Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2024, 14:29
Static task
static1
Behavioral task
behavioral1
Sample
a606196fbd219b857c96a7e2c384c3e4_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a606196fbd219b857c96a7e2c384c3e4_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a606196fbd219b857c96a7e2c384c3e4_JaffaCakes118.html
-
Size
139KB
-
MD5
a606196fbd219b857c96a7e2c384c3e4
-
SHA1
fcc8d3d93fb8b33026463b59d3f28c73c7e34440
-
SHA256
16a5b0b5e1e553f4b56d3c6b01d72a7b08ea5cfa70f420e3006eab5d050c26f9
-
SHA512
5b38f2ee258253733eca8e4e8541d85d3de5bb8b4bbe531d670b09f175d70fb7ef046b7665ccade9a020c97cb3bc7c3a12509457d0d1ced540f1911757844b7b
-
SSDEEP
1536:SvdkOiJyr0kl847yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJA:SvZr0547yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1052 msedge.exe 1052 msedge.exe 3272 msedge.exe 3272 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3272 msedge.exe 3272 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3272 wrote to memory of 3032 3272 msedge.exe 82 PID 3272 wrote to memory of 3032 3272 msedge.exe 82 PID 3272 wrote to memory of 4392 3272 msedge.exe 84 PID 3272 wrote to memory of 4392 3272 msedge.exe 84 PID 3272 wrote to memory of 4392 3272 msedge.exe 84 PID 3272 wrote to memory of 4392 3272 msedge.exe 84 PID 3272 wrote to memory of 4392 3272 msedge.exe 84 PID 3272 wrote to memory of 4392 3272 msedge.exe 84 PID 3272 wrote to memory of 4392 3272 msedge.exe 84 PID 3272 wrote to memory of 4392 3272 msedge.exe 84 PID 3272 wrote to memory of 4392 3272 msedge.exe 84 PID 3272 wrote to memory of 4392 3272 msedge.exe 84 PID 3272 wrote to memory of 4392 3272 msedge.exe 84 PID 3272 wrote to memory of 4392 3272 msedge.exe 84 PID 3272 wrote to memory of 4392 3272 msedge.exe 84 PID 3272 wrote to memory of 4392 3272 msedge.exe 84 PID 3272 wrote to memory of 4392 3272 msedge.exe 84 PID 3272 wrote to memory of 4392 3272 msedge.exe 84 PID 3272 wrote to memory of 4392 3272 msedge.exe 84 PID 3272 wrote to memory of 4392 3272 msedge.exe 84 PID 3272 wrote to memory of 4392 3272 msedge.exe 84 PID 3272 wrote to memory of 4392 3272 msedge.exe 84 PID 3272 wrote to memory of 4392 3272 msedge.exe 84 PID 3272 wrote to memory of 4392 3272 msedge.exe 84 PID 3272 wrote to memory of 4392 3272 msedge.exe 84 PID 3272 wrote to memory of 4392 3272 msedge.exe 84 PID 3272 wrote to memory of 4392 3272 msedge.exe 84 PID 3272 wrote to memory of 4392 3272 msedge.exe 84 PID 3272 wrote to memory of 4392 3272 msedge.exe 84 PID 3272 wrote to memory of 4392 3272 msedge.exe 84 PID 3272 wrote to memory of 4392 3272 msedge.exe 84 PID 3272 wrote to memory of 4392 3272 msedge.exe 84 PID 3272 wrote to memory of 4392 3272 msedge.exe 84 PID 3272 wrote to memory of 4392 3272 msedge.exe 84 PID 3272 wrote to memory of 4392 3272 msedge.exe 84 PID 3272 wrote to memory of 4392 3272 msedge.exe 84 PID 3272 wrote to memory of 4392 3272 msedge.exe 84 PID 3272 wrote to memory of 4392 3272 msedge.exe 84 PID 3272 wrote to memory of 4392 3272 msedge.exe 84 PID 3272 wrote to memory of 4392 3272 msedge.exe 84 PID 3272 wrote to memory of 4392 3272 msedge.exe 84 PID 3272 wrote to memory of 4392 3272 msedge.exe 84 PID 3272 wrote to memory of 1052 3272 msedge.exe 85 PID 3272 wrote to memory of 1052 3272 msedge.exe 85 PID 3272 wrote to memory of 4324 3272 msedge.exe 86 PID 3272 wrote to memory of 4324 3272 msedge.exe 86 PID 3272 wrote to memory of 4324 