Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2024 22:25
Static task
static1
Behavioral task
behavioral1
Sample
a6deb652223502d855e2861e0253f4da_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
a6deb652223502d855e2861e0253f4da_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a6deb652223502d855e2861e0253f4da_JaffaCakes118.html
-
Size
33KB
-
MD5
a6deb652223502d855e2861e0253f4da
-
SHA1
cb897588d8f735ef664e2ef758ab00f59ffde100
-
SHA256
ba615d46d88d02e51224d9ead0266009b6b72a83d4eee336a7231fd4baf3cca3
-
SHA512
b571f15e34aeb5f7f84523c9a7cd77c158e6f5792f676d48cb0e15cf6a27f2b67691dd7c98d6fbda5cf1f4ad28dff8551cc99872e1fdc2f815b56bd67e55e092
-
SSDEEP
768:EA5u+dpR5X102AhDSkSnNI607qtSlS7S/hqPpBNgjyYZjj1TsT+YDwnyj8VYG0mP:EA5TdpR5X10HDSkSna607qtSlS7S/haa
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 228 msedge.exe 228 msedge.exe 3892 msedge.exe 3892 msedge.exe 3036 identity_helper.exe 3036 identity_helper.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3892 wrote to memory of 4992 3892 msedge.exe 82 PID 3892 wrote to memory of 4992 3892 msedge.exe 82 PID 3892 wrote to memory of 4008 3892 msedge.exe 83 PID 3892 wrote to memory of 4008 3892 msedge.exe 83 PID 3892 wrote to memory of 4008 3892 msedge.exe 83 PID 3892 wrote to memory of 4008 3892 msedge.exe 83 PID 3892 wrote to memory of 4008 3892 msedge.exe 83 PID 3892 wrote to memory of 4008 3892 msedge.exe 83 PID 3892 wrote to memory of 4008 3892 msedge.exe 83 PID 3892 wrote to memory of 4008 3892 msedge.exe 83 PID 3892 wrote to memory of 4008 3892 msedge.exe 83 PID 3892 wrote to memory of 4008 3892 msedge.exe 83 PID 3892 wrote to memory of 4008 3892 msedge.exe 83 PID 3892 wrote to memory of 4008 3892 msedge.exe 83 PID 3892 wrote to memory of 4008 3892 msedge.exe 83 PID 3892 wrote to memory of 4008 3892 msedge.exe 83 PID 3892 wrote to memory of 4008 3892 msedge.exe 83 PID 3892 wrote to memory of 4008 3892 msedge.exe 83 PID 3892 wrote to memory of 4008 3892 msedge.exe 83 PID 3892 wrote to memory of 4008 3892 msedge.exe 83 PID 3892 wrote to memory of 4008 3892 msedge.exe 83 PID 3892 wrote to memory of 4008 3892 msedge.exe 83 PID 3892 wrote to memory of 4008 3892 msedge.exe 83 PID 3892 wrote to memory of 4008 3892 msedge.exe 83 PID 3892 wrote to memory of 4008 3892 msedge.exe 83 PID 3892 wrote to memory of 4008 3892 msedge.exe 83 PID 3892 wrote to memory of 4008 3892 msedge.exe 83 PID 3892 wrote to memory of 4008 3892 msedge.exe 83 PID 3892 wrote to memory of 4008 3892 msedge.exe 83 PID 3892 wrote to memory of 4008 3892 msedge.exe 83 PID 3892 wrote to memory of 4008 3892 msedge.exe 83 PID 3892 wrote to memory of 4008 3892 msedge.exe 83 PID 3892 wrote to memory of 4008 3892 msedge.exe 83 PID 3892 wrote to memory of 4008 3892 msedge.exe 83 PID 3892 wrote to memory of 4008 3892 msedge.exe 83 PID 3892 wrote to memory of 4008 3892 msedge.exe 83 PID 3892 wrote to memory of 4008 3892 msedge.exe 83 PID 3892 wrote to memory of 4008 3892 msedge.exe 83 PID 3892 wrote to memory of 4008 3892 msedge.exe 83 PID 3892 wrote to memory of 4008 3892 msedge.exe 83 PID 3892 wrote to memory of 4008 3892 msedge.exe 83 PID 3892 wrote to memory of 4008 3892 msedge.exe 83 PID 3892 wrote to memory of 228 3892 msedge.exe 84 PID 3892 wrote to memory of 228 3892 msedge.exe 84 PID 3892 wrote to memory of 5100 3892 msedge.exe 85 PID 3892 wrote to memory of 5100 3892 msedge.exe 85 PID 3892 wrote to memory of 5100 3892 msedge.exe 85 PID 3892 wrote to memory of 5100 3892 msedge.exe 85 PID 3892 wrote to memory of 5100 3892 msedge.exe 85 PID 3892 wrote to memory