Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2024 03:17
Static task
static1
Behavioral task
behavioral1
Sample
a3a56437960bc044a3be3a47e5eda59d_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a3a56437960bc044a3be3a47e5eda59d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a3a56437960bc044a3be3a47e5eda59d_JaffaCakes118.html
-
Size
24KB
-
MD5
a3a56437960bc044a3be3a47e5eda59d
-
SHA1
fdf365edb80096f597702775cff0e7cebb730ddb
-
SHA256
35a4254681ccbe85ed787a759f30d4baad37cbc3403d4c5be95fb84b46f441ec
-
SHA512
66163ac12f3d20811f7b7eb115e54d11e3da69e9f2aeadb1c1f6af70bb57c623f6a747fe9bb360b8e75ad6f793ae135d9fac1401221e927950a580a8415ca941
-
SSDEEP
192:7IQErpeDFTXTmZ4kVKc+HewisJJqGaQtsnaKRCRCK2zzHKaqZ5fdlL6R8AOZU8xz:72m7sV5ue3oJqdQWnMfFAOZUYKxy
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4800 msedge.exe 4800 msedge.exe 728 msedge.exe 728 msedge.exe 4160 identity_helper.exe 4160 identity_helper.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 728 wrote to memory of 2276 728 msedge.exe 81 PID 728 wrote to memory of 2276 728 msedge.exe 81 PID 728 wrote to memory of 3948 728 msedge.exe 83 PID 728 wrote to memory of 3948 728 msedge.exe 83 PID 728 wrote to memory of 3948 728 msedge.exe 83 PID 728 wrote to memory of 3948 728 msedge.exe 83 PID 728 wrote to memory of 3948 728 msedge.exe 83 PID 728 wrote to memory of 3948 728 msedge.exe 83 PID 728 wrote to memory of 3948 728 msedge.exe 83 PID 728 wrote to memory of 3948 728 msedge.exe 83 PID 728 wrote to memory of 3948 728 msedge.exe 83 PID 728 wrote to memory of 3948 728 msedge.exe 83 PID 728 wrote to memory of 3948 728 msedge.exe 83 PID 728 wrote to memory of 3948 728 msedge.exe 83 PID 728 wrote to memory of 3948 728 msedge.exe 83 PID 728 wrote to memory of 3948 728 msedge.exe 83 PID 728 wrote to memory of 3948 728 msedge.exe 83 PID 728 wrote to memory of 3948 728 msedge.exe 83 PID 728 wrote to memory of 3948 728 msedge.exe 83 PID 728 wrote to memory of 3948 728 msedge.exe 83 PID 728 wrote to memory of 3948 728 msedge.exe 83 PID 728 wrote to memory of 3948 728 msedge.exe 83 PID 728 wrote to memory of 3948 728 msedge.exe 83 PID 728 wrote to memory of 3948 728 msedge.exe 83 PID 728 wrote to memory of 3948 728 msedge.exe 83 PID 728 wrote to memory of 3948 728 msedge.exe 83 PID 728 wrote to memory of 3948 728 msedge.exe 83 PID 728 wrote to memory of 3948 728 msedge.exe 83 PID 728 wrote to memory of 3948 728 msedge.exe 83 PID 728 wrote to memory of 3948 728 msedge.exe 83 PID 728 wrote to memory of 3948 728 msedge.exe 83 PID 728 wrote to memory of 3948 728 msedge.exe 83 PID 728 wrote to memory of 3948 728 msedge.exe 83 PID 728 wrote to memory of 3948 728 msedge.exe 83 PID 728 wrote to memory of 3948 728 msedge.exe 83 PID 728 wrote to memory of 3948 728 msedge.exe 83 PID 728 wrote to memory of 3948 728 msedge.exe 83 PID 728 wrote to memory of 3948 728 msedge.exe 83 PID 728 wrote to memory of 3948 728 msedge.exe 83 PID 728 wrote to memory of 3948 728 msedge.exe 83 PID 728 wrote to memory of 3948 728 msedge.exe 83 PID 728 wrote to memory of 3948 728 msedge.exe 83 PID 728 wrote to memory of 4800 728 msedge.exe 84 PID 728 wrote to memory of 4800 728 msedge.exe 84 PID 728 wrote to memory of 2360 728 msedge.exe 85 PID 728 wrote to memory of 2360 728 msedge.exe 85 PID 728 wrote to memory of 2360 728 msedge.exe 85 PID 728 wrote to memory of 2360 728 msedge.exe 85 PID 728 wrote to memory of 2360 728 msedge.exe 85 PID 728 wrote to memory of 2360 728 msedge.exe 