Analysis
-
max time kernel
145s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12-06-2024 20:21
Static task
static1
Behavioral task
behavioral1
Sample
a22ee388275adbf2c2f8cebf888ae542_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a22ee388275adbf2c2f8cebf888ae542_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a22ee388275adbf2c2f8cebf888ae542_JaffaCakes118.html
-
Size
32KB
-
MD5
a22ee388275adbf2c2f8cebf888ae542
-
SHA1
d52b495ad5da2d2b2408fa6aa2a481507279d765
-
SHA256
f33d0d5e292b26858cc942f2aa3060aa8d34a8209e6b4f8727e0080551468e20
-
SHA512
835cf0b70608db567ea641e7dd98ce3f50ce1c08cebf2ddc06e74a0b790d9ca3e4636a019980bfb00a024db9c2e89c2b641352a5c301ec3a83819e31d8941d28
-
SSDEEP
192:uWnNyB9cscb5ngZnQjxn5Q/bnQieaNninQOkEntt1nQTbn9nQ4aMC/AZJYLWPY6u:9yB9cskQ/paFsi6P9NQt3jfOk
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2404 msedge.exe 2404 msedge.exe 4548 msedge.exe 4548 msedge.exe 2640 identity_helper.exe 2640 identity_helper.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4548 wrote to memory of 932 4548 msedge.exe 81 PID 4548 wrote to memory of 932 4548 msedge.exe 81 PID 4548 wrote to memory of 2428 4548 msedge.exe 82 PID 4548 wrote to memory of 2428 4548 msedge.exe 82 PID 4548 wrote to memory of 2428 4548 msedge.exe 82 PID 4548 wrote to memory of 2428 4548 msedge.exe 82 PID 4548 wrote to memory of 2428 4548 msedge.exe 82 PID 4548 wrote to memory of 2428 4548 msedge.exe 82 PID 4548 wrote to memory of 2428 4548 msedge.exe 82 PID 4548 wrote to memory of 2428 4548 msedge.exe 82 PID 4548 wrote to memory of 2428 4548 msedge.exe 82 PID 4548 wrote to memory of 2428 4548 msedge.exe 82 PID 4548 wrote to memory of 2428 4548 msedge.exe 82 PID 4548 wrote to memory of 2428 4548 msedge.exe 82 PID 4548 wrote to memory of 2428 4548 msedge.exe 82 PID 4548 wrote to memory of 2428 4548 msedge.exe 82 PID 4548 wrote to memory of 2428 4548 msedge.exe 82 PID 4548 wrote to memory of 2428 4548 msedge.exe 82 PID 4548 wrote to memory of 2428 4548 msedge.exe 82 PID 4548 wrote to memory of 2428 4548 msedge.exe 82 PID 4548 wrote to memory of 2428 4548 msedge.exe 82 PID 4548 wrote to memory of 2428 4548 msedge.exe 82 PID 4548 wrote to memory of 2428 4548 msedge.exe 82 PID 4548 wrote to memory of 2428 4548 msedge.exe 82 PID 4548 wrote to memory of 2428 4548 msedge.exe 82 PID 4548 wrote to memory of 2428 4548 msedge.exe 82 PID 4548 wrote to memory of 2428 4548 msedge.exe 82 PID 4548 wrote to memory of 2428 4548 msedge.exe 82 PID 4548 wrote to memory of 2428 4548 msedge.exe 82 PID 4548 wrote to memory of 2428 4548 msedge.exe 82 PID 4548 wrote to memory of 2428 4548 msedge.exe 82 PID 4548 wrote to memory of 2428 4548 msedge.exe 82 PID 4548 wrote to memory of 2428 4548 msedge.exe 82 PID 4548 wrote to memory of 2428 4548 msedge.exe 82 PID 4548 wrote to memory of 2428 4548 msedge.exe 82 PID 4548 wrote to memory of 2428 4548 msedge.exe 82 PID 4548 wrote to memory of 2428 4548 msedge.exe 82 PID 4548 wrote to memory of 2428 4548 msedge.exe 82 PID 4548 wrote to memory of 2428 4548 msedge.exe 82 PID 4548 wrote to memory of 2428 4548 msedge.exe 82 PID 4548 wrote to memory of 2428 4548 msedge.exe 82 PID 4548 wrote to memory of 2428 4548 msedge.exe 82 PID 4548 wrote to memory of 2404 4548 msedge.exe 83 PID 4548 wrote to memory of 2404 4548 msedge.exe 83 PID 4548 wrote to memory of 4616 4548 msedge.exe 84 PID 4548 wrote to memory of 4616 4548 msedge.exe 84 PID 4548 wrote to memory of 4616 4548 msedge.exe 84 PID 4548 wrote to memory of 4616 4548 msedge.exe 84 PID 4548 wrote to memory of 4616 4548 msedge.exe 84 PID 4548 wrote to memory of 4616 4548 