Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14/06/2024, 21:53
Static task
static1
Behavioral task
behavioral1
Sample
aba1ce24f9cccb35226d170d1c9e0a38_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
aba1ce24f9cccb35226d170d1c9e0a38_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
aba1ce24f9cccb35226d170d1c9e0a38_JaffaCakes118.html
-
Size
636B
-
MD5
aba1ce24f9cccb35226d170d1c9e0a38
-
SHA1
68de8bf502f863c2ec5852e2b0ac7520f3f8505e
-
SHA256
ff514c038bfcf60996fc01b6a361d8071ec2b2ac1df6b2981c8551b8bcc935e8
-
SHA512
da53e5ea55c0cfe2967e1c72fc31d1fc63b412ef72db9cac91e0ddc888fc4960eda0c77382affc8c5842d5fff068e5bd8cd31a0fd430463a4105fcaf369efbe9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 888 msedge.exe 888 msedge.exe 1344 msedge.exe 1344 msedge.exe 3592 identity_helper.exe 3592 identity_helper.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1344 wrote to memory of 4416 1344 msedge.exe 81 PID 1344 wrote to memory of 4416 1344 msedge.exe 81 PID 1344 wrote to memory of 720 1344 msedge.exe 82 PID 1344 wrote to memory of 720 1344 msedge.exe 82 PID 1344 wrote to memory of 720 1344 msedge.exe 82 PID 1344 wrote to memory of 720 1344 msedge.exe 82 PID 1344 wrote to memory of 720 1344 msedge.exe 82 PID 1344 wrote to memory of 720 1344 msedge.exe 82 PID 1344 wrote to memory of 720 1344 msedge.exe 82 PID 1344 wrote to memory of 720 1344 msedge.exe 82 PID 1344 wrote to memory of 720 1344 msedge.exe 82 PID 1344 wrote to memory of 720 1344 msedge.exe 82 PID 1344 wrote to memory of 720 1344 msedge.exe 82 PID 1344 wrote to memory of 720 1344 msedge.exe 82 PID 1344 wrote to memory of 720 1344 msedge.exe 82 PID 1344 wrote to memory of 720 1344 msedge.exe 82 PID 1344 wrote to memory of 720 1344 msedge.exe 82 PID 1344 wrote to memory of 720 1344 msedge.exe 82 PID 1344 wrote to memory of 720 1344 msedge.exe 82 PID 1344 wrote to memory of 720 1344 msedge.exe 82 PID 1344 wrote to memory of 720 1344 msedge.exe 82 PID 1344 wrote to memory of 720 1344 msedge.exe 82 PID 1344 wrote to memory of 720 1344 msedge.exe 82 PID 1344 wrote to memory of 720 1344 msedge.exe 82 PID 1344 wrote to memory of 720 1344 msedge.exe 82 PID 1344 wrote to memory of 720 1344 msedge.exe 82 PID 1344 wrote to memory of 720 1344 msedge.exe 82 PID 1344 wrote to memory of 720 1344 msedge.exe 82 PID 1344 wrote to memory of 720 1344 msedge.exe 82 PID 1344 wrote to memory of 720 1344 msedge.exe 82 PID 1344 wrote to memory of 720 1344 msedge.exe 82 PID 1344 wrote to memory of 720 1344 msedge.exe 82 PID 1344 wrote to memory of 720 1344 msedge.exe 82 PID 1344 wrote to memory of 720 1344 msedge.exe 82 PID 1344 wrote to memory of 720 1344 msedge.exe 82 PID 1344 wrote to memory of 720 1344 msedge.exe 82 PID 1344 wrote to memory of 720 1344 msedge.exe 82 PID 1344 wrote to memory of 720 1344 msedge.exe 82 PID 1344 wrote to memory of 720 1344 msedge.exe 82 PID 1344 wrote to memory of 720 1344 msedge.exe 82 PID 1344 wrote to memory of 720 1344 msedge.exe 82 PID 1344 wrote to memory of 720 1344 msedge.exe 82 PID 1344 wrote to memory of 888 1344 msedge.exe 83 PID 1344 wrote to memory of 888 1344 msedge.exe 83 PID 1344 wrote to memory of 4388 1344 msedge.exe 84 PID 1344 wrote to memory of 4388 1344 msedge.exe 84 PID 1344 wrote to memory of 4388 1344 msedge.exe 84 PID 1344 wrote to memory of 4388 1344 msedge.exe 84 PID 1344 wrote to memory of 4388 1344 msedge.exe 84 PID 1344 wrote to memory of 4388 1344 msedge.exe 84 PID 1344 wrote to memory of 4388 1344 msedge.exe 84 PID 1344 wrote to memory of 4388 1344 msedge.exe 84 PID 1344 wrote to memory of 4388 1344 msedge.exe 