Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10-06-2024 13:27
Static task
static1
Behavioral task
behavioral1
Sample
9acfdabd617ed7148580d3ccf8da888d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9acfdabd617ed7148580d3ccf8da888d_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9acfdabd617ed7148580d3ccf8da888d_JaffaCakes118.html
-
Size
27KB
-
MD5
9acfdabd617ed7148580d3ccf8da888d
-
SHA1
d4923b8dfd0cde9b6dfb03ed0ca5202f4c4e2579
-
SHA256
b7bb6c1e438e61194e31e66cafb2aefa5cd6cac9101fbf58a68a7d64c5f5afbe
-
SHA512
7c066dc336e06ec7d479d0a8c57a125cb187da6c4d0a40c80b802e886df2bef2772f3ed7fa911668b660e0d9c6f862a6aa33632ab139f57f765a9898353a5039
-
SSDEEP
768:SjUzdsFqvfudlQVV1C5m1CCCcmzm3C/CnCQG0bkFVfTBc0ovTj+0/m38gDO3Jz2:SedsFqvfug1C5m1CCCcmzm3C/CnCQ+Tl
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1784 msedge.exe 1784 msedge.exe 1136 msedge.exe 1136 msedge.exe 2952 identity_helper.exe 2952 identity_helper.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1136 wrote to memory of 4384 1136 msedge.exe 81 PID 1136 wrote to memory of 4384 1136 msedge.exe 81 PID 1136 wrote to memory of 4988 1136 msedge.exe 82 PID 1136 wrote to memory of 4988 1136 msedge.exe 82 PID 1136 wrote to memory of 4988 1136 msedge.exe 82 PID 1136 wrote to memory of 4988 1136 msedge.exe 82 PID 1136 wrote to memory of 4988 1136 msedge.exe 82 PID 1136 wrote to memory of 4988 1136 msedge.exe 82 PID 1136 wrote to memory of 4988 1136 msedge.exe 82 PID 1136 wrote to memory of 4988 1136 msedge.exe 82 PID 1136 wrote to memory of 4988 1136 msedge.exe 82 PID 1136 wrote to memory of 4988 1136 msedge.exe 82 PID 1136 wrote to memory of 4988 1136 msedge.exe 82 PID 1136 wrote to memory of 4988 1136 msedge.exe 82 PID 1136 wrote to memory of 4988 1136 msedge.exe 82 PID 1136 wrote to memory of 4988 1136 msedge.exe 82 PID 1136 wrote to memory of 4988 1136 msedge.exe 82 PID 1136 wrote to memory of 4988 1136 msedge.exe 82 PID 1136 wrote to memory of 4988 1136 msedge.exe 82 PID 1136 wrote to memory of 4988 1136 msedge.exe 82 PID 1136 wrote to memory of 4988 1136 msedge.exe 82 PID 1136 wrote to memory of 4988 1136 msedge.exe 82 PID 1136 wrote to memory of 4988 1136 msedge.exe 82 PID 1136 wrote to memory of 4988 1136 msedge.exe 82 PID 1136 wrote to memory of 4988 1136 msedge.exe 82 PID 1136 wrote to memory of 4988 1136 msedge.exe 82 PID 1136 wrote to memory of 4988 1136 msedge.exe 82 PID 1136 wrote to memory of 4988 1136 msedge.exe 82 PID 1136 wrote to memory of 4988 1136 msedge.exe 82 PID 1136 wrote to memory of 4988 1136 msedge.exe 82 PID 1136 wrote to memory of 4988 1136 msedge.exe 82 PID 1136 wrote to memory of 4988 1136 msedge.exe 82 PID 1136 wrote to memory of 4988 1136 msedge.exe 82 PID 1136 wrote to memory of 4988 1136 msedge.exe 82 PID 1136 wrote to memory of 4988 1136 msedge.exe 82 PID 1136 wrote to memory of 4988 1136 msedge.exe 82 PID 1136 wrote to memory of 4988 1136 msedge.exe 82 PID 1136 wrote to memory of 4988 1136 msedge.exe 82 PID 1136 wrote to memory of 4988 1136 msedge.exe 82 PID 1136 wrote to memory of 4988 1136 msedge.exe 82 PID 1136 wrote to memory of 4988 1136 msedge.exe 82 PID 1136 wrote to memory of 4988 1136 msedge.exe 82 PID 1136 wrote to memory of 1784 1136 msedge.exe 83 PID 1136 wrote to memory of 1784 1136 msedge.exe 83 PID 1136 wrote to memory of 2828 1136 msedge.exe 84 PID 1136 wrote to memory of 2828 1136 msedge.exe 84 PID 1136 wrote to memory of 2828 1136 msedge.exe 84 PID 1136 wrote to memory of 2828 1136 msedge.exe 84 PID 1136 wrote to memory of 2828 1136 msedge.exe 84 PID 1136 wrote to memory of 2828 1136 msedge.exe 84 PID 1136 wrote to memory of 2828 1136 msedge.exe 84 PID 1136 wrote to memory of 2828 1136 msedge.exe 84 PID 1136 wrote to memory of 