Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14-06-2024 05:55
Static task
static1
Behavioral task
behavioral1
Sample
a839143f0f2a8b86a38bc62506193732_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a839143f0f2a8b86a38bc62506193732_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a839143f0f2a8b86a38bc62506193732_JaffaCakes118.html
-
Size
213KB
-
MD5
a839143f0f2a8b86a38bc62506193732
-
SHA1
91926393c8a633b2299c521b35c85f45e3c8dad8
-
SHA256
122f82728ba326ac45374498677b643657cbc0c39d50e6e26fd8b0870e279886
-
SHA512
1bd470574f2f5e713923472d9559fcc317aa92ad7c04202c5d4b9317200b6825931da83cb2cecfae00dfd0f0cadb36e149d1dced0e83b5798e22b103ef0a3f3e
-
SSDEEP
3072:SZi56Q5LXYAC1wyfkMY+BES09JXAnyrZalI+YQ:SZ2BXktsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1152 msedge.exe 1152 msedge.exe 2972 msedge.exe 2972 msedge.exe 548 identity_helper.exe 548 identity_helper.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2972 wrote to memory of 1536 2972 msedge.exe 82 PID 2972 wrote to memory of 1536 2972 msedge.exe 82 PID 2972 wrote to memory of 4284 2972 msedge.exe 83 PID 2972 wrote to memory of 4284 2972 msedge.exe 83 PID 2972 wrote to memory of 4284 2972 msedge.exe 83 PID 2972 wrote to memory of 4284 2972 msedge.exe 83 PID 2972 wrote to memory of 4284 2972 msedge.exe 83 PID 2972 wrote to memory of 4284 2972 msedge.exe 83 PID 2972 wrote to memory of 4284 2972 msedge.exe 83 PID 2972 wrote to memory of 4284 2972 msedge.exe 83 PID 2972 wrote to memory of 4284 2972 msedge.exe 83 PID 2972 wrote to memory of 4284 2972 msedge.exe 83 PID 2972 wrote to memory of 4284 2972 msedge.exe 83 PID 2972 wrote to memory of 4284 2972 msedge.exe 83 PID 2972 wrote to memory of 4284 2972 msedge.exe 83 PID 2972 wrote to memory of 4284 2972 msedge.exe 83 PID 2972 wrote to memory of 4284 2972 msedge.exe 83 PID 2972 wrote to memory of 4284 2972 msedge.exe 83 PID 2972 wrote to memory of 4284 2972 msedge.exe 83 PID 2972 wrote to memory of 4284 2972 msedge.exe 83 PID 2972 wrote to memory of 4284 2972 msedge.exe 83 PID 2972 wrote to memory of 4284 2972 msedge.exe 83 PID 2972 wrote to memory of 4284 2972 msedge.exe 83 PID 2972 wrote to memory of 4284 2972 msedge.exe 83 PID 2972 wrote to memory of 4284 2972 msedge.exe 83 PID 2972 wrote to memory of 4284 2972 msedge.exe 83 PID 2972 wrote to memory of 4284 2972 msedge.exe 83 PID 2972 wrote to memory of 4284 2972 msedge.exe 83 PID 2972 wrote to memory of 4284 2972 msedge.exe 83 PID 2972 wrote to memory of 4284 2972 msedge.exe 83 PID 2972 wrote to memory of 4284 2972 msedge.exe 83 PID 2972 wrote to memory of 4284 2972 msedge.exe 83 PID 2972 wrote to memory of 4284 2972 msedge.exe 83 PID 2972 wrote to memory of 4284 2972 msedge.exe 83 PID 2972 wrote to memory of 4284 2972 msedge.exe 83 PID 2972 wrote to memory of 4284 2972 msedge.exe 83 PID 2972 wrote to memory of 4284 2972 msedge.exe 83 PID 2972 wrote to memory of 4284 2972 msedge.exe 83 PID 2972 wrote to memory of 4284 2972 msedge.exe 83 PID 2972 wrote to memory of 4284 2972 msedge.exe 83 PID 2972 wrote to memory of 4284 2972 msedge.exe 83 PID 2972 wrote to memory of 4284 2972 msedge.exe 83 PID 2972 wrote to memory of 1152 2972 msedge.exe 84 PID 2972 wrote to memory of 1152 2972 msedge.exe 84 PID 2972 wrote to memory of 2836 2972 msedge.exe 85 PID 2972 wrote to memory of 2836 2972 msedge.exe 85 PID 2972 wrote to memory of 2836 2972 msedge.exe 85 PID 2972 wrote to memory of 2836 2972 msedge.exe 85 PID 2972 wrote to memory of 2836 2972 msedge.exe 85 PID 2972 wrote to memory of 2836 2972 msedge.exe 85 PID 2972 wrote to memory