Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2024, 08:45
Static task
static1
Behavioral task
behavioral1
Sample
a4b119dbe1ea32c771a5b90308e61ba6_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a4b119dbe1ea32c771a5b90308e61ba6_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a4b119dbe1ea32c771a5b90308e61ba6_JaffaCakes118.html
-
Size
213KB
-
MD5
a4b119dbe1ea32c771a5b90308e61ba6
-
SHA1
31c10b2a64dd65601ce5c49f9ff5f10bd075469b
-
SHA256
7b52bcb6e8440b2ec08c048083b8834cd0d18471853152e6091cd1683779bc17
-
SHA512
b2fb1e3b42d5a157c60337abb7e77968dcf89a5b3ff8aa3ded07578bd269dcafc4e6e096c8329bb9fd78011845287994d4e263fc41efcd01789f81068bfcd678
-
SSDEEP
3072:Sv2+p0RlNT54yfkMY+BES09JXAnyrZalI+YQ:SvIn1sMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3496 msedge.exe 3496 msedge.exe 4432 msedge.exe 4432 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe 968 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4432 msedge.exe 4432 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4432 wrote to memory of 3260 4432 msedge.exe 81 PID 4432 wrote to memory of 3260 4432 msedge.exe 81 PID 4432 wrote to memory of 3044 4432 msedge.exe 82 PID 4432 wrote to memory of 3044 4432 msedge.exe 82 PID 4432 wrote to memory of 3044 4432 msedge.exe 82 PID 4432 wrote to memory of 3044 4432 msedge.exe 82 PID 4432 wrote to memory of 3044 4432 msedge.exe 82 PID 4432 wrote to memory of 3044 4432 msedge.exe 82 PID 4432 wrote to memory of 3044 4432 msedge.exe 82 PID 4432 wrote to memory of 3044 4432 msedge.exe 82 PID 4432 wrote to memory of 3044 4432 msedge.exe 82 PID 4432 wrote to memory of 3044 4432 msedge.exe 82 PID 4432 wrote to memory of 3044 4432 msedge.exe 82 PID 4432 wrote to memory of 3044 4432 msedge.exe 82 PID 4432 wrote to memory of 3044 4432 msedge.exe 82 PID 4432 wrote to memory of 3044 4432 msedge.exe 82 PID 4432 wrote to memory of 3044 4432 msedge.exe 82 PID 4432 wrote to memory of 3044 4432 msedge.exe 82 PID 4432 wrote to memory of 3044 4432 msedge.exe 82 PID 4432 wrote to memory of 3044 4432 msedge.exe 82 PID 4432 wrote to memory of 3044 4432 msedge.exe 82 PID 4432 wrote to memory of 3044 4432 msedge.exe 82 PID 4432 wrote to memory of 3044 4432 msedge.exe 82 PID 4432 wrote to memory of 3044 4432 msedge.exe 82 PID 4432 wrote to memory of 3044 4432 msedge.exe 82 PID 4432 wrote to memory of 3044 4432 msedge.exe 82 PID 4432 wrote to memory of 3044 4432 msedge.exe 82 PID 4432 wrote to memory of 3044 4432 msedge.exe 82 PID 4432 wrote to memory of 3044 4432 msedge.exe 82 PID 4432 wrote to memory of 3044 4432 msedge.exe 82 PID 4432 wrote to memory of 3044 4432 msedge.exe 82 PID 4432 wrote to memory of 3044 4432 msedge.exe 82 PID 4432 wrote to memory of 3044 4432 msedge.exe 82 PID 4432 wrote to memory of 3044 4432 msedge.exe 82 PID 4432 wrote to memory of 3044 4432 msedge.exe 82 PID 4432 wrote to memory of 3044 4432 msedge.exe 82 PID 4432 wrote to memory of 3044 4432 msedge.exe 82 PID 4432 wrote to memory of 3044 4432 msedge.exe 82 PID 4432 wrote to memory of 3044 4432 msedge.exe 82 PID 4432 wrote to memory of 3044 4432 msedge.exe 82 PID 4432 wrote to memory of 3044 4432 msedge.exe 82 PID 4432 wrote to memory of 3044 4432 msedge.exe 82 PID 4432 wrote to memory of 3496 4432 msedge.exe 83 PID 4432 wrote to memory of 3496 4432 msedge.exe 83 PID 4432 wrote to memory of 1060 4432 msedge.exe 84 PID 4432 wrote to memory of 1060 4432 msedge.exe 84 PID 4432 wrote to memory