Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
12-06-2024 14:47
Static task
static1
Behavioral task
behavioral1
Sample
a109ad48bf7744b1b1df1d34a95bf589_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a109ad48bf7744b1b1df1d34a95bf589_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a109ad48bf7744b1b1df1d34a95bf589_JaffaCakes118.html
-
Size
82KB
-
MD5
a109ad48bf7744b1b1df1d34a95bf589
-
SHA1
5bc3f6a043956eb51dc3023fa257b1ab633c75e6
-
SHA256
742c2afdd87d678e561b66b75df8f57e74150a46f8b4d0d87cacd5d14564c4fb
-
SHA512
e153f0302eaf0676fb7c1fe2aeb6f0258bb290375f7b8cc2406f2eea8a8aecda2ece7e3b3ffce881d1ef0bf6d3032b9e9e81ad6c1915318e756688a8444d5c48
-
SSDEEP
1536:SaD9wdctvD9GdcOtKDscRAyI/sR2Q0X1DftqnQblwQRXimCVFPBL4+9h2cNOFPvf:SWQHwQ2LW7YXCxb
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1840 msedge.exe 1840 msedge.exe 4136 msedge.exe 4136 msedge.exe 2264 identity_helper.exe 2264 identity_helper.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4136 wrote to memory of 4808 4136 msedge.exe 80 PID 4136 wrote to memory of 4808 4136 msedge.exe 80 PID 4136 wrote to memory of 4540 4136 msedge.exe 81 PID 4136 wrote to memory of 4540 4136 msedge.exe 81 PID 4136 wrote to memory of 4540 4136 msedge.exe 81 PID 4136 wrote to memory of 4540 4136 msedge.exe 81 PID 4136 wrote to memory of 4540 4136 msedge.exe 81 PID 4136 wrote to memory of 4540 4136 msedge.exe 81 PID 4136 wrote to memory of 4540 4136 msedge.exe 81 PID 4136 wrote to memory of 4540 4136 msedge.exe 81 PID 4136 wrote to memory of 4540 4136 msedge.exe 81 PID 4136 wrote to memory of 4540 4136 msedge.exe 81 PID 4136 wrote to memory of 4540 4136 msedge.exe 81 PID 4136 wrote to memory of 4540 4136 msedge.exe 81 PID 4136 wrote to memory of 4540 4136 msedge.exe 81 PID 4136 wrote to memory of 4540 4136 msedge.exe 81 PID 4136 wrote to memory of 4540 4136 msedge.exe 81 PID 4136 wrote to memory of 4540 4136 msedge.exe 81 PID 4136 wrote to memory of 4540 4136 msedge.exe 81 PID 4136 wrote to memory of 4540 4136 msedge.exe 81 PID 4136 wrote to memory of 4540 4136 msedge.exe 81 PID 4136 wrote to memory of 4540 4136 msedge.exe 81 PID 4136 wrote to memory of 4540 4136 msedge.exe 81 PID 4136 wrote to memory of 4540 4136 msedge.exe 81 PID 4136 wrote to memory of 4540 4136 msedge.exe 81 PID 4136 wrote to memory of 4540 4136 msedge.exe 81 PID 4136 wrote to memory of 4540 4136 msedge.exe 81 PID 4136 wrote to memory of 4540 4136 msedge.exe 81 PID 4136 wrote to memory of 4540 4136 msedge.exe 81 PID 4136 wrote to memory of 4540 4136 msedge.exe 81 PID 4136 wrote to memory of 4540 4136 msedge.exe 81 PID 4136 wrote to memory of 4540 4136 msedge.exe 81 PID 4136 wrote to memory of 4540 4136 msedge.exe 81 PID 4136 wrote to memory of 4540 4136 msedge.exe 81 PID 4136 wrote to memory of 4540 4136 msedge.exe 81 PID 4136 wrote to memory of 4540 4136 msedge.exe 81 PID 4136 wrote to memory of 4540 4136 msedge.exe 81 PID 4136 wrote to memory of 4540 4136 msedge.exe 81 PID 4136 wrote to memory of 4540 4136 msedge.exe 81 PID 4136 wrote to memory of 4540 4136 msedge.exe 81 PID 4136 wrote to memory of 4540 4136 msedge.exe 81 PID 4136 wrote to memory of 4540 4136 msedge.exe 81 PID 4136 wrote to memory of 1840 4136 msedge.exe 82 PID 4136 wrote to memory of 1840 4136 msedge.exe 82 PID 4136 wrote to memory of 2812 4136 msedge.exe 83 PID 4136 wrote to memory of 2812 4136 msedge.exe 83 PID 4136 wrote to memory of 2812 4136 msedge.exe 83 PID 4136 wrote to memory of 2812 4136 msedge.exe 83 PID 4136 wrote to memory of 2812 4136 msedge.exe 83 PID 4136 wrote to memory of 2812 4136 msedge.exe 83 PID 4136 wrote to memory of 2812 4136 msedge.exe 83 PID 4136 wrote to memory of 2812 4136 msedge.exe 83 PID 4136 wrote to memory of 2812 4136 msedge.exe 83 PID 4136 wrote to memory of 2812 4136 msedge.exe 83 PID 4136 wrote to memory of 2812 4136 msedge.exe 83 PID 4136 wrote to memory of 2812 4136 msedge.exe 83 PID 4136 wrote to memory of 2812 4136 msedge.exe 83 PID 4136 wrote to memory of 2812 4136 msedge.exe 83 