Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/06/2024, 14:42
Static task
static1
Behavioral task
behavioral1
Sample
a1069f2001c41fed2a6177ea263bfb77_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a1069f2001c41fed2a6177ea263bfb77_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a1069f2001c41fed2a6177ea263bfb77_JaffaCakes118.html
-
Size
42KB
-
MD5
a1069f2001c41fed2a6177ea263bfb77
-
SHA1
5b7dabd33f95fc0d2e9028b802ec09a9cd5c1367
-
SHA256
61f2aa8c8e92f2f67c317c71b9d84e1d882f226059b42977b9162d320a0b2b1f
-
SHA512
2ed0caaf5f715add729dd8e90be239cadc09913eccf263884b030c7fc4660320e49ade83f981c157762cbadc10a85fcc8b7998ee21eac36bd60fdee778a88d5b
-
SSDEEP
768:cYbEwdpOT+2zJ+2l4f/ukig3ln5iIqQOx5+k9I4N5T:NbEwdpOZzQ2e5lk9I4vT
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 1836 msedge.exe 1836 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4556 identity_helper.exe 4556 identity_helper.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4808 wrote to memory of 2772 4808 msedge.exe 82 PID 4808 wrote to memory of 2772 4808 msedge.exe 82 PID 4808 wrote to memory of 2640 4808 msedge.exe 83 PID 4808 wrote to memory of 2640 4808 msedge.exe 83 PID 4808 wrote to memory of 2640 4808 msedge.exe 83 PID 4808 wrote to memory of 2640 4808 msedge.exe 83 PID 4808 wrote to memory of 2640 4808 msedge.exe 83 PID 4808 wrote to memory of 2640 4808 msedge.exe 83 PID 4808 wrote to memory of 2640 4808 msedge.exe 83 PID 4808 wrote to memory of 2640 4808 msedge.exe 83 PID 4808 wrote to memory of 2640 4808 msedge.exe 83 PID 4808 wrote to memory of 2640 4808 msedge.exe 83 PID 4808 wrote to memory of 2640 4808 msedge.exe 83 PID 4808 wrote to memory of 2640 4808 msedge.exe 83 PID 4808 wrote to memory of 2640 4808 msedge.exe 83 PID 4808 wrote to memory of 2640 4808 msedge.exe 83 PID 4808 wrote to memory of 2640 4808 msedge.exe 83 PID 4808 wrote to memory of 2640 4808 msedge.exe 83 PID 4808 wrote to memory of 2640 4808 msedge.exe 83 PID 4808 wrote to memory of 2640 4808 msedge.exe 83 PID 4808 wrote to memory of 2640 4808 msedge.exe 83 PID 4808 wrote to memory of 2640 4808 msedge.exe 83 PID 4808 wrote to memory of 2640 4808 msedge.exe 83 PID 4808 wrote to memory of 2640 4808 msedge.exe 83 PID 4808 wrote to memory of 2640 4808 msedge.exe 83 PID 4808 wrote to memory of 2640 4808 msedge.exe 83 PID 4808 wrote to memory of 2640 4808 msedge.exe 83 PID 4808 wrote to memory of 2640 4808 msedge.exe 83 PID 4808 wrote to memory of 2640 4808 msedge.exe 83 PID 4808 wrote to memory of 2640 4808 msedge.exe 83 PID 4808 wrote to memory of 2640 4808 msedge.exe 83 PID 4808 wrote to memory of 2640 4808 msedge.exe 83 PID 4808 wrote to memory of 2640 4808 msedge.exe 83 PID 4808 wrote to memory of 2640 4808 msedge.exe 83 PID 4808 wrote to memory of 2640 4808 msedge.exe 83 PID 4808 wrote to memory of 2640 4808 msedge.exe 83 PID 4808 wrote to memory of 2640 4808 msedge.exe 83 PID 4808 wrote to memory of 2640 4808 msedge.exe 83 PID 4808 wrote to memory of 2640 4808 msedge.exe 83 PID 4808 wrote to memory of 2640 4808 msedge.exe 83 PID 4808 wrote to memory of 2640 4808 msedge.exe 83 PID 4808 wrote to memory of 2640 4808 msedge.exe 83 PID 4808 wrote to memory of 1836 4808 msedge.exe 84 PID 4808 wrote to memory of 1836 4808 msedge.exe 84 PID 4808 wrote to memory of 1964 4808 msedge.exe 85 PID 4808 wrote to memory of 1964 4808 msedge.exe 85 PID 4808 wrote to memory of 1964 4808 msedge.exe 85 PID 4808 wrote to memory of 1964 4808 msedge.exe 85 PID 4808 wrote to memory of 1964 4808 msedge.exe 85 PID 4808 wrote to memory