Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/06/2024, 14:08
Static task
static1
Behavioral task
behavioral1
Sample
a0f1048c1227e9d7c6eec08c7d826e9f_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a0f1048c1227e9d7c6eec08c7d826e9f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a0f1048c1227e9d7c6eec08c7d826e9f_JaffaCakes118.html
-
Size
32KB
-
MD5
a0f1048c1227e9d7c6eec08c7d826e9f
-
SHA1
b82540b64b6a1ff5d8300c7680488e6b519a6a67
-
SHA256
1ce7555616498c4f0cd15c958d9269451dd2fe67bd7c5cf423d491753fc236bb
-
SHA512
d113de40f76ef570bb190c44b151d8b91d4722254d1461c078e10b1f334d8c9dcff2f4c056ab0faacd13a760c8969e47a777b5d9b31c24bce8ca347976e874c0
-
SSDEEP
768:wFKbb1bhaTb2vb+DOXY/Z9bkfYzUkzoGeW01Js4J1YAX2VgZuP:wFK1taTSqDOXYf4fYzUkzU8GZGaEP
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4000 msedge.exe 4000 msedge.exe 3440 msedge.exe 3440 msedge.exe 3284 identity_helper.exe 3284 identity_helper.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3440 wrote to memory of 1300 3440 msedge.exe 82 PID 3440 wrote to memory of 1300 3440 msedge.exe 82 PID 3440 wrote to memory of 60 3440 msedge.exe 83 PID 3440 wrote to memory of 60 3440 msedge.exe 83 PID 3440 wrote to memory of 60 3440 msedge.exe 83 PID 3440 wrote to memory of 60 3440 msedge.exe 83 PID 3440 wrote to memory of 60 3440 msedge.exe 83 PID 3440 wrote to memory of 60 3440 msedge.exe 83 PID 3440 wrote to memory of 60 3440 msedge.exe 83 PID 3440 wrote to memory of 60 3440 msedge.exe 83 PID 3440 wrote to memory of 60 3440 msedge.exe 83 PID 3440 wrote to memory of 60 3440 msedge.exe 83 PID 3440 wrote to memory of 60 3440 msedge.exe 83 PID 3440 wrote to memory of 60 3440 msedge.exe 83 PID 3440 wrote to memory of 60 3440 msedge.exe 83 PID 3440 wrote to memory of 60 3440 msedge.exe 83 PID 3440 wrote to memory of 60 3440 msedge.exe 83 PID 3440 wrote to memory of 60 3440 msedge.exe 83 PID 3440 wrote to memory of 60 3440 msedge.exe 83 PID 3440 wrote to memory of 60 3440 msedge.exe 83 PID 3440 wrote to memory of 60 3440 msedge.exe 83 PID 3440 wrote to memory of 60 3440 msedge.exe 83 PID 3440 wrote to memory of 60 3440 msedge.exe 83 PID 3440 wrote to memory of 60 3440 msedge.exe 83 PID 3440 wrote to memory of 60 3440 msedge.exe 83 PID 3440 wrote to memory of 60 3440 msedge.exe 83 PID 3440 wrote to memory of 60 3440 msedge.exe 83 PID 3440 wrote to memory of 60 3440 msedge.exe 83 PID 3440 wrote to memory of 60 3440 msedge.exe 83 PID 3440 wrote to memory of 60 3440 msedge.exe 83 PID 3440 wrote to memory of 60 3440 msedge.exe 83 PID 3440 wrote to memory of 60 3440 msedge.exe 83 PID 3440 wrote to memory of 60 3440 msedge.exe 83 PID 3440 wrote to memory of 60 3440 msedge.exe 83 PID 3440 wrote to memory of 60 3440 msedge.exe 83 PID 3440 wrote to memory of 60 3440 msedge.exe 83 PID 3440 wrote to memory of 60 3440 msedge.exe 83 PID 3440 wrote to memory of 60 3440 msedge.exe 83 PID 3440 wrote to memory of 60 3440 msedge.exe 83 PID 3440 wrote to memory of 60 3440 msedge.exe 83 PID 3440 wrote to memory of 60 3440 msedge.exe 83 PID 3440 wrote to memory of 60 3440 msedge.exe 83 PID 3440 wrote to memory of 4000 3440 msedge.exe 84 PID 3440 wrote to memory of 4000 3440 msedge.exe 84 PID 3440 wrote to memory of 5080 3440 msedge.exe 85 PID 3440 wrote to memory of 5080 3440 msedge.exe 85 PID 3440 wrote to memory of 5080 3440 msedge.exe 85 PID 3440 wrote to memory of 5080 3440 msedge.exe 85 PID 3440 wrote to memory of 5080 3440 msedge.exe 85 PID 3440 wrote to memory of 5080 3440 msedge.exe 85 PID 3440 