Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-06-2024 12:17
Static task
static1
Behavioral task
behavioral1
Sample
9aa37e15f7c724549e87da204c16f761_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
9aa37e15f7c724549e87da204c16f761_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9aa37e15f7c724549e87da204c16f761_JaffaCakes118.html
-
Size
18KB
-
MD5
9aa37e15f7c724549e87da204c16f761
-
SHA1
0cd52fb8dca04b5d3938710a680546743faeb715
-
SHA256
f1df16fcbdc46a0ff2cbf746dfb5395ede8c565cdab9c56037ce4b9f2eb9f5a4
-
SHA512
41d5b70d138b57e81687dd9d8d7710d581b31dd9fef3ae39d7f38018cdbefbd5be4fa131e562f47bc1440c575cb33f427035fdcc6fe67f1dc8176b7460b00143
-
SSDEEP
192:SIM3t0I5fo9cOQivXQWxZxdkVSoAIk4ozUnjBhsG82qDB8:SIMd0I5nO9HNsvsFxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3716 msedge.exe 3716 msedge.exe 1504 msedge.exe 1504 msedge.exe 3580 identity_helper.exe 3580 identity_helper.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1504 wrote to memory of 4992 1504 msedge.exe 82 PID 1504 wrote to memory of 4992 1504 msedge.exe 82 PID 1504 wrote to memory of 2076 1504 msedge.exe 83 PID 1504 wrote to memory of 2076 1504 msedge.exe 83 PID 1504 wrote to memory of 2076 1504 msedge.exe 83 PID 1504 wrote to memory of 2076 1504 msedge.exe 83 PID 1504 wrote to memory of 2076 1504 msedge.exe 83 PID 1504 wrote to memory of 2076 1504 msedge.exe 83 PID 1504 wrote to memory of 2076 1504 msedge.exe 83 PID 1504 wrote to memory of 2076 1504 msedge.exe 83 PID 1504 wrote to memory of 2076 1504 msedge.exe 83 PID 1504 wrote to memory of 2076 1504 msedge.exe 83 PID 1504 wrote to memory of 2076 1504 msedge.exe 83 PID 1504 wrote to memory of 2076 1504 msedge.exe 83 PID 1504 wrote to memory of 2076 1504 msedge.exe 83 PID 1504 wrote to memory of 2076 1504 msedge.exe 83 PID 1504 wrote to memory of 2076 1504 msedge.exe 83 PID 1504 wrote to memory of 2076 1504 msedge.exe 83 PID 1504 wrote to memory of 2076 1504 msedge.exe 83 PID 1504 wrote to memory of 2076 1504 msedge.exe 83 PID 1504 wrote to memory of 2076 1504 msedge.exe 83 PID 1504 wrote to memory of 2076 1504 msedge.exe 83 PID 1504 wrote to memory of 2076 1504 msedge.exe 83 PID 1504 wrote to memory of 2076 1504 msedge.exe 83 PID 1504 wrote to memory of 2076 1504 msedge.exe 83 PID 1504 wrote to memory of 2076 1504 msedge.exe 83 PID 1504 wrote to memory of 2076 1504 msedge.exe 83 PID 1504 wrote to memory of 2076 1504 msedge.exe 83 PID 1504 wrote to memory of 2076 1504 msedge.exe 83 PID 1504 wrote to memory of 2076 1504 msedge.exe 83 PID 1504 wrote to memory of 2076 1504 msedge.exe 83 PID 1504 wrote to memory of 2076 1504 msedge.exe 83 PID 1504 wrote to memory of 2076 1504 msedge.exe 83 PID 1504 wrote to memory of 2076 1504 msedge.exe 83 PID 1504 wrote to memory of 2076 1504 msedge.exe 83 PID 1504 wrote to memory of 2076 1504 msedge.exe 83 PID 1504 wrote to memory of 2076 1504 msedge.exe 83 PID 1504 wrote to memory of 2076 1504 msedge.exe 83 PID 1504 wrote to memory of 2076 1504 msedge.exe 83 PID 1504 wrote to memory of 2076 1504 msedge.exe 83 PID 1504 wrote to memory of 2076 1504 msedge.exe 83 PID 1504 wrote to memory of 2076 1504 msedge.exe 83 PID 1504 wrote to memory of 3716 1504 msedge.exe 84 PID 1504 wrote to memory of 3716 1504 msedge.exe 84 PID 1504 wrote to memory of 1532 1504 msedge.exe 85 PID 1504 wrote to memory of 1532 1504 msedge.exe 85 PID 1504 wrote to memory of 1532 1504 msedge.exe 85 PID 1504 wrote to memory of 1532 1504 msedge.exe 85 PID 1504 wrote to memory of 1532 1504 msedge.exe 85 PID 1504 wrote to memory of 1532 1504 msedge.exe 85 PID 1504 wrote to memory of 1532 