85 PID 728 wrote to memory of 2360 728 msedge.exe 85 PID 728 wrote to memory of 2360 728 msedge.exe 85 PID 728 wrote to memory of 2360 728 msedge.exe 85 PID 728 wrote to memory of 2360 728 msedge.exe 85 PID 728 wrote to memory of 2360 728 msedge.exe 85 PID 728 wrote to memory of 2360 728 msedge.exe 85 PID 728 wrote to memory of 2360 728 msedge.exe 85 PID 728 wrote to memory of 2360 728 msedge.exe 85 PID 728 wrote to memory of 2360 728 msedge.exe 85 PID 728 wrote to memory of 2360 728 msedge.exe 85 PID 728 wrote to memory of 2360 728 msedge.exe 85 PID 728 wrote to memory of 2360 728 msedge.exe 85 PID 728 wrote to memory of 2360 728 msedge.exe 85 PID 728 wrote to memory of 2360 728 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a3a56437960bc044a3be3a47e5eda59d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:728 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd17b046f8,0x7ffd17b04708,0x7ffd17b047182⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,1273214368017416010,1311022789593162064,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,1273214368017416010,1311022789593162064,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,1273214368017416010,1311022789593162064,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:82⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1273214368017416010,1311022789593162064,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1273214368017416010,1311022789593162064,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,1273214368017416010,1311022789593162064,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4208 /prefetch:82⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,1273214368017416010,1311022789593162064,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4208 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1273214368017416010,1311022789593162064,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1273214368017416010,1311022789593162064,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1273214368017416010,1311022789593162064,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4144 /prefetch:12⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1273214368017416010,1311022789593162064,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,1273214368017416010,1311022789593162064,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4484 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3696
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4964
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
5KB
MD56959f4b041f194257666da93c5e3efd0
SHA113cbe1881c8b58fc69c1974354d06466c6baae13
SHA256cb3f360cc72ba0062abed5f5b0ec4f7942c4e9d9e68f1c2c512ffd77e30518bd
SHA512371f7b3a6b02717a41f211fca96fdfa29d927438fdbf09e926ab7a532d42c78091b86f067e4d10fe7b274749d634205628e229523b6680c31fe09b73433b7dc2
-
Filesize
6KB
MD56a69eeab23c4a120c3fae75d341d2cf7
SHA14dcb267acd4d03c3e0085168b80b46d876550361
SHA2561cae2e3d96d3fa05642add3b4b630251847e84e67485d2809cd24dfc0eb38408
SHA51213bceedb1376366ef28d3025836b2809d361f772af6b1efcec12be7c59dbf6a24d8b8858939cccf6eab8205d9d04788e768fccb9975d7dd9f73e32a7c7382232
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
8KB
MD587a8205ba1e88ef611915ec92bca6c78
SHA10481fc785164f7ce76b03c5b546921bbe424aff7
SHA2566054488cb3055c0133fad5fcaf82779a4402e6ce09b6425a24e2d9d869b07816
SHA51219f82cd643e9498ebb990201c72a95b477a1b1c4453e149d705c41dd7c358e784e5eb55f9b0e75f33a0c5af0d9864b3c7ee7988a90ddecc403aea33af3e52484