of 1964 4808 msedge.exe 85 PID 4808 wrote to memory of 1964 4808 msedge.exe 85 PID 4808 wrote to memory of 1964 4808 msedge.exe 85 PID 4808 wrote to memory of 1964 4808 msedge.exe 85 PID 4808 wrote to memory of 1964 4808 msedge.exe 85 PID 4808 wrote to memory of 1964 4808 msedge.exe 85 PID 4808 wrote to memory of 1964 4808 msedge.exe 85 PID 4808 wrote to memory of 1964 4808 msedge.exe 85 PID 4808 wrote to memory of 1964 4808 msedge.exe 85 PID 4808 wrote to memory of 1964 4808 msedge.exe 85 PID 4808 wrote to memory of 1964 4808 msedge.exe 85 PID 4808 wrote to memory of 1964 4808 msedge.exe 85 PID 4808 wrote to memory of 1964 4808 msedge.exe 85 PID 4808 wrote to memory of 1964 4808 msedge.exe 85 PID 4808 wrote to memory of 1964 4808 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a1069f2001c41fed2a6177ea263bfb77_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdbd5146f8,0x7ffdbd514708,0x7ffdbd5147182⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,16215818386282057096,8048941750955098015,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,16215818386282057096,8048941750955098015,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,16215818386282057096,8048941750955098015,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:82⤵PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16215818386282057096,8048941750955098015,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16215818386282057096,8048941750955098015,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,16215818386282057096,8048941750955098015,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4968 /prefetch:82⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,16215818386282057096,8048941750955098015,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4968 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16215818386282057096,8048941750955098015,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4680 /prefetch:12⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16215818386282057096,8048941750955098015,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16215818386282057096,8048941750955098015,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16215818386282057096,8048941750955098015,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:3304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,16215818386282057096,8048941750955098015,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1836 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3104
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:928
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
5KB
MD5ef3dbf84b6afa29e46eef1165b044fd3
SHA17aa30dfb0f479e143b36f504ea93816bfd1d3941
SHA2568e305dbac210499e2f608cdf692b12b2a8932d8eedb1b9da01517b4aca77732e
SHA512a15f1d24b0fb77e797f8684ff4d877167deb4a99e121e3d7c415e3e42ef8f2fb77f2079cb3fc4f52a1d81f711fcc25c13d73f46c1d6a09563387d1ae2c38b363
-
Filesize
6KB
MD508096e4b75e88576003c7b1de16b90e6
SHA1402cba30dc57dbd62bc73cd098db90d21e3b36b2
SHA25696e55a0753f7cf721bf0a5c24ec5eb2314ffda6d09b8807f99b9b2d299136067
SHA51203b2f5fa55d4fe0e1e82b211c46616712f7c421a2bdad1c94cd9fa704095cadd6d22e8bba7dc3f12b0b56ec04adfc9640816a0afa931306521746aed1fb9ca5f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD56a9034766ab1f49ba2ac431b56175737
SHA17b1b7521f2e85fc827b096599385415d79f01f1b
SHA256f107d450d160930b49bdbd7d34a3d3d827a640b60b0e75bcce6808806451acfb
SHA512075dee674993779d9f7023173b8c44f948bec5dd794f5bc762e3beef4bd850d73f30db883392d2dfb1d6cb8d27692db20febb3af530919d1eff485deb47c2a94