Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2024, 10:01
Static task
static1
Behavioral task
behavioral1
Sample
a4fa24d2e84127eea6288faa72b93cf9_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a4fa24d2e84127eea6288faa72b93cf9_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a4fa24d2e84127eea6288faa72b93cf9_JaffaCakes118.html
-
Size
46KB
-
MD5
a4fa24d2e84127eea6288faa72b93cf9
-
SHA1
7e99868378de2bcc8662b50f0656b0749aaf65ee
-
SHA256
d048b17142319f1567f775c4ea94444a80fc90f6ccd091d5e3add5664ecb3961
-
SHA512
253d16a6956b31d68fddaf76d6c95b6b545004d8c19f68b29b37fd738aa5775858123b062e5e04aec2f97ce8bb09fc16048e4f65f8a60b7e3475e28e2aa31974
-
SSDEEP
768:Lr1F16EtgLQhbCNiXLGiREd/lCRwJGt0ghirjI80qqYGJvu+XUoCraEDz4AGRYiP:1H6EtgLQhbCQXLV+XCRwJG0gKjIfDYGr
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2948 msedge.exe 2948 msedge.exe 2012 msedge.exe 2012 msedge.exe 2056 identity_helper.exe 2056 identity_helper.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2948 wrote to memory of 5060 2948 msedge.exe 82 PID 2948 wrote to memory of 5060 2948 msedge.exe 82 PID 2948 wrote to memory of 824 2948 msedge.exe 83 PID 2948 wrote to memory of 824 2948 msedge.exe 83 PID 2948 wrote to memory of 824 2948 msedge.exe 83 PID 2948 wrote to memory of 824 2948 msedge.exe 83 PID 2948 wrote to memory of 824 2948 msedge.exe 83 PID 2948 wrote to memory of 824 2948 msedge.exe 83 PID 2948 wrote to memory of 824 2948 msedge.exe 83 PID 2948 wrote to memory of 824 2948 msedge.exe 83 PID 2948 wrote to memory of 824 2948 msedge.exe 83 PID 2948 wrote to memory of 824 2948 msedge.exe 83 PID 2948 wrote to memory of 824 2948 msedge.exe 83 PID 2948 wrote to memory of 824 2948 msedge.exe 83 PID 2948 wrote to memory of 824 2948 msedge.exe 83 PID 2948 wrote to memory of 824 2948 msedge.exe 83 PID 2948 wrote to memory of 824 2948 msedge.exe 83 PID 2948 wrote to memory of 824 2948 msedge.exe 83 PID 2948 wrote to memory of 824 2948 msedge.exe 83 PID 2948 wrote to memory of 824 2948 msedge.exe 83 PID 2948 wrote to memory of 824 2948 msedge.exe 83 PID 2948 wrote to memory of 824 2948 msedge.exe 83 PID 2948 wrote to memory of 824 2948 msedge.exe 83 PID 2948 wrote to memory of 824 2948 msedge.exe 83 PID 2948 wrote to memory of 824 2948 msedge.exe 83 PID 2948 wrote to memory of 824 2948 msedge.exe 83 PID 2948 wrote to memory of 824 2948 msedge.exe 83 PID 2948 wrote to memory of 824 2948 msedge.exe 83 PID 2948 wrote to memory of 824 2948 msedge.exe 83 PID 2948 wrote to memory of 824 2948 msedge.exe 83 PID 2948 wrote to memory of 824 2948 msedge.exe 83 PID 2948 wrote to memory of 824 2948 msedge.exe 83 PID 2948 wrote to memory of 824 2948 msedge.exe 83 PID 2948 wrote to memory of 824 2948 msedge.exe 83 PID 2948 wrote to memory of 824 2948 msedge.exe 83 PID 2948 wrote to memory of 824 2948 msedge.exe 83 PID 2948 wrote to memory of 824 2948 msedge.exe 83 PID 2948 wrote to memory of 824 2948 msedge.exe 83 PID 2948 wrote to memory of 824 2948 msedge.exe 83 PID 2948 wrote to memory of 824 2948 msedge.exe 83 PID 2948 wrote to memory of 824 2948 msedge.exe 83 PID 2948 wrote to memory of 824 2948 msedge.exe 83 PID 2948 wrote to memory of 2012 2948 msedge.exe 84 PID 2948 wrote to memory of 2012 2948 msedge.exe 84 PID 2948 wrote to memory of 772 2948 msedge.exe 85 PID 2948 wrote to memory of 772 2948 msedge.exe 85 PID 2948 wrote to memory of 772 2948 msedge.exe 85 PID 2948 wrote to memory of 772 2948 msedge.exe 85 PID 2948 wrote to memory of 772 2948 msedge.exe 85 PID 2948 wrote to memory of 772 2948 msedge.exe 85 PID 2948 wrote to memory of 772 2948 msedge.exe 85 PID 2948 wrote to memory of 772 2948 msedge.exe 85 PID 2948 wrote to memory of 772 2948 msedge.exe 85 PID 2948 wrote to memory