Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2024 09:08
Static task
static1
Behavioral task
behavioral1
Sample
a4c7ee192e79e92e9003298974aa870b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a4c7ee192e79e92e9003298974aa870b_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a4c7ee192e79e92e9003298974aa870b_JaffaCakes118.html
-
Size
10KB
-
MD5
a4c7ee192e79e92e9003298974aa870b
-
SHA1
39fbf40f9248c8770d9a7734d1bbb2fe98d982d1
-
SHA256
b08a7c3f79f070c3fcb1c65eee10aea217d818147c63142edddc0404266e5fa8
-
SHA512
1a993451924bf302c96ceaf6e49044412923a11ef153277a974a44203091b9a1de1732cafcc6c563da345ba25f88ea9c8f150a5182eac89820203786b939be2e
-
SSDEEP
192:TjyjWjijI39a/66153nGKy/sNVv7i4bVRAizy3PnGnlU:/k/6PKy/4AiO3PGnlU
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2944 msedge.exe 2944 msedge.exe 636 msedge.exe 636 msedge.exe 1792 identity_helper.exe 1792 identity_helper.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 636 wrote to memory of 1520 636 msedge.exe 83 PID 636 wrote to memory of 1520 636 msedge.exe 83 PID 636 wrote to memory of 4732 636 msedge.exe 84 PID 636 wrote to memory of 4732 636 msedge.exe 84 PID 636 wrote to memory of 4732 636 msedge.exe 84 PID 636 wrote to memory of 4732 636 msedge.exe 84 PID 636 wrote to memory of 4732 636 msedge.exe 84 PID 636 wrote to memory of 4732 636 msedge.exe 84 PID 636 wrote to memory of 4732 636 msedge.exe 84 PID 636 wrote to memory of 4732 636 msedge.exe 84 PID 636 wrote to memory of 4732 636 msedge.exe 84 PID 636 wrote to memory of 4732 636 msedge.exe 84 PID 636 wrote to memory of 4732 636 msedge.exe 84 PID 636 wrote to memory of 4732 636 msedge.exe 84 PID 636 wrote to memory of 4732 636 msedge.exe 84 PID 636 wrote to memory of 4732 636 msedge.exe 84 PID 636 wrote to memory of 4732 636 msedge.exe 84 PID 636 wrote to memory of 4732 636 msedge.exe 84 PID 636 wrote to memory of 4732 636 msedge.exe 84 PID 636 wrote to memory of 4732 636 msedge.exe 84 PID 636 wrote to memory of 4732 636 msedge.exe 84 PID 636 wrote to memory of 4732 636 msedge.exe 84 PID 636 wrote to memory of 4732 636 msedge.exe 84 PID 636 wrote to memory of 4732 636 msedge.exe 84 PID 636 wrote to memory of 4732 636 msedge.exe 84 PID 636 wrote to memory of 4732 636 msedge.exe 84 PID 636 wrote to memory of 4732 636 msedge.exe 84 PID 636 wrote to memory of 4732 636 msedge.exe 84 PID 636 wrote to memory of 4732 636 msedge.exe 84 PID 636 wrote to memory of 4732 636 msedge.exe 84 PID 636 wrote to memory of 4732 636 msedge.exe 84 PID 636 wrote to memory of 4732 636 msedge.exe 84 PID 636 wrote to memory of 4732 636 msedge.exe 84 PID 636 wrote to memory of 4732 636 msedge.exe 84 PID 636 wrote to memory of 4732 636 msedge.exe 84 PID 636 wrote to memory of 4732 636 msedge.exe 84 PID 636 wrote to memory of 4732 636 msedge.exe 84 PID 636 wrote to memory of 4732 636 msedge.exe 84 PID 636 wrote to memory of 4732 636 msedge.exe 84 PID 636 wrote to memory of 4732 636 msedge.exe 84 PID 636 wrote to memory of 4732 636 msedge.exe 84 PID 636 wrote to memory of 4732 636 msedge.exe 84 PID 636 wrote to memory of 2944 636 msedge.exe 85 PID 636 wrote to memory of 2944 636 msedge.exe 85 PID 636 wrote to memory of 4840 636 msedge.exe 86 PID 636 wrote to memory of 4840 636 msedge.exe 86 PID 636 wrote to memory of 4840 636 msedge.exe 86 PID 636 wrote to memory of 4840 636 msedge.exe 86 PID 636 wrote to memory of 4840 636 msedge.exe 86 PID 636 wrote to memory of 4840 636 msedge.exe 86 PID 636 wrote to memory of 4840 636 msedge.exe 86 PID 636 wrote to memory of 4840 636 msedge.exe 86 PID 636 wrote to memory of 4840 636 msedge.exe 86 PID 636 wrote to memory of 4840 636 msedge.exe 86 PID 636 wrote to memory of 4840 636 msedge.exe 86 PID 636 wrote to memory of 4840 636 msedge.exe 86 PID 636 wrote to memory of 4840 636 msedge.exe 86 PID 636 wrote to memory of 4840 636 msedge.exe 86 PID 636 wrote to memory of 4840 636 msedge.exe 86 PID 636 wrote to memory of 4840 636 msedge.exe 86 