Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
12/06/2024, 15:43
Static task
static1
Behavioral task
behavioral1
Sample
a132b4bb2774ca50f9b3092c8708d9d4_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a132b4bb2774ca50f9b3092c8708d9d4_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a132b4bb2774ca50f9b3092c8708d9d4_JaffaCakes118.html
-
Size
33KB
-
MD5
a132b4bb2774ca50f9b3092c8708d9d4
-
SHA1
3ff69491a2c391a1f06f3d9583e3aa61e70cd8a1
-
SHA256
0b68cf82d7657a1c7ebe028e0ad3979c2931e5934e9346f5d3f400b51f970a30
-
SHA512
dc4a0f8494feef2277a33f67b3e4533f8d18f977f466a20e3c83aad603c3ef5f63ecbe8f9b11e7166092665b59b25f17d7a82eb5fb3d5d6796fe0e83f3029eab
-
SSDEEP
384:jfwJEh7SdHEGRtzPaB4BwPtqkRPaZ0PdxfJ0PkoVMG:jfwJJPRtPLkCeRnCR
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5084 msedge.exe 5084 msedge.exe 2384 msedge.exe 2384 msedge.exe 3060 identity_helper.exe 3060 identity_helper.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2384 wrote to memory of 520 2384 msedge.exe 80 PID 2384 wrote to memory of 520 2384 msedge.exe 80 PID 2384 wrote to memory of 4368 2384 msedge.exe 82 PID 2384 wrote to memory of 4368 2384 msedge.exe 82 PID 2384 wrote to memory of 4368 2384 msedge.exe 82 PID 2384 wrote to memory of 4368 2384 msedge.exe 82 PID 2384 wrote to memory of 4368 2384 msedge.exe 82 PID 2384 wrote to memory of 4368 2384 msedge.exe 82 PID 2384 wrote to memory of 4368 2384 msedge.exe 82 PID 2384 wrote to memory of 4368 2384 msedge.exe 82 PID 2384 wrote to memory of 4368 2384 msedge.exe 82 PID 2384 wrote to memory of 4368 2384 msedge.exe 82 PID 2384 wrote to memory of 4368 2384 msedge.exe 82 PID 2384 wrote to memory of 4368 2384 msedge.exe 82 PID 2384 wrote to memory of 4368 2384 msedge.exe 82 PID 2384 wrote to memory of 4368 2384 msedge.exe 82 PID 2384 wrote to memory of 4368 2384 msedge.exe 82 PID 2384 wrote to memory of 4368 2384 msedge.exe 82 PID 2384 wrote to memory of 4368 2384 msedge.exe 82 PID 2384 wrote to memory of 4368 2384 msedge.exe 82 PID 2384 wrote to memory of 4368 2384 msedge.exe 82 PID 2384 wrote to memory of 4368 2384 msedge.exe 82 PID 2384 wrote to memory of 4368 2384 msedge.exe 82 PID 2384 wrote to memory of 4368 2384 msedge.exe 82 PID 2384 wrote to memory of 4368 2384 msedge.exe 82 PID 2384 wrote to memory of 4368 2384 msedge.exe 82 PID 2384 wrote to memory of 4368 2384 msedge.exe 82 PID 2384 wrote to memory of 4368 2384 msedge.exe 82 PID 2384 wrote to memory of 4368 2384 msedge.exe 82 PID 2384 wrote to memory of 4368 2384 msedge.exe 82 PID 2384 wrote to memory of 4368 2384 msedge.exe 82 PID 2384 wrote to memory of 4368 2384 msedge.exe 82 PID 2384 wrote to memory of 4368 2384 msedge.exe 82 PID 2384 wrote to memory of 4368 2384 msedge.exe 82 PID 2384 wrote to memory of 4368 2384 msedge.exe 82 PID 2384 wrote to memory of 4368 2384 msedge.exe 82 PID 2384 wrote to memory of 4368 2384 msedge.exe 82 PID 2384 wrote to memory of 4368 2384 msedge.exe 82 PID 2384 wrote to memory of 4368 2384 msedge.exe 82 PID 2384 wrote to memory of 4368 2384 msedge.exe 82 PID 2384 wrote to memory of 4368 2384 msedge.exe 82 PID 2384 wrote to memory of 4368 2384 msedge.exe 82 PID 2384 wrote to memory of 5084 2384 msedge.exe 83 PID 2384 wrote to memory of 5084 2384 msedge.exe 83 PID 2384 wrote to memory of 4036 2384 msedge.exe 84 PID 2384 wrote to memory of 4036 2384 msedge.exe 84 PID 2384 wrote to memory of 4036 2384 msedge.exe 84 PID 2384 wrote to memory of 4036 2384 msedge.exe 84 PID 2384 wrote to memory of 4036 2384 msedge.exe 84 PID 2384 wrote to memory of 4036 2384 msedge.exe 84 PID 2384 wrote to memory of 4036 2384 msedge.exe 84 PID 2384 wrote to memory of 4036 2384 msedge.exe 84 PID 2384 wrote to memory of 4036 2384 msedge.exe 84 PID 2384 wrote to memory of 4036 2384 msedge.exe 84 PID 2384 wrote to memory of 4036 2384 msedge.exe 84 PID 2384 wrote to memory of 4036 2384 msedge.exe 84 PID 2384 wrote to memory of 4036 2384 msedge.exe 84 PID 2384 wrote to memory of 4036 2384 msedge.exe 84 PID 2384 wrote to memory of 4036 2384 msedge.exe 84 PID 2384 wrote to memory