Analysis
-
max time kernel
145s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2024 06:26
Static task
static1
Behavioral task
behavioral1
Sample
a431c86e18823479e4bbe51f3158a1d5_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a431c86e18823479e4bbe51f3158a1d5_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a431c86e18823479e4bbe51f3158a1d5_JaffaCakes118.html
-
Size
27KB
-
MD5
a431c86e18823479e4bbe51f3158a1d5
-
SHA1
5962de44204755cc55d942fb046ebd5d0493e15e
-
SHA256
910ae8a5f6e533d37035e04a95fdc5103848416ef40af6e9d0f9686fda3f3ce1
-
SHA512
b26c075345cf8e11b781e42382f8ced5139b3e6e4aafce8220a06059a8c875c3df7537fa68717b1072e60a4dc1eb3c4ec99e84bc09038432d0f9e2fd71a532a0
-
SSDEEP
192:uwn0b5nLbKnQjxn5Q/inQieZNnanQOkEntGEnQTbnxnQ9eFyam6uXXxQl7MB5qns:gjQ/QcjCXYSzUY
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1592 msedge.exe 1592 msedge.exe 432 msedge.exe 432 msedge.exe 1924 identity_helper.exe 1924 identity_helper.exe 5144 msedge.exe 5144 msedge.exe 5144 msedge.exe 5144 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 432 wrote to memory of 3184 432 msedge.exe 81 PID 432 wrote to memory of 3184 432 msedge.exe 81 PID 432 wrote to memory of 5496 432 msedge.exe 82 PID 432 wrote to memory of 5496 432 msedge.exe 82 PID 432 wrote to memory of 5496 432 msedge.exe 82 PID 432 wrote to memory of 5496 432 msedge.exe 82 PID 432 wrote to memory of 5496 432 msedge.exe 82 PID 432 wrote to memory of 5496 432 msedge.exe 82 PID 432 wrote to memory of 5496 432 msedge.exe 82 PID 432 wrote to memory of 5496 432 msedge.exe 82 PID 432 wrote to memory of 5496 432 msedge.exe 82 PID 432 wrote to memory of 5496 432 msedge.exe 82 PID 432 wrote to memory of 5496 432 msedge.exe 82 PID 432 wrote to memory of 5496 432 msedge.exe 82 PID 432 wrote to memory of 5496 432 msedge.exe 82 PID 432 wrote to memory of 5496 432 msedge.exe 82 PID 432 wrote to memory of 5496 432 msedge.exe 82 PID 432 wrote to memory of 5496 432 msedge.exe 82 PID 432 wrote to memory of 5496 432 msedge.exe 82 PID 432 wrote to memory of 5496 432 msedge.exe 82 PID 432 wrote to memory of 5496 432 msedge.exe 82 PID 432 wrote to memory of 5496 432 msedge.exe 82 PID 432 wrote to memory of 5496 432 msedge.exe 82 PID 432 wrote to memory of 5496 432 msedge.exe 82 PID 432 wrote to memory of 5496 432 msedge.exe 82 PID 432 wrote to memory of 5496 432 msedge.exe 82 PID 432 wrote to memory of 5496 432 msedge.exe 82 PID 432 wrote to memory of 5496 432 msedge.exe 82 PID 432 wrote to memory of 5496 432 msedge.exe 82 PID 432 wrote to memory of 5496 432 msedge.exe 82 PID 432 wrote to memory of 5496 432 msedge.exe 82 PID 432 wrote to memory of 5496 432 msedge.exe 82 PID 432 wrote to memory of 5496 432 msedge.exe 82 PID 432 wrote to memory of 5496 432 msedge.exe 82 PID 432 wrote to memory of 5496 432 msedge.exe 82 PID 432 wrote to memory of 5496 432 msedge.exe 82 PID 432 wrote to memory of 5496 432 msedge.exe 82 PID 432 wrote to memory of 5496 432 msedge.exe 82 PID 432 wrote to memory of 5496 432 msedge.exe 82 PID 432 wrote to memory of 5496 432 msedge.exe 82 PID 432 wrote to memory of 5496 432 msedge.exe 82 PID 432 wrote to memory of 5496 432 msedge.exe 82 PID 432 wrote to memory of 1592 432 msedge.exe 83 PID 432 wrote to memory of 1592 432 msedge.exe 83 PID 432 wrote to memory of 5188 432 msedge.exe 84 PID 432 wrote to memory of 5188 432 msedge.exe 84 PID 432 wrote to memory of 5188 432 msedge.exe 84 PID 432 wrote to memory of 5188 432 msedge.exe 84 PID 432 wrote to memory of 5188 432 msedge.exe 84 PID 432 wrote to memory of 5188 432 msedge.exe 84 PID 432 wrote to memory of 5188 432 msedge.exe 84 PID 432 wrote to memory of 5188 432 msedge.exe 84 PID 432 wrote to memory of 5188 432 msedge.exe 84 PID 432 wrote to memory of 