3272 msedge.exe 86 PID 3272 wrote to memory of 4324 3272 msedge.exe 86 PID 3272 wrote to memory of 4324 3272 msedge.exe 86 PID 3272 wrote to memory of 4324 3272 msedge.exe 86 PID 3272 wrote to memory of 4324 3272 msedge.exe 86 PID 3272 wrote to memory of 4324 3272 msedge.exe 86 PID 3272 wrote to memory of 4324 3272 msedge.exe 86 PID 3272 wrote to memory of 4324 3272 msedge.exe 86 PID 3272 wrote to memory of 4324 3272 msedge.exe 86 PID 3272 wrote to memory of 4324 3272 msedge.exe 86 PID 3272 wrote to memory of 4324 3272 msedge.exe 86 PID 3272 wrote to memory of 4324 3272 msedge.exe 86 PID 3272 wrote to memory of 4324 3272 msedge.exe 86 PID 3272 wrote to memory of 4324 3272 msedge.exe 86 PID 3272 wrote to memory of 4324 3272 msedge.exe 86 PID 3272 wrote to memory of 4324 3272 msedge.exe 86 PID 3272 wrote to memory of 4324 3272 msedge.exe 86 PID 3272 wrote to memory of 4324 3272 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a606196fbd219b857c96a7e2c384c3e4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb408246f8,0x7ffb40824708,0x7ffb408247182⤵PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,2442361124841685565,3616716417236338627,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,2442361124841685565,3616716417236338627,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2080 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,2442361124841685565,3616716417236338627,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,2442361124841685565,3616716417236338627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,2442361124841685565,3616716417236338627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,2442361124841685565,3616716417236338627,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4588
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1104
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3236
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5477462b6ad8eaaf8d38f5e3a4daf17b0
SHA186174e670c44767c08a39cc2a53c09c318326201
SHA256e6bbd4933b9baa1df4bb633319174de07db176ec215e71c8568d27c5c577184d
SHA512a0acc2ef7fd0fcf413572eeb94d1e38aa6a682195cc03d6eaaaa0bc9e5f4b2c0033da0b835f4617aebc52069d0a10b52fc31ed53c2fe7943a480b55b7481dd4e
-
Filesize
152B
MD5b704c9ca0493bd4548ac9c69dc4a4f27
SHA1a3e5e54e630dabe55ca18a798d9f5681e0620ba7
SHA2562ebd5229b9dc642afba36a27c7ac12d90196b1c50985c37e94f4c17474e15411
SHA51269c8116fb542b344a8c55e2658078bd3e0d3564b1e4c889b072dbc99d2b070dacbc4394dedbc22a4968a8cf9448e71f69ec71ded018c1bacc0e195b3b3072d32
-
Filesize
6KB
MD595a3ae9164bebdb421b0d6ab89da109a
SHA1da82d89b2e778ad11c5708b52106be116ace30f2
SHA2565a064eee9da10ae771df34ee0d19b53b5322f8ecf0576b1ad67ad1417e991a48
SHA512f1bc269be3fe91ed15fd7a75250973d119017a3ea4fbc30bf5ffdc9cdb9f1a0f36f2bd66a115055dc3ba2aa4d8b9443d275655b08dbbae83718c55054857270b
-
Filesize
6KB
MD5a71695b2fbd298fd2c00baf6900a9342
SHA1b0410551fc6cb67bacce42ce16255924ac26ca97
SHA25601651e292170798ac67b900b60fbe5570216fce94e7f03307b2134bd145b9042
SHA512c0b7385151bfbc9fed9998800611d7bb081ee534206ebdce7c5356b60e8ae9954a5b2a3623cfdf993f453a67babf58c9c0b4094d62dfea6148dcb89603bb6dfb
-
Filesize
11KB
MD57007f0b64b732f079a9e038140809458
SHA102f2ff2443a78766e9f5d006406f688460d3cb6c
SHA256d0568a82106ab53146e8d7febc77fa2911802dc49f7825897d78151192e768b8
SHA512dd546601842dc5408cf44265222ac2dbf830e36acccc8f7b1fd95a04801a574c6488e33547a778f8c699d35d1b80d18272eaa381370d2e06a04c365e8f9432e2