Analysis
-
max time kernel
133s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/06/2024, 02:38
Static task
static1
Behavioral task
behavioral1
Sample
9a56ffccc12758bd444aa62999710f26_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9a56ffccc12758bd444aa62999710f26_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9a56ffccc12758bd444aa62999710f26_JaffaCakes118.html
-
Size
47KB
-
MD5
9a56ffccc12758bd444aa62999710f26
-
SHA1
a59326a1d41954e01f1aeb878b87be66e356b76b
-
SHA256
d8f3aba13f7f265e5c0bd1ab658f3b53feb6e69e9b8b2194855239520d12771d
-
SHA512
5d9c4341eacba653ff8f91255349ce0b08fe094a6f43bc26bc766339ebba320b2946ce64fb2c731ca34233230c2ac031e2ac3b71f4cbfd28cdac5eec435a7289
-
SSDEEP
384:mQ/0JtPVvWP3bJ3m0oaRxy2pG5+0eC5Mnc4WMF43YU5aNL6XLL/xUB:NP3b5OaRx/6+pc4PieOXH/c
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2012 msedge.exe 2012 msedge.exe 4360 msedge.exe 4360 msedge.exe 244 identity_helper.exe 244 identity_helper.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4360 wrote to memory of 1072 4360 msedge.exe 81 PID 4360 wrote to memory of 1072 4360 msedge.exe 81 PID 4360 wrote to memory of 1544 4360 msedge.exe 82 PID 4360 wrote to memory of 1544 4360 msedge.exe 82 PID 4360 wrote to memory of 1544 4360 msedge.exe 82 PID 4360 wrote to memory of 1544 4360 msedge.exe 82 PID 4360 wrote to memory of 1544 4360 msedge.exe 82 PID 4360 wrote to memory of 1544 4360 msedge.exe 82 PID 4360 wrote to memory of 1544 4360 msedge.exe 82 PID 4360 wrote to memory of 1544 4360 msedge.exe 82 PID 4360 wrote to memory of 1544 4360 msedge.exe 82 PID 4360 wrote to memory of 1544 4360 msedge.exe 82 PID 4360 wrote to memory of 1544 4360 msedge.exe 82 PID 4360 wrote to memory of 1544 4360 msedge.exe 82 PID 4360 wrote to memory of 1544 4360 msedge.exe 82 PID 4360 wrote to memory of 1544 4360 msedge.exe 82 PID 4360 wrote to memory of 1544 4360 msedge.exe 82 PID 4360 wrote to memory of 1544 4360 msedge.exe 82 PID 4360 wrote to memory of 1544 4360 msedge.exe 82 PID 4360 wrote to memory of 1544 4360 msedge.exe 82 PID 4360 wrote to memory of 1544 4360 msedge.exe 82 PID 4360 wrote to memory of 1544 4360 msedge.exe 82 PID 4360 wrote to memory of 1544 4360 msedge.exe 82 PID 4360 wrote to memory of 1544 4360 msedge.exe 82 PID 4360 wrote to memory of 1544 4360 msedge.exe 82 PID 4360 wrote to memory of 1544 4360 msedge.exe 82 PID 4360 wrote to memory of 1544 4360 msedge.exe 82 PID 4360 wrote to memory of 1544 4360 msedge.exe 82 PID 4360 wrote to memory of 1544 4360 msedge.exe 82 PID 4360 wrote to memory of 1544 4360 msedge.exe 82 PID 4360 wrote to memory of 1544 4360 msedge.exe 82 PID 4360 wrote to memory of 1544 4360 msedge.exe 82 PID 4360 wrote to memory of 1544 4360 msedge.exe 82 PID 4360 wrote to memory of 1544 4360 msedge.exe 82 PID 4360 wrote to memory of 1544 4360 msedge.exe 82 PID 4360 wrote to memory of 1544 4360 msedge.exe 82 PID 4360 wrote to memory of 1544 4360 msedge.exe 82 PID 4360 wrote to memory of 1544 4360 msedge.exe 82 PID 4360 wrote to memory of 1544 4360 msedge.exe 82 PID 4360 wrote to memory of 1544 4360 msedge.exe 82 PID 4360 wrote to memory of 1544 4360 msedge.exe 82 PID 4360 wrote to memory of 1544 4360 msedge.exe 82 PID 4360 wrote to memory of 2012 4360 msedge.exe 83 PID 4360 wrote to memory of 2012 4360 msedge.exe 83 PID 4360 wrote to memory of 5028 4360 msedge.exe 84 PID 4360 wrote to memory of 5028 4360 msedge.exe 84 PID 4360 wrote to memory of 5028 4360 msedge.exe 84 PID 4360 wrote to memory of 5028 4360 msedge.exe 84 PID 4360 wrote to memory of 5028 4360 msedge.exe 84 PID 4360 wrote to memory of 5028 4360 msedge.exe 84 PID 4360 wrote to memory of 5028 4360 msedge.exe 84 PID 4360 wrote to memory of 5028 4360 msedge.exe 84 PID 4360 wrote to memory of 