of 1060 4432 msedge.exe 84 PID 4432 wrote to memory of 1060 4432 msedge.exe 84 PID 4432 wrote to memory of 1060 4432 msedge.exe 84 PID 4432 wrote to memory of 1060 4432 msedge.exe 84 PID 4432 wrote to memory of 1060 4432 msedge.exe 84 PID 4432 wrote to memory of 1060 4432 msedge.exe 84 PID 4432 wrote to memory of 1060 4432 msedge.exe 84 PID 4432 wrote to memory of 1060 4432 msedge.exe 84 PID 4432 wrote to memory of 1060 4432 msedge.exe 84 PID 4432 wrote to memory of 1060 4432 msedge.exe 84 PID 4432 wrote to memory of 1060 4432 msedge.exe 84 PID 4432 wrote to memory of 1060 4432 msedge.exe 84 PID 4432 wrote to memory of 1060 4432 msedge.exe 84 PID 4432 wrote to memory of 1060 4432 msedge.exe 84 PID 4432 wrote to memory of 1060 4432 msedge.exe 84 PID 4432 wrote to memory of 1060 4432 msedge.exe 84 PID 4432 wrote to memory of 1060 4432 msedge.exe 84 PID 4432 wrote to memory of 1060 4432 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a4b119dbe1ea32c771a5b90308e61ba6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdcac446f8,0x7ffdcac44708,0x7ffdcac447182⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,12629274945206004024,1422533784509579834,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,12629274945206004024,1422533784509579834,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,12629274945206004024,1422533784509579834,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12629274945206004024,1422533784509579834,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12629274945206004024,1422533784509579834,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,12629274945206004024,1422533784509579834,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1296 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:968
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4856
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4260
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dabfafd78687947a9de64dd5b776d25f
SHA116084c74980dbad713f9d332091985808b436dea
SHA256c7658f407cbe799282ef202e78319e489ed4e48e23f6d056b505bc0d73e34201
SHA512dae1de5245cd9b72117c430250aa2029eb8df1b85dc414ac50152d8eba4d100bcf0320ac18446f865dc96949f8b06a5b9e7a0c84f9c1b0eada318e80f99f9d2b
-
Filesize
152B
MD5c39b3aa574c0c938c80eb263bb450311
SHA1f4d11275b63f4f906be7a55ec6ca050c62c18c88
SHA25666f8d413a30451055d4b6fa40e007197a4bb93a66a28ca4112967ec417ffab6c
SHA512eeca2e21cd4d66835beb9812e26344c8695584253af397b06f378536ca797c3906a670ed239631729c96ebb93acfb16327cf58d517e83fb8923881c5fdb6d232
-
Filesize
6KB
MD51843b30ff70bdd21e3d71fe7638321da
SHA10b2b0a713b3bcaa9d0cf1c7e99c779e1a58b4769
SHA2569010c84d815cda87454a11ddb0ce1490a4cdebe48854cdf3026565371af1d0a0
SHA5124754ec0184ecc9fffbe07161150e4ebb088fb83d3ea711ae9b48148204df2ab97191269d5e853ed3b1a9481fc1317a6347650223c219b6a1a99724912052580b
-
Filesize
6KB
MD597f7d298b7c50a348ebf68c442252ec9
SHA13b0314ea76a0b5ecc3a0ec4af2abd6c12f15eb56
SHA256e5211807c1bf9c7d0f876fd903e979538821f6a79714b532576558dd571c938a
SHA512d98482750dedb408a8ee65b115b5cc5395c0187131c091f40e9c31e5b177d09ce7f1689832f2e1d70e96a336c65ef6e05d2923491aa0570b80499bbc68ad798f
-
Filesize
11KB
MD5adc252a9c2b96e615f537539ccb3a864
SHA1896d0fbe249a93e3565279db542811c46075b6a5
SHA256cdc38bac046138963ca79cf65366174fb3c4f7d1e35d8b69a69629f569113bdc
SHA5126295cb80adf56a77f853b3f15c62b742a613ca0db6975fc9da495132eda875356fae76c356ecd44bd5d014721deae99055e9f41fc5fb0b85fbad4e2687d5a51e