of 5100 3892 msedge.exe 85 PID 3892 wrote to memory of 5100 3892 msedge.exe 85 PID 3892 wrote to memory of 5100 3892 msedge.exe 85 PID 3892 wrote to memory of 5100 3892 msedge.exe 85 PID 3892 wrote to memory of 5100 3892 msedge.exe 85 PID 3892 wrote to memory of 5100 3892 msedge.exe 85 PID 3892 wrote to memory of 5100 3892 msedge.exe 85 PID 3892 wrote to memory of 5100 3892 msedge.exe 85 PID 3892 wrote to memory of 5100 3892 msedge.exe 85 PID 3892 wrote to memory of 5100 3892 msedge.exe 85 PID 3892 wrote to memory of 5100 3892 msedge.exe 85 PID 3892 wrote to memory of 5100 3892 msedge.exe 85 PID 3892 wrote to memory of 5100 3892 msedge.exe 85 PID 3892 wrote to memory of 5100 3892 msedge.exe 85 PID 3892 wrote to memory of 5100 3892 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a6deb652223502d855e2861e0253f4da_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdc2ac46f8,0x7ffdc2ac4708,0x7ffdc2ac47182⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,15929264190085042838,4633517847928796093,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,15929264190085042838,4633517847928796093,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,15929264190085042838,4633517847928796093,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2940 /prefetch:82⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15929264190085042838,4633517847928796093,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15929264190085042838,4633517847928796093,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,15929264190085042838,4633517847928796093,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4224 /prefetch:82⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,15929264190085042838,4633517847928796093,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4224 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15929264190085042838,4633517847928796093,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15929264190085042838,4633517847928796093,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15929264190085042838,4633517847928796093,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15929264190085042838,4633517847928796093,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4220 /prefetch:12⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,15929264190085042838,4633517847928796093,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5116 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:684
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2596
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4668
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD5812dfd534cf2f0df821f9905fde56acb
SHA1d11cc21ecc9dd89767537d005fba4d5df30ab50a
SHA2566a7be616c73f6ed02a7e8966c7c102de43572ae59a2b5c141dc45293e64c6994
SHA512d97556ae8565bc78560dc1debb859181d062b9a3e916ce5c661e3c7db40a44af8b0d5912da4d3a3c1f34571cabc10b5d29d3da4e3d95a66a2dcb47ab301c1377
-
Filesize
6KB
MD54c8eb10b744760d999cdb1606a3bea16
SHA19b088d78daa28a9f2e43c6717f11f0b481f6f3e6
SHA256e6637118f105d395d5322f17af73d99a82d3815c9a381307c12eaa1bc7bcfa4c
SHA5123c45b5466e359b6afe3750502d44df22e089b17de4c03bd92627b7bc5fadc45e07c27e403182e24ecdbd31d9aea352388928df0a9379a3196a29d7575d8e124f
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
8KB
MD505394078424d676ce43f87a56078ac4b
SHA16322a2836b7ed6878556b6c26b146ad872e80e0e
SHA256382f8fa6649d2e98217132d3cc8c7ffd2b739af994e96d62789aba1b8f3febec
SHA512b18006bba6e4865ef7e7f9f59bce5b27dbd09bb47770a118d185f7b0e9be02bf6912e5189730fd2a713876c460543ddb2b1955fabe4a0031568d061db2298a67