PID 636 wrote to memory of 4840 636 msedge.exe 86 PID 636 wrote to memory of 4840 636 msedge.exe 86 PID 636 wrote to memory of 4840 636 msedge.exe 86 PID 636 wrote to memory of 4840 636 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a4c7ee192e79e92e9003298974aa870b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa228f46f8,0x7ffa228f4708,0x7ffa228f47182⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,5811204703569862837,6169148397943138749,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:22⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2200,5811204703569862837,6169148397943138749,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2200,5811204703569862837,6169148397943138749,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,5811204703569862837,6169148397943138749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:2624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,5811204703569862837,6169148397943138749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,5811204703569862837,6169148397943138749,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 /prefetch:82⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,5811204703569862837,6169148397943138749,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,5811204703569862837,6169148397943138749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:12⤵PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,5811204703569862837,6169148397943138749,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2680 /prefetch:12⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,5811204703569862837,6169148397943138749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3900 /prefetch:12⤵PID:316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,5811204703569862837,6169148397943138749,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,5811204703569862837,6169148397943138749,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2280 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4956
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1008
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dabfafd78687947a9de64dd5b776d25f
SHA116084c74980dbad713f9d332091985808b436dea
SHA256c7658f407cbe799282ef202e78319e489ed4e48e23f6d056b505bc0d73e34201
SHA512dae1de5245cd9b72117c430250aa2029eb8df1b85dc414ac50152d8eba4d100bcf0320ac18446f865dc96949f8b06a5b9e7a0c84f9c1b0eada318e80f99f9d2b
-
Filesize
152B
MD5c39b3aa574c0c938c80eb263bb450311
SHA1f4d11275b63f4f906be7a55ec6ca050c62c18c88
SHA25666f8d413a30451055d4b6fa40e007197a4bb93a66a28ca4112967ec417ffab6c
SHA512eeca2e21cd4d66835beb9812e26344c8695584253af397b06f378536ca797c3906a670ed239631729c96ebb93acfb16327cf58d517e83fb8923881c5fdb6d232
-
Filesize
603B
MD5b52bd55e9a4a487140878a9c8d09063e
SHA1975bf431fcfa55ce162610d5b644d7852e779832
SHA256e8e1982e37b5b8e956a63fa17160d5be7f60063906b9b81ecde368e880d3a80b
SHA51216a0215793914ecae08f7851d253c1c0ec961cec05de3c6224ba877632b6a9b5c13beffa4b084865531d2e5f2ff45d418136e2fc0f64641da9a49e4fc0199b2b
-
Filesize
6KB
MD50aabed938b95daf27760594e4e21ac97
SHA151a0f6431a4b62083725b2d930fc4d63098db95d
SHA25690f19625e429282f0160f1a6904bce031fb7ef6273fb74e744ec15f366055891
SHA51284690485776c231034c40d04678fdfe482b0397595bc1923f823b8565e713dce4fb6fa1d1ef571cdba709d16f498b0aa4daa2584ca6925281872702ee1731ccb
-
Filesize
6KB
MD5680a7863cde11a684040d71a6b74ed8b
SHA1529f3b84f2fa1bc9b4ee0ffdd09d63d3054eb7e3
SHA2563e5fc184b1cddd7bd5f98c1b244baa28e383e3d3c98df6d306c2ed18746432b2
SHA512bf53c07a145a58cf93979f7bf0691029c2faa279c7865e061731970667406fe97c8d1cccecc4d3b94ec4e1b14132177587e5437f3061e1c38129ef30c07c0c8c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5425cbc4f5470b523209472f58029d5ea
SHA1cda34f9e0be3e4c363014682b95c41218031d8fc
SHA2567bb4e581eb7a902efe696929f6b6349b23221ebbd2fca105f93a1e7e761b6642
SHA5123314e35d3803793c93c01f6c605d5020ff22340d84398c8c810886782c888366a4c12b98b3b22f39ba642d8c63147412ba5b9e84da3ff0af4ef40e91227150e5