Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/06/2024, 21:55
Static task
static1
Behavioral task
behavioral1
Sample
a291b82a49a3a07f047b8bca8063c191_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a291b82a49a3a07f047b8bca8063c191_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a291b82a49a3a07f047b8bca8063c191_JaffaCakes118.html
-
Size
21KB
-
MD5
a291b82a49a3a07f047b8bca8063c191
-
SHA1
b1c44afa2b9d338bcf6312e64f7c9d7c5dbe41db
-
SHA256
006774e7a469b95cf239a12ff9d9586a8d09a9e87f4c8b1e93b0e535599ff62f
-
SHA512
be2a898e4298738b9310675d4498bf21505dfcb8896ea1967c91a919546bac4b61e1086bf0a349a65d353e1d8db29940fc9117ca10b629810426791fa39f4e87
-
SSDEEP
384:7QEtMNaCLGwXggfJ/CiUcxLaM5OSL5vmotpoKpowpo5po2poCpoT9podpoQposzU:er3nxK1L4uhH0QiEC/LWCKph+XQbg
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 964 msedge.exe 964 msedge.exe 4480 msedge.exe 4480 msedge.exe 1600 identity_helper.exe 1600 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4480 wrote to memory of 1920 4480 msedge.exe 81 PID 4480 wrote to memory of 1920 4480 msedge.exe 81 PID 4480 wrote to memory of 4172 4480 msedge.exe 82 PID 4480 wrote to memory of 4172 4480 msedge.exe 82 PID 4480 wrote to memory of 4172 4480 msedge.exe 82 PID 4480 wrote to memory of 4172 4480 msedge.exe 82 PID 4480 wrote to memory of 4172 4480 msedge.exe 82 PID 4480 wrote to memory of 4172 4480 msedge.exe 82 PID 4480 wrote to memory of 4172 4480 msedge.exe 82 PID 4480 wrote to memory of 4172 4480 msedge.exe 82 PID 4480 wrote to memory of 4172 4480 msedge.exe 82 PID 4480 wrote to memory of 4172 4480 msedge.exe 82 PID 4480 wrote to memory of 4172 4480 msedge.exe 82 PID 4480 wrote to memory of 4172 4480 msedge.exe 82 PID 4480 wrote to memory of 4172 4480 msedge.exe 82 PID 4480 wrote to memory of 4172 4480 msedge.exe 82 PID 4480 wrote to memory of 4172 4480 msedge.exe 82 PID 4480 wrote to memory of 4172 4480 msedge.exe 82 PID 4480 wrote to memory of 4172 4480 msedge.exe 82 PID 4480 wrote to memory of 4172 4480 msedge.exe 82 PID 4480 wrote to memory of 4172 4480 msedge.exe 82 PID 4480 wrote to memory of 4172 4480 msedge.exe 82 PID 4480 wrote to memory of 4172 4480 msedge.exe 82 PID 4480 wrote to memory of 4172 4480 msedge.exe 82 PID 4480 wrote to memory of 4172 4480 msedge.exe 82 PID 4480 wrote to memory of 4172 4480 msedge.exe 82 PID 4480 wrote to memory of 4172 4480 msedge.exe 82 PID 4480 wrote to memory of 4172 4480 msedge.exe 82 PID 4480 wrote to memory of 4172 4480 msedge.exe 82 PID 4480 wrote to memory of 4172 4480 msedge.exe 82 PID 4480 wrote to memory of 4172 4480 msedge.exe 82 PID 4480 wrote to memory of 4172 4480 msedge.exe 82 PID 4480 wrote to memory of 4172 4480 msedge.exe 82 PID 4480 wrote to memory of 4172 4480 msedge.exe 82 PID 4480 wrote to memory of 4172 4480 msedge.exe 82 PID 4480 wrote to memory of 4172 4480 msedge.exe 82 PID 4480 wrote to memory of 4172 4480 msedge.exe 82 PID 4480 wrote to memory of 4172 4480 msedge.exe 82 PID 4480 wrote to memory of 4172 4480 msedge.exe 82 PID 4480 wrote to memory of 4172 4480 msedge.exe 82 PID 4480 wrote to memory of 4172 4480 msedge.exe 82 PID 4480 wrote to memory of 4172 4480 msedge.exe 82 PID 4480 wrote to memory of 964 4480 msedge.exe 83 PID 4480 wrote to memory of 964 4480 msedge.exe 83 PID 4480 wrote to memory of 208 4480 msedge.exe 84 PID 4480 wrote to memory of 208 4480 msedge.exe 84 PID 4480 wrote to memory of 208 4480 msedge.exe 84 PID 4480 wrote to memory of 208 4480 msedge.exe 84 PID 4480 wrote to memory of 208 4480 msedge.exe 84 PID 4480 wrote to memory of 208 4480 msedge.exe 84 PID 4480 wrote to memory of 208 4480 msedge.exe 84 PID 4480 wrote to memory of 208 4480 msedge.exe 84 PID 4480 wrote to memory of 208 4480 msedge.exe 84 PID 4480 wrote to memory of 208 4480 msedge.exe 84 PID 4480 wrote to memory of 208 4480 msedge.exe 84 PID 4480 wrote to memory of 208 4480 msedge.exe 84 PID 4480 wrote to memory of 208 4480 