Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2024, 09:12
Static task
static1
Behavioral task
behavioral1
Sample
a4cb9561272234af99a7b2643a9ea036_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a4cb9561272234af99a7b2643a9ea036_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a4cb9561272234af99a7b2643a9ea036_JaffaCakes118.html
-
Size
213KB
-
MD5
a4cb9561272234af99a7b2643a9ea036
-
SHA1
91e94620834d14315f5b4361b05a37293ad2af7e
-
SHA256
6e2e12fd838939f0884ee8379a5a4b62faecac2c562816c913723d8ee7332be0
-
SHA512
d8a82641dc4135f34b6d29b29e7f8eec1dd75554e7731eba69e0155bdf0e7e7f949b327a758a3b3ef191a886544522e5558034d62bb38b7d13b73ed3b779034b
-
SSDEEP
3072:SuPyN2TutUIFvyfkMY+BES09JXAnyrZalI+YQ:Su5y7F6sMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1356 msedge.exe 1356 msedge.exe 4792 msedge.exe 4792 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4792 msedge.exe 4792 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4792 wrote to memory of 4576 4792 msedge.exe 81 PID 4792 wrote to memory of 4576 4792 msedge.exe 81 PID 4792 wrote to memory of 4064 4792 msedge.exe 82 PID 4792 wrote to memory of 4064 4792 msedge.exe 82 PID 4792 wrote to memory of 4064 4792 msedge.exe 82 PID 4792 wrote to memory of 4064 4792 msedge.exe 82 PID 4792 wrote to memory of 4064 4792 msedge.exe 82 PID 4792 wrote to memory of 4064 4792 msedge.exe 82 PID 4792 wrote to memory of 4064 4792 msedge.exe 82 PID 4792 wrote to memory of 4064 4792 msedge.exe 82 PID 4792 wrote to memory of 4064 4792 msedge.exe 82 PID 4792 wrote to memory of 4064 4792 msedge.exe 82 PID 4792 wrote to memory of 4064 4792 msedge.exe 82 PID 4792 wrote to memory of 4064 4792 msedge.exe 82 PID 4792 wrote to memory of 4064 4792 msedge.exe 82 PID 4792 wrote to memory of 4064 4792 msedge.exe 82 PID 4792 wrote to memory of 4064 4792 msedge.exe 82 PID 4792 wrote to memory of 4064 4792 msedge.exe 82 PID 4792 wrote to memory of 4064 4792 msedge.exe 82 PID 4792 wrote to memory of 4064 4792 msedge.exe 82 PID 4792 wrote to memory of 4064 4792 msedge.exe 82 PID 4792 wrote to memory of 4064 4792 msedge.exe 82 PID 4792 wrote to memory of 4064 4792 msedge.exe 82 PID 4792 wrote to memory of 4064 4792 msedge.exe 82 PID 4792 wrote to memory of 4064 4792 msedge.exe 82 PID 4792 wrote to memory of 4064 4792 msedge.exe 82 PID 4792 wrote to memory of 4064 4792 msedge.exe 82 PID 4792 wrote to memory of 4064 4792 msedge.exe 82 PID 4792 wrote to memory of 4064 4792 msedge.exe 82 PID 4792 wrote to memory of 4064 4792 msedge.exe 82 PID 4792 wrote to memory of 4064 4792 msedge.exe 82 PID 4792 wrote to memory of 4064 4792 msedge.exe 82 PID 4792 wrote to memory of 4064 4792 msedge.exe 82 PID 4792 wrote to memory of 4064 4792 msedge.exe 82 PID 4792 wrote to memory of 4064 4792 msedge.exe 82 PID 4792 wrote to memory of 4064 4792 msedge.exe 82 PID 4792 wrote to memory of 4064 4792 msedge.exe 82 PID 4792 wrote to memory of 4064 4792 msedge.exe 82 PID 4792 wrote to memory of 4064 4792 msedge.exe 82 PID 4792 wrote to memory of 4064 4792 msedge.exe 82 PID 4792 wrote to memory of 4064 4792 msedge.exe 82 PID 4792 wrote to memory of 4064 4792 msedge.exe 82 PID 4792 wrote to memory of 1356 4792 msedge.exe 83 PID 4792 wrote to memory of 1356 4792 msedge.exe 83 PID 4792 wrote to memory of 3232 4792 msedge.exe 84 PID 4792 wrote to memory of 3232 4792 msedge.exe 84 PID 4792 wrote to memory of 3232 4792 msedge.exe 84 PID 4792 wrote to memory of 3232 4792 msedge.exe 84 PID 4792 wrote to memory of 3232 4792 msedge.exe 84 PID 