Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
12-06-2024 12:16
Static task
static1
Behavioral task
behavioral1
Sample
a0a338a19bd2c7f8ff9dff69c6799230_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a0a338a19bd2c7f8ff9dff69c6799230_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a0a338a19bd2c7f8ff9dff69c6799230_JaffaCakes118.html
-
Size
31KB
-
MD5
a0a338a19bd2c7f8ff9dff69c6799230
-
SHA1
e3be03202bbb87b29271075734820277137aec74
-
SHA256
ff35b97e520ae47ac36f3310e4f70bb8cef2da011f6fb82e9fa09c5e975a3535
-
SHA512
a372c64577936ddf291fc505125332b4abbcff9c5deaf2757bdae4dca3f05f43ab30e44df0ac0e6b73316cc39c0c6673fc69bc97a10ee102d116a3e4edb5b50b
-
SSDEEP
384:Sw+sDDaKQp6O5POFR/yhrsaBVVKKYbKfIRMs7z5qe1H:SpsiwR/yhrsaTBYqsZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1548 msedge.exe 1548 msedge.exe 3924 msedge.exe 3924 msedge.exe 1208 identity_helper.exe 1208 identity_helper.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3924 wrote to memory of 2676 3924 msedge.exe 80 PID 3924 wrote to memory of 2676 3924 msedge.exe 80 PID 3924 wrote to memory of 1028 3924 msedge.exe 82 PID 3924 wrote to memory of 1028 3924 msedge.exe 82 PID 3924 wrote to memory of 1028 3924 msedge.exe 82 PID 3924 wrote to memory of 1028 3924 msedge.exe 82 PID 3924 wrote to memory of 1028 3924 msedge.exe 82 PID 3924 wrote to memory of 1028 3924 msedge.exe 82 PID 3924 wrote to memory of 1028 3924 msedge.exe 82 PID 3924 wrote to memory of 1028 3924 msedge.exe 82 PID 3924 wrote to memory of 1028 3924 msedge.exe 82 PID 3924 wrote to memory of 1028 3924 msedge.exe 82 PID 3924 wrote to memory of 1028 3924 msedge.exe 82 PID 3924 wrote to memory of 1028 3924 msedge.exe 82 PID 3924 wrote to memory of 1028 3924 msedge.exe 82 PID 3924 wrote to memory of 1028 3924 msedge.exe 82 PID 3924 wrote to memory of 1028 3924 msedge.exe 82 PID 3924 wrote to memory of 1028 3924 msedge.exe 82 PID 3924 wrote to memory of 1028 3924 msedge.exe 82 PID 3924 wrote to memory of 1028 3924 msedge.exe 82 PID 3924 wrote to memory of 1028 3924 msedge.exe 82 PID 3924 wrote to memory of 1028 3924 msedge.exe 82 PID 3924 wrote to memory of 1028 3924 msedge.exe 82 PID 3924 wrote to memory of 1028 3924 msedge.exe 82 PID 3924 wrote to memory of 1028 3924 msedge.exe 82 PID 3924 wrote to memory of 1028 3924 msedge.exe 82 PID 3924 wrote to memory of 1028 3924 msedge.exe 82 PID 3924 wrote to memory of 1028 3924 msedge.exe 82 PID 3924 wrote to memory of 1028 3924 msedge.exe 82 PID 3924 wrote to memory of 1028 3924 msedge.exe 82 PID 3924 wrote to memory of 1028 3924 msedge.exe 82 PID 3924 wrote to memory of 1028 3924 msedge.exe 82 PID 3924 wrote to memory of 1028 3924 msedge.exe 82 PID 3924 wrote to memory of 1028 3924 msedge.exe 82 PID 3924 wrote to memory of 1028 3924 msedge.exe 82 PID 3924 wrote to memory of 1028 3924 msedge.exe 82 PID 3924 wrote to memory of 1028 3924 msedge.exe 82 PID 3924 wrote to memory of 1028 3924 msedge.exe 82 PID 3924 wrote to memory of 1028 3924 msedge.exe 82 PID 3924 wrote to memory of 1028 3924 msedge.exe 82 PID 3924 wrote to memory of 1028 3924 msedge.exe 82 PID 3924 wrote to memory of 1028 3924 msedge.exe 82 PID 3924 wrote to memory of 1548 3924 msedge.exe 83 PID 3924 wrote to memory of 1548 3924 msedge.exe 83 PID 3924 wrote to memory of 1956 3924 msedge.exe 84 PID 3924 wrote to memory of 1956 3924 msedge.exe 84 PID 3924 wrote to memory of 1956 3924 msedge.exe 84 PID 3924 wrote to memory of 1956 3924 msedge.exe 84 PID 3924 wrote to memory of 1956 3924 msedge.exe 84 PID 3924 wrote to memory of 1956 3924 msedge.exe 84 PID 3924 wrote to memory of 1956 3924 msedge.exe 84 PID 3924 wrote to memory of 1956 3924 msedge.exe 84 PID 3924 wrote to memory of 1956 3924 msedge.exe 84 PID 3924 wrote to memory of 1956 3924 msedge.exe 84 PID 3924 wrote to memory of 1956 3924 msedge.exe 84 PID 3924 wrote to memory of 1956 3924 msedge.exe 84 PID 3924 wrote to memory of 1956 3924 msedge.exe 84 PID 3924 wrote to memory of 1956 3924 msedge.exe 84 PID 3924 wrote to memory of 1956 3924 msedge.exe 84 PID 3924 wrote to memory of 1956 3924 msedge.exe 84 PID 3924 wrote to memory of 1956 3924 msedge.exe 84 PID 3924 wrote to memory of 1956 3924 msedge.exe 84 PID 3924 wrote to memory of 1956 3924 msedge.exe 84 PID 3924 wrote to memory of 1956 3924 