msedge.exe 84 PID 4480 wrote to memory of 208 4480 msedge.exe 84 PID 4480 wrote to memory of 208 4480 msedge.exe 84 PID 4480 wrote to memory of 208 4480 msedge.exe 84 PID 4480 wrote to memory of 208 4480 msedge.exe 84 PID 4480 wrote to memory of 208 4480 msedge.exe 84 PID 4480 wrote to memory of 208 4480 msedge.exe 84 PID 4480 wrote to memory of 208 4480 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a291b82a49a3a07f047b8bca8063c191_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9903a46f8,0x7ff9903a4708,0x7ff9903a47182⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,16304142229514372869,18336284969679170147,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,16304142229514372869,18336284969679170147,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,16304142229514372869,18336284969679170147,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16304142229514372869,18336284969679170147,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16304142229514372869,18336284969679170147,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:2648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,16304142229514372869,18336284969679170147,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5024 /prefetch:82⤵PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,16304142229514372869,18336284969679170147,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5024 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16304142229514372869,18336284969679170147,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16304142229514372869,18336284969679170147,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16304142229514372869,18336284969679170147,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3508 /prefetch:12⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16304142229514372869,18336284969679170147,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16304142229514372869,18336284969679170147,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3732 /prefetch:12⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16304142229514372869,18336284969679170147,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4392 /prefetch:12⤵PID:4704
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:740
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4340
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
264KB
MD5e461a369388303fd71dda9e5e887cc99
SHA1bafcfbbd8927ab6cf7322fa3a544d943148fc47d
SHA2563187bb5f264d9afab43532949ceb3b4b45d127962c92632f4b0c954286e00cd1
SHA5121a8bd4f4c527ec8cddd11791d5e6e7afdb6d2bdbe9410c907dad10ad9186c6e34a5eef08c14e94eabd0b55b82de9cc86598e7b347b0cef911f39c7d56cd2a620
-
Filesize
5KB
MD52eb8706394483e004eea790e87ea5937
SHA1a67ec50e4aafdbcede731ee8ebea8bf8aa9cb353
SHA2564baf42cae677397eb99b8f858370a96953bffc257c9a06e48017aa4894812ee7
SHA5123c1a040f38d6d5456456339ce19f2a22197317faf06530ab94643bd704fb8fcb66dfffc2d9b10f0950826fed972c2382b27e9fe6ed2a79c2fe10299804c3aa25
-
Filesize
6KB
MD52cbe9759093c70afc555430fa37cea82
SHA1f21abdd3bfb79966170909dbbc818938d7923aaf
SHA25685e84c0400d2ef19d1323362c4d447f0b6e19c4e53d4e62cefc2b96f1a758f39
SHA5123924c2bef26cb54dec6402a29eb7e706337719984865be40da89f3682fdd2294938d1a677c0b723957ec5976a117f18032cc31575158a9d1d5c249eb6d3437e4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD52c616bc110b356faa821bf6921213302
SHA1c58014cad320c39e65ea8ef30f7e277c0e53842b
SHA25664d3cace772ca79702089ff4354d9ae2172969a645bd0033650edee39e3f3ef8
SHA512652078a6f40716726f4558eabc0c38a030467ce34a3988b4f1c902e515eb02990483f4c919974466267920a818b6c9fa47d413287ade4cedea394eed8db7dd71
-
Filesize
9KB
MD5525af2dec055671678ac119c85c39a14
SHA1c4445bb1482ea8856d3fabed6994f89a76502808
SHA2568e1998658701e6455cac44bfbc8148df90989793faf1b93297ef828d3a2f282f
SHA5122737629b7dd007fbef85868b4724837e74706bea770ad350548b8769d7340bb65bebf6bfe70cc4b2f838628759cedec161664b32c0e2699b0265270770cac021