2828 1136 msedge.exe 84 PID 1136 wrote to memory of 2828 1136 msedge.exe 84 PID 1136 wrote to memory of 2828 1136 msedge.exe 84 PID 1136 wrote to memory of 2828 1136 msedge.exe 84 PID 1136 wrote to memory of 2828 1136 msedge.exe 84 PID 1136 wrote to memory of 2828 1136 msedge.exe 84 PID 1136 wrote to memory of 2828 1136 msedge.exe 84 PID 1136 wrote to memory of 2828 1136 msedge.exe 84 PID 1136 wrote to memory of 2828 1136 msedge.exe 84 PID 1136 wrote to memory of 2828 1136 msedge.exe 84 PID 1136 wrote to memory of 2828 1136 msedge.exe 84 PID 1136 wrote to memory of 2828 1136 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9acfdabd617ed7148580d3ccf8da888d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff84d7846f8,0x7ff84d784708,0x7ff84d7847182⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,5827575765553227232,17744403675519082459,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:22⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2232,5827575765553227232,17744403675519082459,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2232,5827575765553227232,17744403675519082459,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:2828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,5827575765553227232,17744403675519082459,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,5827575765553227232,17744403675519082459,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2232,5827575765553227232,17744403675519082459,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 /prefetch:82⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2232,5827575765553227232,17744403675519082459,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,5827575765553227232,17744403675519082459,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,5827575765553227232,17744403675519082459,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,5827575765553227232,17744403675519082459,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5724 /prefetch:12⤵PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,5827575765553227232,17744403675519082459,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5680 /prefetch:12⤵PID:1992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,5827575765553227232,17744403675519082459,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3080 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4672
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:752
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
470B
MD5caef239ad6536643484b165a35621505
SHA1ac067ad9c7c0c028a3dd39270553c857b05995f6
SHA256acd114d9a62a6193fac910dc5dd8b050a94251d3f9b1d629929a30ab4e76b58f
SHA51208cbddf72b2dc0fe6c0ce39a5d38b572441a6a9bd1030eb94a4b860a66cb1bb6d2165c241c3674e12a0eb0e6bfbc076bff7db117c24a23ec5a4b4a649dce43c7
-
Filesize
5KB
MD5ac0a5276581ee92b1f5e36e22cbaa63e
SHA1880ce670054334fb1136e46e8e453dc884bc6d81
SHA256d04c04a6ae2dd355dd6880fb974e7d4b43f446a70bfd3c25c476dc2978f5c0b6
SHA5127ec7a5845130e99d8f436ccbc3f0ae91ae28338277c4ffdd56c5473ffae5c8d7c693e3699ccf114c456c074bc339e6e44649ffdcb4fb9ef2b4bf890c63ac2905
-
Filesize
6KB
MD5e5ad3f6dc893c9d432074397312d8889
SHA199630f110ef6af6a089fb584ff374819432f91a4
SHA256dbc82754837be76ac981bad41468c06f09db676a7035a86fddd737eb8618d1d1
SHA51226303c3695632425d1381d59b82f188a0f799882dd951262ba2799d74c28368c3de1b0807778b52e340c2a4daa8b1ed5b129a8b9c126bee33c9cdbd897f0e1c1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5cdbc264b4d00689f8034e73208761266
SHA1c7aad178cafcfcd83cdeeec24056c6978b062d9c
SHA2560e79f6c3048a42d499cbb0f3e37f723303b9a2105fbc1cce8700e4c91124e210
SHA512c46abce65536973134ade6ea46152efb2e8fb266f747ba8351d1eb901e80d3d4542aa18634f2b73a665442fe8ea0aa060336991d84cf0571c88c3cce3ed4fc18