1504 msedge.exe 85 PID 1504 wrote to memory of 1532 1504 msedge.exe 85 PID 1504 wrote to memory of 1532 1504 msedge.exe 85 PID 1504 wrote to memory of 1532 1504 msedge.exe 85 PID 1504 wrote to memory of 1532 1504 msedge.exe 85 PID 1504 wrote to memory of 1532 1504 msedge.exe 85 PID 1504 wrote to memory of 1532 1504 msedge.exe 85 PID 1504 wrote to memory of 1532 1504 msedge.exe 85 PID 1504 wrote to memory of 1532 1504 msedge.exe 85 PID 1504 wrote to memory of 1532 1504 msedge.exe 85 PID 1504 wrote to memory of 1532 1504 msedge.exe 85 PID 1504 wrote to memory of 1532 1504 msedge.exe 85 PID 1504 wrote to memory of 1532 1504 msedge.exe 85 PID 1504 wrote to memory of 1532 1504 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9aa37e15f7c724549e87da204c16f761_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff12b746f8,0x7fff12b74708,0x7fff12b747182⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,3459553729798463907,507819227561740245,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:2076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,3459553729798463907,507819227561740245,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,3459553729798463907,507819227561740245,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:82⤵PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,3459553729798463907,507819227561740245,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,3459553729798463907,507819227561740245,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,3459553729798463907,507819227561740245,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4880 /prefetch:82⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,3459553729798463907,507819227561740245,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4880 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,3459553729798463907,507819227561740245,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:12⤵PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,3459553729798463907,507819227561740245,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4340 /prefetch:12⤵PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,3459553729798463907,507819227561740245,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4636 /prefetch:12⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,3459553729798463907,507819227561740245,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,3459553729798463907,507819227561740245,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4828 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:768
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4524
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD5157d73f4dc37c5391411f11fa223148f
SHA1fab93e731dcb653240d2f0ca14009c9c785094f2
SHA256fe89c735e324aeaad80cb88584d501740e49cbc092a9b10055a1258fa8c7b205
SHA512be50842c57dfa9a802f2f988d5bbaaf391513dae6553c0d899805335b848a527e4d5eba503fb135957d9ef80139b11f9aedc62f864855f60b33fd4041e26d34d
-
Filesize
6KB
MD594708c09411e117c9d0b61d1e67743e4
SHA124dbe986e445f99c827e044f5d3888fce7eb4432
SHA256e3585d76ee81eed6c37e6046375c3cb7b3e7f1b41149e83847033df7d165da0a
SHA51262065076de404de02264b51da3027e946edaa3e85f0f4b53cc0c27f8315d3679da0d26fcb3aa2ef53ada35248ffc8ce2f694fed275ccea855fc05f804caf0c44
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD50a6e2dde25eb5dd3ee8baf12ffebff5c
SHA1515b21b36f8df814828f8301e2ffe79066620376
SHA2563af97960d3052266565acec7a66daa32e7fdf6adccb0cc263565f46543787ba7
SHA51292e16ef73e697bef68c7d8d694637e6a5a8ecc80794144785e3f717fef9ec926e41c02d31aa63ce1abd4817adecbc02fc4132b49f6df41b362f5ffbcb57a23b9