Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
14/06/2024, 05:59
Static task
static1
Behavioral task
behavioral1
Sample
a83caf8c3200a2b4d5e18b70d469cb61_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a83caf8c3200a2b4d5e18b70d469cb61_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a83caf8c3200a2b4d5e18b70d469cb61_JaffaCakes118.html
-
Size
20KB
-
MD5
a83caf8c3200a2b4d5e18b70d469cb61
-
SHA1
9137a7ca162bc8a6dd65cd303397d3585134ea7a
-
SHA256
66e21cd70b93c28921a3dab6caf98d6809262d218a5b654f6ad48ff2f26fae97
-
SHA512
422d01a2787d0b71bd6d8b0c01b787e8c470b5cf2434f745d01aa5ecf6974cde1412a54b819934e009caa37dc5b8c755d421bda87fc04fc4b93b2cf736d77fb8
-
SSDEEP
384:0MULJ9ag/G/YtQ+tC4Nw3Khlu6A8gd5aFdl9GkbKgMpNFWQ7S+PpSP2t0vt+P6z:Fg/G/YtQ+tC4Nwa9gnaFz9G0KpNc1+hc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1736 msedge.exe 1736 msedge.exe 4616 msedge.exe 4616 msedge.exe 560 identity_helper.exe 560 identity_helper.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4616 wrote to memory of 312 4616 msedge.exe 82 PID 4616 wrote to memory of 312 4616 msedge.exe 82 PID 4616 wrote to memory of 412 4616 msedge.exe 84 PID 4616 wrote to memory of 412 4616 msedge.exe 84 PID 4616 wrote to memory of 412 4616 msedge.exe 84 PID 4616 wrote to memory of 412 4616 msedge.exe 84 PID 4616 wrote to memory of 412 4616 msedge.exe 84 PID 4616 wrote to memory of 412 4616 msedge.exe 84 PID 4616 wrote to memory of 412 4616 msedge.exe 84 PID 4616 wrote to memory of 412 4616 msedge.exe 84 PID 4616 wrote to memory of 412 4616 msedge.exe 84 PID 4616 wrote to memory of 412 4616 msedge.exe 84 PID 4616 wrote to memory of 412 4616 msedge.exe 84 PID 4616 wrote to memory of 412 4616 msedge.exe 84 PID 4616 wrote to memory of 412 4616 msedge.exe 84 PID 4616 wrote to memory of 412 4616 msedge.exe 84 PID 4616 wrote to memory of 412 4616 msedge.exe 84 PID 4616 wrote to memory of 412 4616 msedge.exe 84 PID 4616 wrote to memory of 412 4616 msedge.exe 84 PID 4616 wrote to memory of 412 4616 msedge.exe 84 PID 4616 wrote to memory of 412 4616 msedge.exe 84 PID 4616 wrote to memory of 412 4616 msedge.exe 84 PID 4616 wrote to memory of 412 4616 msedge.exe 84 PID 4616 wrote to memory of 412 4616 msedge.exe 84 PID 4616 wrote to memory of 412 4616 msedge.exe 84 PID 4616 wrote to memory of 412 4616 msedge.exe 84 PID 4616 wrote to memory of 412 4616 msedge.exe 84 PID 4616 wrote to memory of 412 4616 msedge.exe 84 PID 4616 wrote to memory of 412 4616 msedge.exe 84 PID 4616 wrote to memory of 412 4616 msedge.exe 84 PID 4616 wrote to memory of 412 4616 msedge.exe 84 PID 4616 wrote to memory of 412 4616 msedge.exe 84 PID 4616 wrote to memory of 412 4616 msedge.exe 84 PID 4616 wrote to memory of 412 4616 msedge.exe 84 PID 4616 wrote to memory of 412 4616 msedge.exe 84 PID 4616 wrote to memory of 412 4616 msedge.exe 84 PID 4616 wrote to memory of 412 4616 msedge.exe 84 PID 4616 wrote to memory of 412 4616 msedge.exe 84 PID 4616 wrote to memory of 412 4616 msedge.exe 84 PID 4616 wrote to memory of 412 4616 msedge.exe 84 PID 4616 wrote to memory of 412 4616 msedge.exe 84 PID 4616 wrote to memory of 412 4616 msedge.exe 84 PID 4616 wrote to memory of 1736 4616 msedge.exe 85 PID 4616 wrote to memory of 1736 4616 msedge.exe 85 PID 4616 wrote to memory of 4180 4616 msedge.exe 86 PID 4616 wrote to memory of 4180 4616 msedge.exe 86 PID 4616 wrote to memory of 4180 4616 msedge.exe 86 PID 4616 wrote to memory of 4180 4616 msedge.exe 86 PID 4616 wrote to memory of 4180 4616 msedge.exe 86 PID 4616 wrote to memory of 4180 4616 msedge.exe 86 PID 4616 wrote to memory of 4180 4616 msedge.exe 86 PID 4616 wrote to memory of 4180 4616 msedge.exe 86 PID 4616 wrote to memory of 4180 4616 msedge.exe 86 PID 4616 wrote to memory of 4180 4616 msedge.exe 86 PID 4616 wrote to memory of 4180 4616 msedge.exe 86 PID 4616 wrote to memory of 4180 4616 msedge.exe 86 PID 4616 wrote to memory of 4180 4616 msedge.exe 86 PID 4616 wrote to memory of 4180 4616 msedge.exe 86 PID 4616 wrote to memory of 4180 4616 msedge.exe 86 PID 4616 wrote to memory of 4180 4616 