Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2024, 21:57
Static task
static1
Behavioral task
behavioral1
Sample
a6c3994a72927f5a1ce33ae415fa3f65_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a6c3994a72927f5a1ce33ae415fa3f65_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a6c3994a72927f5a1ce33ae415fa3f65_JaffaCakes118.html
-
Size
17KB
-
MD5
a6c3994a72927f5a1ce33ae415fa3f65
-
SHA1
fd6107978c0ea145d7b7f477ac87f1689eba8870
-
SHA256
4f2b8d8b671221294d724c9172bc216b8e0d6f44c0aa2b3c63b1f19dc23bab60
-
SHA512
91f2b4d065ae8913b9478e0854634df659a1532091cee1fe712465666274ae57d6c5647ddf3a43c082caa5f69f70477ed17668c69f7dfcd386c4b32583b340f1
-
SSDEEP
192:SE0EnnQcnoaQBM+qSnVwYSnmSnLg5PpN54FWWevuq5qoivyP/MNryl34vyTRVcKv:SDvaQBM+q8wYjwi34FpevuqV9rgXqzV
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3700 msedge.exe 3700 msedge.exe 5640 msedge.exe 5640 msedge.exe 2068 identity_helper.exe 2068 identity_helper.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5640 msedge.exe 5640 msedge.exe 5640 msedge.exe 5640 msedge.exe 5640 msedge.exe 5640 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5640 msedge.exe 5640 msedge.exe 5640 msedge.exe 5640 msedge.exe 5640 msedge.exe 5640 msedge.exe 5640 msedge.exe 5640 msedge.exe 5640 msedge.exe 5640 msedge.exe 5640 msedge.exe 5640 msedge.exe 5640 msedge.exe 5640 msedge.exe 5640 msedge.exe 5640 msedge.exe 5640 msedge.exe 5640 msedge.exe 5640 msedge.exe 5640 msedge.exe 5640 msedge.exe 5640 msedge.exe 5640 msedge.exe 5640 msedge.exe 5640 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5640 msedge.exe 5640 msedge.exe 5640 msedge.exe 5640 msedge.exe 5640 msedge.exe 5640 msedge.exe 5640 msedge.exe 5640 msedge.exe 5640 msedge.exe 5640 msedge.exe 5640 msedge.exe 5640 msedge.exe 5640 msedge.exe 5640 msedge.exe 5640 msedge.exe 5640 msedge.exe 5640 msedge.exe 5640 msedge.exe 5640 msedge.exe 5640 msedge.exe 5640 msedge.exe 5640 msedge.exe 5640 msedge.exe 5640 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5640 wrote to memory of 1116 5640 msedge.exe 83 PID 5640 wrote to memory of 1116 5640 msedge.exe 83 PID 5640 wrote to memory of 2088 5640 msedge.exe 84 PID 5640 wrote to memory of 2088 5640 msedge.exe 84 PID 5640 wrote to memory of 2088 5640 msedge.exe 84 PID 5640 wrote to memory of 2088 5640 msedge.exe 84 PID 5640 wrote to memory of 2088 5640 msedge.exe 84 PID 5640 wrote to memory of 2088 5640 msedge.exe 84 PID 5640 wrote to memory of 2088 5640 msedge.exe 84 PID 5640 wrote to memory of 2088 5640 msedge.exe 84 PID 5640 wrote to memory of 2088 5640 msedge.exe 84 PID 5640 wrote to memory of 2088 5640 msedge.exe 84 PID 5640 wrote to memory of 2088 5640 msedge.exe 84 PID 5640 wrote to memory of 2088 5640 msedge.exe 84 PID 5640 wrote to memory of 2088 5640 msedge.exe 84 PID 5640 wrote to memory of 2088 5640 msedge.exe 84 PID 5640 wrote to memory of 2088 5640 msedge.exe 84 PID 5640 wrote to memory of 2088 5640 msedge.exe 84 PID 5640 wrote to memory of 2088 5640 msedge.exe 84 PID 5640 wrote to memory of 2088 5640 msedge.exe 84 PID 5640 wrote to memory of 2088 5640 msedge.exe 84 PID 5640 wrote to memory of 2088 5640 msedge.exe 84 PID 5640 wrote to memory of 2088 5640 msedge.exe 84 PID 5640 wrote to memory of 2088 5640 msedge.exe 84 PID 5640 wrote to memory of 2088 5640 msedge.exe 84 PID 5640 wrote to memory of 2088 5640 msedge.exe 84 PID 5640 wrote to memory of 2088 5640 msedge.exe 84 PID 5640 wrote to memory of 2088 5640 msedge.exe 84 PID 5640 wrote to memory of 2088 5640 msedge.exe 84 PID 5640 wrote to memory of 2088 5640 msedge.exe 84 PID 5640 wrote to memory of 2088 5640 msedge.exe 84 PID 5640 wrote to memory of 2088 5640 msedge.exe 84 PID 5640 wrote to memory of 2088 5640 msedge.exe 84 PID 5640 wrote to memory of 2088 5640 msedge.exe 84 PID 5640 wrote to memory of 2088 5640 msedge.exe 84 PID 5640 wrote to memory of 2088 5640 msedge.exe 84 PID 5640 wrote to memory of 2088 5640 msedge.exe 84 PID 5640 wrote to memory of 2088 5640 msedge.exe 84 PID 5640 wrote to memory of 2088 5640 msedge.exe 84 PID 5640 wrote to memory of 2088 5640 msedge.exe 84 PID 5640 wrote to memory of 2088 5640 msedge.exe 84 PID 5640 wrote to memory of 2088 5640 msedge.exe 84 PID 5640 wrote to memory of 3700 5640 msedge.exe 85 PID 5640 wrote to memory of 3700 5640 msedge.exe 85 PID 5640 wrote to memory of 2692 5640 msedge.exe 86 PID 5640 wrote to memory of 2692 5640 