4792 wrote to memory of 3232 4792 msedge.exe 84 PID 4792 wrote to memory of 3232 4792 msedge.exe 84 PID 4792 wrote to memory of 3232 4792 msedge.exe 84 PID 4792 wrote to memory of 3232 4792 msedge.exe 84 PID 4792 wrote to memory of 3232 4792 msedge.exe 84 PID 4792 wrote to memory of 3232 4792 msedge.exe 84 PID 4792 wrote to memory of 3232 4792 msedge.exe 84 PID 4792 wrote to memory of 3232 4792 msedge.exe 84 PID 4792 wrote to memory of 3232 4792 msedge.exe 84 PID 4792 wrote to memory of 3232 4792 msedge.exe 84 PID 4792 wrote to memory of 3232 4792 msedge.exe 84 PID 4792 wrote to memory of 3232 4792 msedge.exe 84 PID 4792 wrote to memory of 3232 4792 msedge.exe 84 PID 4792 wrote to memory of 3232 4792 msedge.exe 84 PID 4792 wrote to memory of 3232 4792 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a4cb9561272234af99a7b2643a9ea036_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffb7be46f8,0x7fffb7be4708,0x7fffb7be47182⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,541594168989263048,7730281706754605907,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,541594168989263048,7730281706754605907,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,541594168989263048,7730281706754605907,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2592 /prefetch:82⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,541594168989263048,7730281706754605907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2852 /prefetch:12⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,541594168989263048,7730281706754605907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2864 /prefetch:12⤵PID:3908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,541594168989263048,7730281706754605907,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4860 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5020
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:408
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1188
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5477462b6ad8eaaf8d38f5e3a4daf17b0
SHA186174e670c44767c08a39cc2a53c09c318326201
SHA256e6bbd4933b9baa1df4bb633319174de07db176ec215e71c8568d27c5c577184d
SHA512a0acc2ef7fd0fcf413572eeb94d1e38aa6a682195cc03d6eaaaa0bc9e5f4b2c0033da0b835f4617aebc52069d0a10b52fc31ed53c2fe7943a480b55b7481dd4e
-
Filesize
152B
MD5b704c9ca0493bd4548ac9c69dc4a4f27
SHA1a3e5e54e630dabe55ca18a798d9f5681e0620ba7
SHA2562ebd5229b9dc642afba36a27c7ac12d90196b1c50985c37e94f4c17474e15411
SHA51269c8116fb542b344a8c55e2658078bd3e0d3564b1e4c889b072dbc99d2b070dacbc4394dedbc22a4968a8cf9448e71f69ec71ded018c1bacc0e195b3b3072d32
-
Filesize
6KB
MD568dbaf3a43e52b70d429d08414aed2d5
SHA1d77b6d86db18ff484eec635682454e2009097bac
SHA256bd64ca6bbb71f52900ff758d021d0c3f57a28669189ba681d67edee6282873a3
SHA512a51648eebe45af1f28fdeb1192244efa2b0488641993e3896fd3735bceeadec0143c19083d3959bfb32633a09b32004542da283785876107bd203431a44ee45a
-
Filesize
6KB
MD56d420a1052a539bdbf21b4b354e77b22
SHA10ea50f7f029b97e4cb03c24b4921b7a4b62098c3
SHA2564a34ff9886a3274c2ed19de770cdae3097af0ba7a3c9562de1321b8fae024f1c
SHA512415a5678bd96afb3a677a09397bdb3d45c29598ef0fd63a5698e19bed0a2b04ea96f1307fbe72efd71736a7abe32b0b7679dcef66ff47743c976229f16fece13
-
Filesize
11KB
MD5fdbc385143cb652ac7ac6a677cec47f3
SHA1336db9e23b3c54b198f063b92d684ea9acda69d0
SHA2565601a0105280ef956436ce9d057e0b2766e45810f2db0c18ce98b31d63aae264
SHA51268899fb340164ef18254f18f4820c8f94f42ee802de1afce8a6dd43dcb0c9bee4941260b682876c204cbef67ec4dcd2a4b6f89421eacefda289adcbc31c957b8