msedge.exe 86 PID 4616 wrote to memory of 4180 4616 msedge.exe 86 PID 4616 wrote to memory of 4180 4616 msedge.exe 86 PID 4616 wrote to memory of 4180 4616 msedge.exe 86 PID 4616 wrote to memory of 4180 4616 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a83caf8c3200a2b4d5e18b70d469cb61_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb24ad46f8,0x7ffb24ad4708,0x7ffb24ad47182⤵PID:312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,10210845951299084022,2514674436578495717,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:22⤵PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,10210845951299084022,2514674436578495717,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,10210845951299084022,2514674436578495717,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10210845951299084022,2514674436578495717,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10210845951299084022,2514674436578495717,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10210845951299084022,2514674436578495717,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4276 /prefetch:12⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,10210845951299084022,2514674436578495717,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4888 /prefetch:82⤵PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,10210845951299084022,2514674436578495717,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4888 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10210845951299084022,2514674436578495717,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10210845951299084022,2514674436578495717,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10210845951299084022,2514674436578495717,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:12⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10210845951299084022,2514674436578495717,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,10210845951299084022,2514674436578495717,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1392 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1096
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1996
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5e4cca9ab4d439e6ac33829195d441d2d
SHA1982575c797a0f042429da48e4c07dd4905aad7e8
SHA25626964e3f42cf89909be4bac579a36261ba09ecdb5b506f8c7e1abd63dfbce072
SHA5123831f40e6f0a8e5dc2fc559cac1513cf8249bf6a0655c89792b82e02be436bdcf673073dce26ea2721fa7f266f4c467e472617aa660dceb2320788bd33a3da8b
-
Filesize
152B
MD5c5abc082d9d9307e797b7e89a2f755f4
SHA154c442690a8727f1d3453b6452198d3ec4ec13df
SHA256a055d69c6aba59e97e632d118b7960a5fdfbe35cfdfaa0de14f194fc6f874716
SHA512ad765cddbf89472988de5356db5e0ee254ca3475491c6034fba1897c373702ab7cfa4bd21662ab862eebb48a757c3eb86b1f8ed58629751f71863822a59cd26c
-
Filesize
152B
MD5b4a74bc775caf3de7fc9cde3c30ce482
SHA1c6ed3161390e5493f71182a6cb98d51c9063775d
SHA256dfad4e020a946f85523604816a0a9781091ee4669c870db2cabab027f8b6f280
SHA51255578e254444a645f455ea38480c9e02599ebf9522c32aca50ff37aad33976db30e663d35ebe31ff0ecafb4007362261716f756b3a0d67ac3937ca62ff10e25f
-
Filesize
581B
MD55e92c3ab8945f8ca0c1e32c15646cf63
SHA16a333d48aceef12b0116a8c8be489150e189ba95
SHA2565f3afcaf0d0ac409bcb00f2b4cb3f9e223a7303da481e85916d58d8c9de315a3
SHA51242333db971849e3f4ecbc546cc5eae2366d99f67b931f48847a2924bf48144e713a63efac7dbfbdeb13b243e7fb29af39403e42a8b262b4e8b0050daeb18a9e8
-
Filesize
6KB
MD575035543bb4a36ab924fa924e1fe5f33
SHA189ed0a100a5e8b947b3f911354941aaf2001798c
SHA2561b49f517f49b8086add65a29e14377d82613909546cc43c3ea473be81265715f
SHA512870dc5a27137b7c42c244262412c0cc9e81703c1109576c3fd2a5009da3fba9df7480942335f4f6d2e5361f6a13e645a430f866fadafa6c1f16aeb43e53610a7
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\e9da1b48-ddcb-4a0f-b642-c2f3c0c3c4a9.tmp
Filesize6KB
MD5cbc8dd89fa5eb6ebc3fe89000cd99270
SHA18d444c79eb327387b6011d34e2469f95910c525f
SHA25613857980cd70ff37a4ea942e8d1210d2af0ee2d98d07830ade168be70e81bd65
SHA512fc827dfbb72b68e28d70d9127892bb9f67c939ce23579a6ada78ddef6cae2d12eff91d6d02e26a43f324a7f1e01f2167e296c0a87bf2e84ceaa96c98783baee4