5028 4360 msedge.exe 84 PID 4360 wrote to memory of 5028 4360 msedge.exe 84 PID 4360 wrote to memory of 5028 4360 msedge.exe 84 PID 4360 wrote to memory of 5028 4360 msedge.exe 84 PID 4360 wrote to memory of 5028 4360 msedge.exe 84 PID 4360 wrote to memory of 5028 4360 msedge.exe 84 PID 4360 wrote to memory of 5028 4360 msedge.exe 84 PID 4360 wrote to memory of 5028 4360 msedge.exe 84 PID 4360 wrote to memory of 5028 4360 msedge.exe 84 PID 4360 wrote to memory of 5028 4360 msedge.exe 84 PID 4360 wrote to memory of 5028 4360 msedge.exe 84 PID 4360 wrote to memory of 5028 4360 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9a56ffccc12758bd444aa62999710f26_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff84d0946f8,0x7ff84d094708,0x7ff84d0947182⤵PID:1072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,1871317227060410397,5661380900329297189,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:1544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,1871317227060410397,5661380900329297189,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,1871317227060410397,5661380900329297189,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,1871317227060410397,5661380900329297189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,1871317227060410397,5661380900329297189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:12⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,1871317227060410397,5661380900329297189,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1400 /prefetch:82⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,1871317227060410397,5661380900329297189,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1400 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,1871317227060410397,5661380900329297189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,1871317227060410397,5661380900329297189,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:12⤵PID:1760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,1871317227060410397,5661380900329297189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:1816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,1871317227060410397,5661380900329297189,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,1871317227060410397,5661380900329297189,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3408 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4560
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4860
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
5KB
MD526abb065948572941e8073689807420b
SHA14f498d1d03c0449ac23a0ce86dc9d2d5c21d95e2
SHA256ceaf512a19a933c1f3d52d11592d1ce17e482dc50b9b58b05b8be73c34a0169a
SHA512d962ad2f75dabdb6285cffba423258b8e51824fca4575b060e9a91ffda64b95f109df1d69f3c06005488d9eebf41c75a135a0fc94c31e79d993bb725995f2aad
-
Filesize
6KB
MD5a7b843ed0c52fd6e1c12335e367242e5
SHA1e850c322dba1c208a2c2856320bc985808559461
SHA256bf19a3eb212b839828fe5c618a6fcebb5f738cb443ff067d596a5f4fab4d1467
SHA51207d32bb401d556ae0e70bd4b36e8a0629064b829ac744cf78283bc9a1dbe496e21eeb18974bc5a96efa5b4efacacfa3f20a0e3eae3d1e9757c9fbd67ae8cee36
-
Filesize
6KB
MD5417be772e3c764a5816e92d9c06caac4
SHA1d03f44aebd771db34f24af297613d986a1968b40
SHA25692cf4688e5818e3f9a03a9356e7f0d847abf86c491579088bb87c176334f65a4
SHA5126c2a3da1f52e6cc1fb639c96b096215c6aa55975022bca29a72d1030ee2384bafaf987a6c50287c0424e8dda2ced9c631543eb7a0826c6779153993551bfc808
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD58812584c412cda8deb33ec7d12f7e59f
SHA1f7c2e4bca66dcb611270f5f8dd9682838afb4e55
SHA256968403e51badba4d8cf8c4b70fd82137bf307a89cbe80f22b8a9623da7a21b8e
SHA51235d0fe44f7d5b56b37bbf83d34aaf1ca9c3532ccfbd0defa17305fbb915ad87c8bca642f5c007552dbc68f591f7b02cf00969663a1df8fc16ff31e588c6082b5