of 2836 2972 msedge.exe 85 PID 2972 wrote to memory of 2836 2972 msedge.exe 85 PID 2972 wrote to memory of 2836 2972 msedge.exe 85 PID 2972 wrote to memory of 2836 2972 msedge.exe 85 PID 2972 wrote to memory of 2836 2972 msedge.exe 85 PID 2972 wrote to memory of 2836 2972 msedge.exe 85 PID 2972 wrote to memory of 2836 2972 msedge.exe 85 PID 2972 wrote to memory of 2836 2972 msedge.exe 85 PID 2972 wrote to memory of 2836 2972 msedge.exe 85 PID 2972 wrote to memory of 2836 2972 msedge.exe 85 PID 2972 wrote to memory of 2836 2972 msedge.exe 85 PID 2972 wrote to memory of 2836 2972 msedge.exe 85 PID 2972 wrote to memory of 2836 2972 msedge.exe 85 PID 2972 wrote to memory of 2836 2972 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a839143f0f2a8b86a38bc62506193732_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc19cc46f8,0x7ffc19cc4708,0x7ffc19cc47182⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,5176160488277841712,12108344435281595107,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:22⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,5176160488277841712,12108344435281595107,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,5176160488277841712,12108344435281595107,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:2836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,5176160488277841712,12108344435281595107,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,5176160488277841712,12108344435281595107,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,5176160488277841712,12108344435281595107,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4976 /prefetch:82⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,5176160488277841712,12108344435281595107,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4976 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,5176160488277841712,12108344435281595107,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,5176160488277841712,12108344435281595107,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4556 /prefetch:12⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,5176160488277841712,12108344435281595107,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3116 /prefetch:12⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,5176160488277841712,12108344435281595107,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,5176160488277841712,12108344435281595107,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4948 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2256
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2528
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
5KB
MD5d53da753eb0fd01d38f349572b66d9de
SHA1aeb1809a1b97c2d38b3a972c7b3a32c91bdb7080
SHA25618a4c97a4eb13673fddb5fd51b1cfb4e9789e60f7f7cddeb678590300ec51907
SHA5120079d4aadda65e605b05f91b39928100f84b935d15f2741fc332a41c9744eef91bc2687787ef104f7bce7ae36db611316b56537e73441ce5268e9602aea902a4
-
Filesize
5KB
MD5eb91567d86e68a40fee2583272fc0a28
SHA103b30346d70e855103f0b5ce4ba538c3110138a1
SHA25629f1d318eb3685ad2cf8d161e1e024a8a00e8aade5c19ca448cd3032fe1497b4
SHA5122e4ac3d2860be3cebd15be1510fe728833bf78101062fcee76dff6ef7914b68a07098edad096e618861373647e68b4437d6bc37309dca2dcd09d0e3ccaf1789f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD52c7d44c13e076ff3236be8ba9409fc68
SHA1bbc96b7412426456812bbe834479a3fdac066a14
SHA2567664353a3f0f6490eb6434fa588ed6988d61cb3be92d6c0667db70df7e9c7aad
SHA5121c452cebace6ab4601a00194c7715c502b53b9ba14343e7188fafc75a9c12544debdbbce07dcc4f81c6abc240b0a0dbd5008210866b98955fe22b4075071e7ab