of 772 2948 msedge.exe 85 PID 2948 wrote to memory of 772 2948 msedge.exe 85 PID 2948 wrote to memory of 772 2948 msedge.exe 85 PID 2948 wrote to memory of 772 2948 msedge.exe 85 PID 2948 wrote to memory of 772 2948 msedge.exe 85 PID 2948 wrote to memory of 772 2948 msedge.exe 85 PID 2948 wrote to memory of 772 2948 msedge.exe 85 PID 2948 wrote to memory of 772 2948 msedge.exe 85 PID 2948 wrote to memory of 772 2948 msedge.exe 85 PID 2948 wrote to memory of 772 2948 msedge.exe 85 PID 2948 wrote to memory of 772 2948 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a4fa24d2e84127eea6288faa72b93cf9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff12b746f8,0x7fff12b74708,0x7fff12b747182⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,10341155748726679294,4982725434716301733,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,10341155748726679294,4982725434716301733,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,10341155748726679294,4982725434716301733,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2424 /prefetch:82⤵PID:772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,10341155748726679294,4982725434716301733,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2864 /prefetch:12⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,10341155748726679294,4982725434716301733,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2884 /prefetch:12⤵PID:1748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,10341155748726679294,4982725434716301733,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,10341155748726679294,4982725434716301733,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:12⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,10341155748726679294,4982725434716301733,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 /prefetch:82⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,10341155748726679294,4982725434716301733,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,10341155748726679294,4982725434716301733,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:3788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,10341155748726679294,4982725434716301733,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,10341155748726679294,4982725434716301733,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5168 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1928
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4972
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD5bd01f9897d3710e4bfb2f7c286646aac
SHA10d2da347cdc0eb7886783a9627ea736ac3d85ba3
SHA256cc64d51c5cfcb81ddfe4bf42ca9760ba68faee3f608dc5caca6bf155a3f47bba
SHA512fbc353f01f1bbe25b7880b4d0ce706986065ae6482a4582c95256f069783bfb26d2a15b93f1e65816b1fb4341cdd55853b7874f5fa646aa38955fbe0d954fbf4
-
Filesize
5KB
MD5e153796d18a5b3331fe73d8e755dda66
SHA179aa8ebb97ce07f0ec41050fbe55a01ffa397770
SHA256c767ac37298974f4d3f9dab84f5e1bf5dd8d92a96d9606d4de88510ffd3d612f
SHA5127756f862c1e8ecb72ac3905c630e9c5943e149729306c4e145d9749eadd1b53bee29192829841ecebd8fc1c733d112022b97ae7443c08036370d29ac2c39b305
-
Filesize
6KB
MD52d1d7285444458f2e8c1ac755f96d997
SHA18087b88f73caba79be6cb6845983710208f19939
SHA256e4aea2d63ef921bf8ec80ee65e10a852691c77225bd02908dd9d469cd728d19f
SHA512bd7f39395bdb6eaa2675f9cb34d30d9e6e2bf3ce2a74fd24f3a1f30bca25a04a2d2aebb5d77fcaded17759724564529222a31224dc943c932dd311fc590a8420
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD54a1969207669dcae6b8b3c728c460298
SHA1df11407dc755d1b9b9c48fe571ff9021c028e04a
SHA256b4dcd17db6c3056f0ac5caa8bfb9f78875a7e70fc21160d2d33030c7872922bb
SHA51284638e2c8b58926c8de4bb9f3ce9bd51fa9c6033ec738add91c4340e8e17470183cf57ecad77510efaa07b651ecd68dbec95e40d1edca3561e67c2b16641bb41