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a0a338a19bd2c7f8ff9dff69c6799230_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff896dd46f8,0x7ff896dd4708,0x7ff896dd47182⤵PID:2676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,15883797276472472091,8039352010345300046,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,15883797276472472091,8039352010345300046,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2472 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,15883797276472472091,8039352010345300046,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,15883797276472472091,8039352010345300046,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,15883797276472472091,8039352010345300046,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,15883797276472472091,8039352010345300046,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5884 /prefetch:82⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,15883797276472472091,8039352010345300046,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5884 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,15883797276472472091,8039352010345300046,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:3280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,15883797276472472091,8039352010345300046,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,15883797276472472091,8039352010345300046,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:12⤵PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,15883797276472472091,8039352010345300046,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3484 /prefetch:12⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,15883797276472472091,8039352010345300046,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3080 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1924
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:780
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c5abc082d9d9307e797b7e89a2f755f4
SHA154c442690a8727f1d3453b6452198d3ec4ec13df
SHA256a055d69c6aba59e97e632d118b7960a5fdfbe35cfdfaa0de14f194fc6f874716
SHA512ad765cddbf89472988de5356db5e0ee254ca3475491c6034fba1897c373702ab7cfa4bd21662ab862eebb48a757c3eb86b1f8ed58629751f71863822a59cd26c
-
Filesize
152B
MD5b4a74bc775caf3de7fc9cde3c30ce482
SHA1c6ed3161390e5493f71182a6cb98d51c9063775d
SHA256dfad4e020a946f85523604816a0a9781091ee4669c870db2cabab027f8b6f280
SHA51255578e254444a645f455ea38480c9e02599ebf9522c32aca50ff37aad33976db30e663d35ebe31ff0ecafb4007362261716f756b3a0d67ac3937ca62ff10e25f
-
Filesize
579B
MD5d690d71bb057781e17c37049ac01bab5
SHA149993b9d910a4e59dcda153c3e1d2f31d19af873
SHA256e787d8fb0b2eafc8d431e5c1c203902ed7fc12e21c66feebb218e03f3f61b0ff
SHA512991259c2d4d0e4c4c4b75eb04396461c1e7a2ff5ca870c7e849d8a9ac61cc7d55988a02e2a2a63084aaca475b62945427b0115ff44345e2652a53917e469cfaf
-
Filesize
6KB
MD5f2f24ff89565cc01b23b457ed3b99f45
SHA1f819c180f2fcbdba56985fd2299e71c08cdb6f43
SHA25651603e83b0f5256dac721487c3fe3c511125108f543d8f3c94293b5b8f45fdb2
SHA512946befb50debeeb5cad6374fabc61c8a6d643f7c2bd6948bdfbd0e3a5a5ffacac84b7dce5522cedcfa42e7417f134c012d1b8cf9d835b6f6fcd55670ea50c1e2
-
Filesize
6KB
MD5337e87ef4e38cabfaa993798dcbbfcb3
SHA1fc9721de8807bbfbe1e3c070306f1dbf40a52c8c
SHA256f6c4e4cb9b188dd3f4ecdbf5134466086dec78c88329433374a7255626343ef6
SHA512d6af06d3eeeef5c122d0fca52867239259773f0043aea6095c1cad35298a9675e590d0c63d844ecc869ddad2acc080be79ed35e183f37e86cea809d3b0823244
-
Filesize
6KB
MD5dceb52732bc6584b77f8497ac113618e
SHA183b816f90a581aef60b34eff04ca5ffcdca48639
SHA25636b268152848804317c1300356374c4e57d7aaa87bb611061745c8c3d6b56637
SHA512e123f5ebf3b93526248059226a7b0ca7d94b9d92aba9e13e713ac329d2c7c6047687c1780f150a5b7f5becc5116557d8be922a7c0a56aeed9c17998b35214200
-
Filesize
372B
MD54a18356207bef710f7aa7583f9ff8810
SHA100bcfe3a947d0ead110dca5e8b63b027075674a1
SHA2567ad22172d93424f43564518d39cfcefb6ecfc1afd6bae37c90117e10c081fde9
SHA512c0c969bf26cb5b4f37dae479801a7141303579651b1b10852f5fb7f5dd201f651d6ba0eedf67204df5ae784cd3b91930427a4f3dbe375c6ce6c2c8efdf05f818
-
Filesize
372B
MD55783526da89002d521ce9cf6509d9711
SHA1588ad58350fba4086822e8e6741e35fec2c17316
SHA256ab81645878d94c1bc58cc84fadaf90ea2cfe0ae9f1767412abea9f61b73c5896
SHA512a03f642958d605e7117881ffeed6e800dd5dc81daee1980e1d7bfd98db9177f447c597667671096a9e2ae016c5aa8680449fc862ab952f61063aecc014de3c8a
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD524beee283e47d3dcf8c90f511f51e98c
SHA1c236034b38438b1cd392169e3a2add26cb92f9a8
SHA2561cad773ef1b6077bcadf92490c4f2f227b4c47e7853870ceffa5fddf56269f67
SHA512148f3dbc3f76ceb91ad8c2126edf573a38781a0b39779dc5874d961e11adb8c666a6fa0afff1977022d8c8c0f206b694929a1db5958e638b2a712652c0ab0371