PID 4136 wrote to memory of 2812 4136 msedge.exe 83 PID 4136 wrote to memory of 2812 4136 msedge.exe 83 PID 4136 wrote to memory of 2812 4136 msedge.exe 83 PID 4136 wrote to memory of 2812 4136 msedge.exe 83 PID 4136 wrote to memory of 2812 4136 msedge.exe 83 PID 4136 wrote to memory of 2812 4136 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a109ad48bf7744b1b1df1d34a95bf589_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8ec6f46f8,0x7ff8ec6f4708,0x7ff8ec6f47182⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,11020957686297799295,157352675068623726,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,11020957686297799295,157352675068623726,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2464 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,11020957686297799295,157352675068623726,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:2812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11020957686297799295,157352675068623726,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11020957686297799295,157352675068623726,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,11020957686297799295,157352675068623726,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5904 /prefetch:82⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,11020957686297799295,157352675068623726,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5904 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11020957686297799295,157352675068623726,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11020957686297799295,157352675068623726,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11020957686297799295,157352675068623726,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4136 /prefetch:12⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11020957686297799295,157352675068623726,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5876 /prefetch:12⤵PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,11020957686297799295,157352675068623726,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1564
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2712
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dabfafd78687947a9de64dd5b776d25f
SHA116084c74980dbad713f9d332091985808b436dea
SHA256c7658f407cbe799282ef202e78319e489ed4e48e23f6d056b505bc0d73e34201
SHA512dae1de5245cd9b72117c430250aa2029eb8df1b85dc414ac50152d8eba4d100bcf0320ac18446f865dc96949f8b06a5b9e7a0c84f9c1b0eada318e80f99f9d2b
-
Filesize
152B
MD5c39b3aa574c0c938c80eb263bb450311
SHA1f4d11275b63f4f906be7a55ec6ca050c62c18c88
SHA25666f8d413a30451055d4b6fa40e007197a4bb93a66a28ca4112967ec417ffab6c
SHA512eeca2e21cd4d66835beb9812e26344c8695584253af397b06f378536ca797c3906a670ed239631729c96ebb93acfb16327cf58d517e83fb8923881c5fdb6d232
-
Filesize
6KB
MD583cc2e274d666fb84528a8e203b5e5c0
SHA1250da4b55381817c8b717de6507821113462ec89
SHA256ab59229e489c1c05f1aee3f4665bf28d7a6984a873bfd4bf4808d6a64be2560d
SHA5128402d0f4d3fde4b8d707806566a0d2b46f088a86510813d79a75ec15d911ff3b4df73ef8bc9938b17520b60444f281a07c9f05dc27762996aad7572cbf596eaf
-
Filesize
6KB
MD560290923ac44cc50eae46c899b6a90f3
SHA175d83da69a0e64205543eeaa6a66ddd01d873fa3
SHA256d3f407643ed16020fa2b86ab7d183a8a11d622216b20afb85f0d62e54698c380
SHA512b6bf9fe174674d6220bffbff0dc0f00ed003dc8b1eaa0e0f3ead8abafdb42d0c62d33631ffdd084b19858b7076b840a6d822a61f49efc85d46470b2acd0f663d
-
Filesize
6KB
MD5e1c060d55a818cb4cb40f22fe67fe194
SHA1b968d769c9d5e14ae3424765f512b6f3fc6e285e
SHA256ca773f5615968ec92d6b58c9e1f2686d713056597721d9bc3fe4a5715f5c1cca
SHA512547f50fbf66ca442eb3d27552e6b291fc825ad38e63d3831aa86f85324e1a4da7c697c362d4ed8ffc266fa1c1fc06891597f4f0eace78d92829905c74d07b31e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD501f23560016d4ee7c70e2dd86d562e77
SHA16d68c9d287186c5232e24b50636b952f6b17c88c
SHA256703422e16ca3da8785adda7dc409a6de5cbc4b5f7a77f9f8d4759419289c02bb
SHA512fbe4b729c272316c5980b9bd19b9ea1f242181f86631b28f26aaebd8dc5b97f31c2ad70449cd867206e2c2f890e7a3c03e69777a3b2c77c63837bc518cc6ce0b