wrote to memory of 5080 3440 msedge.exe 85 PID 3440 wrote to memory of 5080 3440 msedge.exe 85 PID 3440 wrote to memory of 5080 3440 msedge.exe 85 PID 3440 wrote to memory of 5080 3440 msedge.exe 85 PID 3440 wrote to memory of 5080 3440 msedge.exe 85 PID 3440 wrote to memory of 5080 3440 msedge.exe 85 PID 3440 wrote to memory of 5080 3440 msedge.exe 85 PID 3440 wrote to memory of 5080 3440 msedge.exe 85 PID 3440 wrote to memory of 5080 3440 msedge.exe 85 PID 3440 wrote to memory of 5080 3440 msedge.exe 85 PID 3440 wrote to memory of 5080 3440 msedge.exe 85 PID 3440 wrote to memory of 5080 3440 msedge.exe 85 PID 3440 wrote to memory of 5080 3440 msedge.exe 85 PID 3440 wrote to memory of 5080 3440 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a0f1048c1227e9d7c6eec08c7d826e9f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdf58f46f8,0x7ffdf58f4708,0x7ffdf58f47182⤵PID:1300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,4543898109987233673,1629308909504672775,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,4543898109987233673,1629308909504672775,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2352 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,4543898109987233673,1629308909504672775,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4543898109987233673,1629308909504672775,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4543898109987233673,1629308909504672775,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,4543898109987233673,1629308909504672775,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4812 /prefetch:82⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,4543898109987233673,1629308909504672775,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4812 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4543898109987233673,1629308909504672775,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4543898109987233673,1629308909504672775,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4580 /prefetch:12⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4543898109987233673,1629308909504672775,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4196 /prefetch:12⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4543898109987233673,1629308909504672775,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,4543898109987233673,1629308909504672775,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4228 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1496
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4672
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD595be48491c70ec9254300564280e7ad6
SHA1bb4335c540de588c4fe5ceb9d5dbb53a48d72005
SHA2568041532743a6424693d988582ee63e40b272379746a52d397aaee62ae9740427
SHA51213fdaa78227d5a889d5633ad6ca04b6130901516f4f8f78d452f67b400bb8ed03146d3354524e6d4c1e2c987e6191a69333b04be8a2c6571b2ceb971db8fb76c
-
Filesize
6KB
MD5f5c8bcb5a15aec80893a4510c99aeb1a
SHA1f95859e0065197dd00b6f40e031e36c77c97efb9
SHA256474463793f511bd31071deeb1d6b721449610317257053a710a4f3b8295ca8a7
SHA512f830ee26ae42c6ab03137549ab5e7c55cc28ad24cecbde6163fd3f6a00a3a15449392955e0b0986052f60fd19ab4b0ef39f229bd04f6a7f02f6536d447e18058
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD548fc0451eacbdd1da66929c3d6f76efb
SHA13f0b84d5c49140d42289c0b833a9f7730c66c247
SHA2564e5e31cb4b33b1e374a95f1752874cf012e4cfd87ab995202c632bf111007c20
SHA5121d1a2aedca4052e08aafd431eeeb5238a38245cef4b4886f4e71845a00edec38ee2d5dcfa353a723fb2dd88bedda7898cdba5c9e91c4b236d41e68efcce2222d