msedge.exe 86 PID 5640 wrote to memory of 2692 5640 msedge.exe 86 PID 5640 wrote to memory of 2692 5640 msedge.exe 86 PID 5640 wrote to memory of 2692 5640 msedge.exe 86 PID 5640 wrote to memory of 2692 5640 msedge.exe 86 PID 5640 wrote to memory of 2692 5640 msedge.exe 86 PID 5640 wrote to memory of 2692 5640 msedge.exe 86 PID 5640 wrote to memory of 2692 5640 msedge.exe 86 PID 5640 wrote to memory of 2692 5640 msedge.exe 86 PID 5640 wrote to memory of 2692 5640 msedge.exe 86 PID 5640 wrote to memory of 2692 5640 msedge.exe 86 PID 5640 wrote to memory of 2692 5640 msedge.exe 86 PID 5640 wrote to memory of 2692 5640 msedge.exe 86 PID 5640 wrote to memory of 2692 5640 msedge.exe 86 PID 5640 wrote to memory of 2692 5640 msedge.exe 86 PID 5640 wrote to memory of 2692 5640 msedge.exe 86 PID 5640 wrote to memory of 2692 5640 msedge.exe 86 PID 5640 wrote to memory of 2692 5640 msedge.exe 86 PID 5640 wrote to memory of 2692 5640 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a6c3994a72927f5a1ce33ae415fa3f65_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5640 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe4fd346f8,0x7ffe4fd34708,0x7ffe4fd347182⤵PID:1116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,1973483494196532529,2779063470942391787,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:2088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,1973483494196532529,2779063470942391787,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,1973483494196532529,2779063470942391787,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1973483494196532529,2779063470942391787,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1973483494196532529,2779063470942391787,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,1973483494196532529,2779063470942391787,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4180 /prefetch:82⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,1973483494196532529,2779063470942391787,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4180 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1973483494196532529,2779063470942391787,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1973483494196532529,2779063470942391787,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1973483494196532529,2779063470942391787,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:12⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1973483494196532529,2779063470942391787,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:1248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,1973483494196532529,2779063470942391787,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4864 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2272
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2672
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5db9081c34e133c32d02f593df88f047a
SHA1a0da007c14fd0591091924edc44bee90456700c6
SHA256c9cd202ebb55fe8dd3e5563948bab458e947d7ba33bc0f38c6b37ce5d0bd7c3e
SHA51212f9809958b024571891fae646208a76f3823ae333716a5cec303e15c38281db042b7acf95bc6523b6328ac9c8644794d39a0e03d9db196f156a6ee1fb4f2744
-
Filesize
152B
MD53a09f853479af373691d131247040276
SHA11b6f098e04da87e9cf2d3284943ec2144f36ac04
SHA256a358de2c0eba30c70a56022c44a3775aa99ffa819cd7f42f7c45ac358b5e739f
SHA512341cf0f363621ee02525cd398ae0d462319c6a80e05fd25d9aca44234c42a3071b51991d4cf102ac9d89561a1567cbe76dfeaad786a304bec33821ca77080016
-
Filesize
6KB
MD5d70d4256a248c1de5b91538abdadc95f
SHA187d40f6c5e6f73de2fc386a5b10e1bd3e9ca8f19
SHA256405c14963a45186b99f7d847b6e711617dc4351db18c91a602448ab0a30f4aa1
SHA5120b70bb6bf7e092645b4f7eb64df72d6ae4c67e6dd606355a82e5070354c11bb3124b968aa6d9eec3b0026c79df106f7179c9458ac3982edb8ebe8347114032f8
-
Filesize
6KB
MD56ecabc1251b075c2baf749a5246c3842
SHA1885a52ae00e423a97973d4777b262a0544722971
SHA256f68c9425510e9109da3fe3d7ca39b88b721ce9556848f8393848a9a1b96c2b31
SHA5124e17ea198e5dcd96be3859c6628171028ad6934aafe467b5ed8742daa317bd6d72c56296b385593fc22fd9532d6cdf4f289b5e736d29260e464a42e2a03ff332
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56299b9a6c667425bbcd472f1252238ad
SHA15bed0da1ade62046f0f5c8d7d01226c99c1bd282
SHA256dfb02971fcdbf9212375254205d93157f01b5b0473e718dfb786791b7c06da3c
SHA512ca5859302cb405628827e0d99cf7fee53f7bda6cd16dea4329dd7ae97e21343080238164ec7a0eddab66070d50c7cfeedb1fbfa8e1713a12d50dfd013991343a