msedge.exe 84 PID 4548 wrote to memory of 4616 4548 msedge.exe 84 PID 4548 wrote to memory of 4616 4548 msedge.exe 84 PID 4548 wrote to memory of 4616 4548 msedge.exe 84 PID 4548 wrote to memory of 4616 4548 msedge.exe 84 PID 4548 wrote to memory of 4616 4548 msedge.exe 84 PID 4548 wrote to memory of 4616 4548 msedge.exe 84 PID 4548 wrote to memory of 4616 4548 msedge.exe 84 PID 4548 wrote to memory of 4616 4548 msedge.exe 84 PID 4548 wrote to memory of 4616 4548 msedge.exe 84 PID 4548 wrote to memory of 4616 4548 msedge.exe 84 PID 4548 wrote to memory of 4616 4548 msedge.exe 84 PID 4548 wrote to memory of 4616 4548 msedge.exe 84 PID 4548 wrote to memory of 4616 4548 msedge.exe 84 PID 4548 wrote to memory of 4616 4548 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a22ee388275adbf2c2f8cebf888ae542_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff80fb846f8,0x7ff80fb84708,0x7ff80fb847182⤵PID:932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,11323524654622257723,7502611319976983770,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,11323524654622257723,7502611319976983770,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,11323524654622257723,7502611319976983770,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,11323524654622257723,7502611319976983770,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,11323524654622257723,7502611319976983770,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,11323524654622257723,7502611319976983770,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3928 /prefetch:82⤵PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,11323524654622257723,7502611319976983770,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3928 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,11323524654622257723,7502611319976983770,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:12⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,11323524654622257723,7502611319976983770,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:12⤵PID:1620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,11323524654622257723,7502611319976983770,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4232 /prefetch:12⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,11323524654622257723,7502611319976983770,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,11323524654622257723,7502611319976983770,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3056 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5008
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3580
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:900
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
5KB
MD5130d71c2527aab1173c6c02002d1929b
SHA1ce153ecf74a94c88ad84db1aed20b313cf22aa73
SHA256d64fb199be4736fc662461fe946f7a222a4cbdc94ff49adac72ad299c3724b3f
SHA512e098a80e9d9d3a2d3c650a6fda72908fd1f9bfee69f38109a7f06b53a789061bb9c609b9dfe5d7b4c2cd75105d8de35754b1a532520d8c086c091a2b5c7bb0c0
-
Filesize
5KB
MD5ec9ae245ac83a57d4aa243505bf098dd
SHA189236837d3349f722b14b4cfdf9b0c283f4a7817
SHA2565c2934cd64021b43dc55e2f74a19bec7e25ec2d0f2b0ac89fbd5449f5e306f32
SHA512296c6a82296fc53d44b4071308217e8c68ca1b86d65916d678ceb1076073ca6288729c01e602c111ef2f60bf1d127a48e03c8527046b2719070f0c39f20a829a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD54607c432bdf9457f9b809c4649a8a899
SHA1b6eef3d8ddacc51dd50490b494ccb835ac011163
SHA256d2ac7066e61c10cc733fbf63c72095b3e0392cbb4780008f1c69ae238d23f53c
SHA5120caa69d106edf960b38af95d93a731b05e341b8806d52a2c2d145405c3fd99504cea2aff48eae599b0b4f46f3be20443ae34dad0e7132916ea3d530584e35ff6