Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/06/2024, 23:23
Static task
static1
Behavioral task
behavioral1
Sample
a2e9df7694e2fd824376741a8cd9a58a_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
a2e9df7694e2fd824376741a8cd9a58a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a2e9df7694e2fd824376741a8cd9a58a_JaffaCakes118.html
-
Size
25KB
-
MD5
a2e9df7694e2fd824376741a8cd9a58a
-
SHA1
cbcba260f9b8f69b0a80ce4d6013f9f43e7a0822
-
SHA256
b27ccb833ac8225cc030f542c58716236a3ce219087f35a028d93fcb989337c9
-
SHA512
932cd1acf5fbfd1f2f3235405ccf7a7dc6f18ef01c6cd554d616ed064eb6910354bf7b7ed94042925e4f5f9cfeafa80cb9837020dfc085f01b22a8dc1df08952
-
SSDEEP
192:NkwqtjoGssab5n1FAh/E8NA1Yx0U3nQjLntQ/VonQie87n15nQOkrntbgn7nQTbP:OpoUvGQ/SleF9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3124 msedge.exe 3124 msedge.exe 3384 msedge.exe 3384 msedge.exe 4512 identity_helper.exe 4512 identity_helper.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3384 wrote to memory of 2680 3384 msedge.exe 81 PID 3384 wrote to memory of 2680 3384 msedge.exe 81 PID 3384 wrote to memory of 4476 3384 msedge.exe 82 PID 3384 wrote to memory of 4476 3384 msedge.exe 82 PID 3384 wrote to memory of 4476 3384 msedge.exe 82 PID 3384 wrote to memory of 4476 3384 msedge.exe 82 PID 3384 wrote to memory of 4476 3384 msedge.exe 82 PID 3384 wrote to memory of 4476 3384 msedge.exe 82 PID 3384 wrote to memory of 4476 3384 msedge.exe 82 PID 3384 wrote to memory of 4476 3384 msedge.exe 82 PID 3384 wrote to memory of 4476 3384 msedge.exe 82 PID 3384 wrote to memory of 4476 3384 msedge.exe 82 PID 3384 wrote to memory of 4476 3384 msedge.exe 82 PID 3384 wrote to memory of 4476 3384 msedge.exe 82 PID 3384 wrote to memory of 4476 3384 msedge.exe 82 PID 3384 wrote to memory of 4476 3384 msedge.exe 82 PID 3384 wrote to memory of 4476 3384 msedge.exe 82 PID 3384 wrote to memory of 4476 3384 msedge.exe 82 PID 3384 wrote to memory of 4476 3384 msedge.exe 82 PID 3384 wrote to memory of 4476 3384 msedge.exe 82 PID 3384 wrote to memory of 4476 3384 msedge.exe 82 PID 3384 wrote to memory of 4476 3384 msedge.exe 82 PID 3384 wrote to memory of 4476 3384 msedge.exe 82 PID 3384 wrote to memory of 4476 3384 msedge.exe 82 PID 3384 wrote to memory of 4476 3384 msedge.exe 82 PID 3384 wrote to memory of 4476 3384 msedge.exe 82 PID 3384 wrote to memory of 4476 3384 msedge.exe 82 PID 3384 wrote to memory of 4476 3384 msedge.exe 82 PID 3384 wrote to memory of 4476 3384 msedge.exe 82 PID 3384 wrote to memory of 4476 3384 msedge.exe 82 PID 3384 wrote to memory of 4476 3384 msedge.exe 82 PID 3384 wrote to memory of 4476 3384 msedge.exe 82 PID 3384 wrote to memory of 4476 3384 msedge.exe 82 PID 3384 wrote to memory of 4476 3384 msedge.exe 82 PID 3384 wrote to memory of 4476 3384 msedge.exe 82 PID 3384 wrote to memory of 4476 3384 msedge.exe 82 PID 3384 wrote to memory of 4476 3384 msedge.exe 82 PID 3384 wrote to memory of 4476 3384 msedge.exe 82 PID 3384 wrote to memory of 4476 3384 msedge.exe 82 PID 3384 wrote to memory of 4476 3384 msedge.exe 82 PID 3384 wrote to memory of 4476 3384 msedge.exe 82 PID 3384 wrote to memory of 4476 3384 msedge.exe 82 PID 3384 wrote to memory of 3124 3384 msedge.exe 83 PID 3384 wrote to memory of 3124 3384 msedge.exe 83 PID 3384 wrote to memory of 4320 3384 msedge.exe 84 PID 3384 wrote to memory of 4320 3384 msedge.exe 84 PID 3384 wrote to memory of 4320 3384 msedge.exe 84 PID 