5188 432 msedge.exe 84 PID 432 wrote to memory of 5188 432 msedge.exe 84 PID 432 wrote to memory of 5188 432 msedge.exe 84 PID 432 wrote to memory of 5188 432 msedge.exe 84 PID 432 wrote to memory of 5188 432 msedge.exe 84 PID 432 wrote to memory of 5188 432 msedge.exe 84 PID 432 wrote to memory of 5188 432 msedge.exe 84 PID 432 wrote to memory of 5188 432 msedge.exe 84 PID 432 wrote to memory of 5188 432 msedge.exe 84 PID 432 wrote to memory of 5188 432 msedge.exe 84 PID 432 wrote to memory of 5188 432 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a431c86e18823479e4bbe51f3158a1d5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa127d46f8,0x7ffa127d4708,0x7ffa127d47182⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,11332205279558204933,9797337814716120884,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:5496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,11332205279558204933,9797337814716120884,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2080 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,11332205279558204933,9797337814716120884,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2144 /prefetch:82⤵PID:5188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11332205279558204933,9797337814716120884,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11332205279558204933,9797337814716120884,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,11332205279558204933,9797337814716120884,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4316 /prefetch:82⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,11332205279558204933,9797337814716120884,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4316 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11332205279558204933,9797337814716120884,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4436 /prefetch:12⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11332205279558204933,9797337814716120884,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11332205279558204933,9797337814716120884,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11332205279558204933,9797337814716120884,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:12⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,11332205279558204933,9797337814716120884,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1336 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5144
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1828
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD51365e722bc1eac77b4301a4506106e68
SHA14adf3c85a4a93da385d3e9343169c09f5254176d
SHA2566a16df0e6531deee46594be3989ac30563e2c233da059e110ed8b94db241454e
SHA51266433fc9e91886b72d1dbbee8c276657d4985d1291b95bb75aac51fb474b503ac29ef7bb85d618ef79f74694416cd2c1f8bfe5c9ef1ad0af524870f61756c0d8
-
Filesize
5KB
MD508b2a8247fcc8710d03e382244a1dd7c
SHA1cb81df2dbf373f1d67567ac38663d4ae8292ec90
SHA256d91294c714bd6d588bdb10c43665dc256b6719f62b5f8ea473b2b89da32089f0
SHA51261ada51d0d81015a15f8056e874619eff5994090bab33463b0fde2e19befcc77300ebfa5622c81cb2b3e9cd172790e3fa71a10a89accd75b96cb8939962e7f1d
-
Filesize
5KB
MD5864f7fee64b96398c2e176daef37178a
SHA104e154a32e8e0b8eb00b1e4ec6ddca3146246e34
SHA256523baf293f97c63cc09b1fb68275b2cc8c8091ee78f959e6bd012da1914e6204
SHA51237d5c4020da4adb568bca82b180dc4917d4aadc64fc25686a3ab8d34246d7d9fd39277fb2d27e027945cbf7aea71b81ee06d214902de9130e4a9cf32524b0ae7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD596cd4a2ba35d630b30cf70956bd40520
SHA132b7ba8fe3345f92e0ee1b1fff7b799857b21c49
SHA25628d450bac3c7bb6f49cef32428ca03d8f5ffdb088f783f72907c12d5bc33d1fa
SHA512ac364d9911f8e9e336cc0bed55f1808f801735d2868b59be157d8437856fd309f5cecc8af537fd931d3a746ef992ef746c1393eaa7e47edd44e3a33ebeeb8be2