of 4036 2384 msedge.exe 84 PID 2384 wrote to memory of 4036 2384 msedge.exe 84 PID 2384 wrote to memory of 4036 2384 msedge.exe 84 PID 2384 wrote to memory of 4036 2384 msedge.exe 84 PID 2384 wrote to memory of 4036 2384 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a132b4bb2774ca50f9b3092c8708d9d4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xd8,0x10c,0x7ffbcf1b46f8,0x7ffbcf1b4708,0x7ffbcf1b47182⤵PID:520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,10395902756632034344,2459928917652446952,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,10395902756632034344,2459928917652446952,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,10395902756632034344,2459928917652446952,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,10395902756632034344,2459928917652446952,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,10395902756632034344,2459928917652446952,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,10395902756632034344,2459928917652446952,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6020 /prefetch:82⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,10395902756632034344,2459928917652446952,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6020 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,10395902756632034344,2459928917652446952,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6004 /prefetch:12⤵PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,10395902756632034344,2459928917652446952,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5988 /prefetch:12⤵PID:2740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,10395902756632034344,2459928917652446952,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4232 /prefetch:12⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,10395902756632034344,2459928917652446952,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4228 /prefetch:12⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,10395902756632034344,2459928917652446952,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4836 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1840
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2264
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5477462b6ad8eaaf8d38f5e3a4daf17b0
SHA186174e670c44767c08a39cc2a53c09c318326201
SHA256e6bbd4933b9baa1df4bb633319174de07db176ec215e71c8568d27c5c577184d
SHA512a0acc2ef7fd0fcf413572eeb94d1e38aa6a682195cc03d6eaaaa0bc9e5f4b2c0033da0b835f4617aebc52069d0a10b52fc31ed53c2fe7943a480b55b7481dd4e
-
Filesize
152B
MD5b704c9ca0493bd4548ac9c69dc4a4f27
SHA1a3e5e54e630dabe55ca18a798d9f5681e0620ba7
SHA2562ebd5229b9dc642afba36a27c7ac12d90196b1c50985c37e94f4c17474e15411
SHA51269c8116fb542b344a8c55e2658078bd3e0d3564b1e4c889b072dbc99d2b070dacbc4394dedbc22a4968a8cf9448e71f69ec71ded018c1bacc0e195b3b3072d32
-
Filesize
6KB
MD520caa14fd151f562446a8c7b9ba646aa
SHA1bc123b40c335f3e411c9c434cbfc8dc09f85028c
SHA256e37afd84bd49bc9b2003a606f56c5b65ebe5acc6191c4e4e34cc10ea0a2fdd73
SHA512fe633ac320b51f3b650c02d4c338cc6bec1f9fb2dd2bda11cf7930c1957de2d5f7853ad2f5b1d1c22dd04428792519168fe6c43acbb184a84ab0c0af2188fa48
-
Filesize
6KB
MD5b860639010cfc5a6419193a273f3b8c0
SHA1abf11c18684428672f651966d90111aa32c45918
SHA256bb0aba5b32072519b704002be658685842102249ffce1606c443b176edb07bda
SHA512a97715b60204f4ef75dd6941b94d74a562d6366c906ec6a060448d9a3a5b5c5506b82ecf901b71ebf2192345267d56f0fa0de61f4e4ee5a4c521e199d1c0eebd
-
Filesize
6KB
MD5aec755f377978c865d3f32a5620a53a8
SHA195553e96afff7e99463ec76c9564714a06306be7
SHA2568008cc3354a3fb1bf20d13aa62efb2f104a72e47f14dd092280a33ed2daf88d8
SHA5121eedbd7f9f5e0d816a20dc8dddac4399366621c4ffcbc23d578f220e819cf3ef72232e9ccd4d7a1a1bb226d10a5780914912c0b37d5a15a18d5b858f8a53f8c8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD55e42c49043a2d221abda1ebf955d0fb9
SHA1a7cd24ed9d55753ec97c3c54ac451571e742675f
SHA256c10e778794004c37f035951287afbd4f5007c2007366ed24dd4d26d80d583069
SHA5126a1f2c1775484e984c6215fef84c25955307160b01c6e3a71ca2b2da0856efa644d646ad1b6d9205e21cd84b32c4b229b94b323b55abf9f8a6c226cdb21603b9