3384 wrote to memory of 4320 3384 msedge.exe 84 PID 3384 wrote to memory of 4320 3384 msedge.exe 84 PID 3384 wrote to memory of 4320 3384 msedge.exe 84 PID 3384 wrote to memory of 4320 3384 msedge.exe 84 PID 3384 wrote to memory of 4320 3384 msedge.exe 84 PID 3384 wrote to memory of 4320 3384 msedge.exe 84 PID 3384 wrote to memory of 4320 3384 msedge.exe 84 PID 3384 wrote to memory of 4320 3384 msedge.exe 84 PID 3384 wrote to memory of 4320 3384 msedge.exe 84 PID 3384 wrote to memory of 4320 3384 msedge.exe 84 PID 3384 wrote to memory of 4320 3384 msedge.exe 84 PID 3384 wrote to memory of 4320 3384 msedge.exe 84 PID 3384 wrote to memory of 4320 3384 msedge.exe 84 PID 3384 wrote to memory of 4320 3384 msedge.exe 84 PID 3384 wrote to memory of 4320 3384 msedge.exe 84 PID 3384 wrote to memory of 4320 3384 msedge.exe 84 PID 3384 wrote to memory of 4320 3384 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a2e9df7694e2fd824376741a8cd9a58a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff85d2746f8,0x7ff85d274708,0x7ff85d2747182⤵PID:2680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,3261677868468952199,9715084386997672234,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,3261677868468952199,9715084386997672234,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,3261677868468952199,9715084386997672234,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,3261677868468952199,9715084386997672234,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,3261677868468952199,9715084386997672234,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,3261677868468952199,9715084386997672234,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4360 /prefetch:82⤵PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,3261677868468952199,9715084386997672234,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4360 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,3261677868468952199,9715084386997672234,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,3261677868468952199,9715084386997672234,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,3261677868468952199,9715084386997672234,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,3261677868468952199,9715084386997672234,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,3261677868468952199,9715084386997672234,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1632
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4884
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
5KB
MD532e638cc18d0a7fca40fc235c21705e0
SHA1ed2a014a2c049a59341373259b560f3172d89013
SHA2568c067978c362d438994a3a01d59de8fce6c113bcc72eb93c25555b93b2f7006f
SHA51217115854ff18972dafc3cdea74233330f52c03ed49e17235b78a0682ff0123900ada2190ecf1d7f3369a2b196e220aa2b5f7dab0eb01b661396f9886ee9f9a09
-
Filesize
5KB
MD5d22787000afec6ccb22990c3658426e3
SHA16f769a5c9ff1d1f4b15e3c3f289c174749d45bc0
SHA2564aada83c2f65d9d108239cc199d2b6d44231a54460dfde30caf5dfe9d9c6136e
SHA5123759c0a576a582296e5676852a8d148d9671d224a35274ce8f2b4caf34eeace2c8940a6ded404519f17f3f7ba0adec9c777d1cc30987bacc9b3488e4b60617b8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD51bbb625d59c68de7c99f362fa17557b8
SHA1555a3ee8c42b10bfa602af5c434dd4df62355562
SHA2560da5ebc9f74f65baebe536ef030e6794b493eb978480d4efcd1985c06237e70a
SHA512cb20053ca45037b384d13d292f01c6be8125254576a68f0982b7d675ffcfd0f4e4d36b2ee17b38c1cda7f15ba42481ba16b07935ecd2bca2084ac5186e9986e1