
6KB
MD555a3ad26f2bb76baf3a24435c37eaaaa
SHA1d8edb7799fc72c0caf129f41c97189243f9b619f
SHA256fd3e4dffd65ed29b31fb2a526b099dbec6a3164d0ce5124a24933579eae01aff
SHA5121cb8af356eb3fbf5d0265fd545711447dd91adb8323f1609ffd3925df165b4e25852c2543e551035320acb20bc47ede492c920bde97e605dc1bb5f3aef2c4ca0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a58b65d726d019f0b6dbade4d8c55dc7
SHA1f7f1cf2f9653cc7b7e8edb9230d052c572b14256
SHA2565052f226a36c405a1d9f6241df18cfc1dadbf566bba4a86ab0f8077308faf910
SHA512eb0e2755b446778694e148dcdad2e986f6674b380a5a2ca0ad271446c4a30b521fffae5a0dc2f2658e4ee4ef91e27414c0355788446510053627378f80612753