84 PID 1344 wrote to memory of 4388 1344 msedge.exe 84 PID 1344 wrote to memory of 4388 1344 msedge.exe 84 PID 1344 wrote to memory of 4388 1344 msedge.exe 84 PID 1344 wrote to memory of 4388 1344 msedge.exe 84 PID 1344 wrote to memory of 4388 1344 msedge.exe 84 PID 1344 wrote to memory of 4388 1344 msedge.exe 84 PID 1344 wrote to memory of 4388 1344 msedge.exe 84 PID 1344 wrote to memory of 4388 1344 msedge.exe 84 PID 1344 wrote to memory of 4388 1344 msedge.exe 84 PID 1344 wrote to memory of 4388 1344 msedge.exe 84 PID 1344 wrote to memory of 4388 1344 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\aba1ce24f9cccb35226d170d1c9e0a38_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd6b7d46f8,0x7ffd6b7d4708,0x7ffd6b7d47182⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2272,4740279372987241134,8753459423637675474,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2304 /prefetch:22⤵PID:720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2272,4740279372987241134,8753459423637675474,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2272,4740279372987241134,8753459423637675474,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,4740279372987241134,8753459423637675474,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,4740279372987241134,8753459423637675474,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,4740279372987241134,8753459423637675474,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4216 /prefetch:12⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2272,4740279372987241134,8753459423637675474,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4980 /prefetch:82⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2272,4740279372987241134,8753459423637675474,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4980 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,4740279372987241134,8753459423637675474,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:12⤵PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,4740279372987241134,8753459423637675474,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,4740279372987241134,8753459423637675474,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,4740279372987241134,8753459423637675474,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,4740279372987241134,8753459423637675474,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2272,4740279372987241134,8753459423637675474,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5304 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4320
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5008
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
5KB
MD5154cae64f51999069519513a855a97f2
SHA1db136322a1b38460ed7c10709cb94f563dd191d5
SHA2569139e46e6219ae07921c134e432b5c2a4f10497f1c81688343c59e6e74bce304
SHA512ff00c123a011f6d5f68d2f990117a4f2d93a45c15edf04a007dd5c98a9679b6f46d0d44cadad691d12007c898aaa7c034d2d72dc32906aba90e9eeba5708ffb0
-
Filesize
6KB
MD522e863b45b18762be92e9ba2770edc44
SHA1dd886a1c1d1d31e15d449dbbb39c4e61c29cc371
SHA256c805b8e880c04e1d447b71a397ab1243fa5362f189fd480f139f497e62cc314c
SHA512f1a3b1390914d7e6f7399df185057c25c9f01f9e508369bd2736de11b838011d707b4789c444303c794cf451a34cbefc859d1f210fe2da8ce72928480eddf12d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD531c728ad35dd0d22711bdc160749c222
SHA102d3bd3cec8659e89950d004331dc46029e93c85
SHA25662d16cebf99b326ebab2793fcb5011067263b2801e20e1592bdff129b39d23f9
SHA51293ef47d7148e0eb432d031daa2bd0287b458dcfc171d2fedbcf77b4605ca73fc89b443d462440fd47d02040f049411d1396f6618d00be67c9709eeeeac41a8a7