Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2024 10:36
Static task
static1
Behavioral task
behavioral1
Sample
a51bca3906829334b79900818ede3133_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
a51bca3906829334b79900818ede3133_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a51bca3906829334b79900818ede3133_JaffaCakes118.html
-
Size
348KB
-
MD5
a51bca3906829334b79900818ede3133
-
SHA1
9ae6c73be8ca0a53174d5e5ec0abed31b10623b7
-
SHA256
297f9677d41881f6f18192104fb64c6dd86c6d862a1a05039746a35f24b00bf3
-
SHA512
825bd0ff9beb95870e14037805724e97e4c833d357c5edb36753884e6588a58330754971f6cafc0d04ada20b8b0823e1b1ef6571bbd2381c5a796bcc72513ae3
-
SSDEEP
6144:YsMYod+X3oI+Y+OnsMYod+X3oI+Y5sMYod+X3oI+YQ:m5d+X335d+X3f5d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 452 msedge.exe 452 msedge.exe 4432 msedge.exe 4432 msedge.exe 2464 identity_helper.exe 2464 identity_helper.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4432 wrote to memory of 1832 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 1832 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 3704 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 3704 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 3704 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 3704 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 3704 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 3704 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 3704 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 3704 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 3704 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 3704 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 3704 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 3704 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 3704 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 3704 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 3704 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 3704 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 3704 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 3704 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 3704 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 3704 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 3704 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 3704 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 3704 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 3704 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 3704 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 3704 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 3704 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 3704 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 3704 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 3704 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 3704 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 3704 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 3704 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 3704 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 3704 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 3704 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 3704 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 3704 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 3704 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 3704 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 452 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 452 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 1652 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 1652 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 1652 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 1652 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 1652 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 1652 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 1652 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 1652 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 1652 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 1652 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 1652 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 1652 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 1652 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 1652 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 1652 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 1652 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 1652 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 1652 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 1652 4432 msedge.exe msedge.exe PID 4432 wrote to memory of 1652 4432 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a51bca3906829334b79900818ede3133_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9a24f46f8,0x7ff9a24f4708,0x7ff9a24f47182⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,4431942076950317662,16643852553187341010,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2184,4431942076950317662,16643852553187341010,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2184,4431942076950317662,16643852553187341010,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,4431942076950317662,16643852553187341010,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,4431942076950317662,16643852553187341010,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,4431942076950317662,16643852553187341010,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,4431942076950317662,16643852553187341010,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,4431942076950317662,16643852553187341010,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,4431942076950317662,16643852553187341010,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,4431942076950317662,16643852553187341010,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,4431942076950317662,16643852553187341010,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,4431942076950317662,16643852553187341010,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3948 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5dabfafd78687947a9de64dd5b776d25f
SHA116084c74980dbad713f9d332091985808b436dea
SHA256c7658f407cbe799282ef202e78319e489ed4e48e23f6d056b505bc0d73e34201
SHA512dae1de5245cd9b72117c430250aa2029eb8df1b85dc414ac50152d8eba4d100bcf0320ac18446f865dc96949f8b06a5b9e7a0c84f9c1b0eada318e80f99f9d2b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5c39b3aa574c0c938c80eb263bb450311
SHA1f4d11275b63f4f906be7a55ec6ca050c62c18c88
SHA25666f8d413a30451055d4b6fa40e007197a4bb93a66a28ca4112967ec417ffab6c
SHA512eeca2e21cd4d66835beb9812e26344c8695584253af397b06f378536ca797c3906a670ed239631729c96ebb93acfb16327cf58d517e83fb8923881c5fdb6d232
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD5014ccfc81aa979cf5fec801bf03b8d14
SHA124a929cc1c157175aa914b53109051561fa84c34
SHA256a4492021cdd09006943468d0f4b8c4dfbde089da94131c436d89d19f6f292def
SHA51204cbe327d194aed5007d2bbcd7783e08d9fdbe4835e9cbfb00b45589bd5ea5b4c23a09d0f8fe9916206fee79166c0dffc77c9fa3494b1f1443ed75fd6cc1b447
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD52adcef9cb1f52b3af0c566f5bc37bf47
SHA1063423f28131c692429b1ba82710eb58169557d1
SHA256799465df5cff1d70cdeb0b6c7ed323f6d3ee2ad492a8753d0179c8d0ca2cac17
SHA5126873fbc0b1bf44334f4752a5a1ffa233326f89dcb1bc668908098f65ec1cc4bf04843f7c6f423b5e6cf69d8b5dfb0bcd9008e5aa68f39b192b2dfebbb4941a99
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD5de156b72cb19173a08fa4422ba62d02c
SHA17d0c47c609e3a43e7e5adfdc68acd4faf10837bd
SHA256c3acb085dbad4d5d1c96b07b0c0ae86bf6fe2634d37139edacc44764393d87a6
SHA51201bbea35594684d066919422dc41075994ab6c3cebb1ce60852e61accdaca37fe52b4d69eff68e18ec5c2c69a12b7c0b5d7f8ce0def287887760ded2781acabf
-
\??\pipe\LOCAL\crashpad_4432_DBYUKPTAVQHVMJXJMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e