Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
14/06/2024, 08:44
Static task
static1
Behavioral task
behavioral1
Sample
a8cb137b7757e0167fc9f35932027414_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
a8cb137b7757e0167fc9f35932027414_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a8cb137b7757e0167fc9f35932027414_JaffaCakes118.html
-
Size
28KB
-
MD5
a8cb137b7757e0167fc9f35932027414
-
SHA1
2d887d7d596855d486b40c61361041e1964a00b9
-
SHA256
ee0647d2c459ef7b457c6d8a683f00becda2c159121012efda80f4ae6b622d62
-
SHA512
9f3beeb5a73d4c5a06f61efb8670fd50f8cbf8d65b7568757ca9127937507885fc86e36ac3e92e850c1382f72540d3486267bd60e064fbae9f1b3df99a8921b1
-
SSDEEP
768:tiWhh6H0/gOPm7YqyCHJmgskW7MZcGNAvLdeUniUk/6VaPGag2pOOMMJ/v4n99/2:ok6H0/gOPm7YqyCMM1SuSvO/PkDMZJC4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2212 msedge.exe 2212 msedge.exe 4136 msedge.exe 4136 msedge.exe 1688 identity_helper.exe 1688 identity_helper.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4136 wrote to memory of 2804 4136 msedge.exe 81 PID 4136 wrote to memory of 2804 4136 msedge.exe 81 PID 4136 wrote to memory of 3532 4136 msedge.exe 82 PID 4136 wrote to memory of 3532 4136 msedge.exe 82 PID 4136 wrote to memory of 3532 4136 msedge.exe 82 PID 4136 wrote to memory of 3532 4136 msedge.exe 82 PID 4136 wrote to memory of 3532 4136 msedge.exe 82 PID 4136 wrote to memory of 3532 4136 msedge.exe 82 PID 4136 wrote to memory of 3532 4136 msedge.exe 82 PID 4136 wrote to memory of 3532 4136 msedge.exe 82 PID 4136 wrote to memory of 3532 4136 msedge.exe 82 PID 4136 wrote to memory of 3532 4136 msedge.exe 82 PID 4136 wrote to memory of 3532 4136 msedge.exe 82 PID 4136 wrote to memory of 3532 4136 msedge.exe 82 PID 4136 wrote to memory of 3532 4136 msedge.exe 82 PID 4136 wrote to memory of 3532 4136 msedge.exe 82 PID 4136 wrote to memory of 3532 4136 msedge.exe 82 PID 4136 wrote to memory of 3532 4136 msedge.exe 82 PID 4136 wrote to memory of 3532 4136 msedge.exe 82 PID 4136 wrote to memory of 3532 4136 msedge.exe 82 PID 4136 wrote to memory of 3532 4136 msedge.exe 82 PID 4136 wrote to memory of 3532 4136 msedge.exe 82 PID 4136 wrote to memory of 3532 4136 msedge.exe 82 PID 4136 wrote to memory of 3532 4136 msedge.exe 82 PID 4136 wrote to memory of 3532 4136 msedge.exe 82 PID 4136 wrote to memory of 3532 4136 msedge.exe 82 PID 4136 wrote to memory of 3532 4136 msedge.exe 82 PID 4136 wrote to memory of 3532 4136 msedge.exe 82 PID 4136 wrote to memory of 3532 4136 msedge.exe 82 PID 4136 wrote to memory of 3532 4136 msedge.exe 82 PID 4136 wrote to memory of 3532 4136 msedge.exe 82 PID 4136 wrote to memory of 3532 4136 msedge.exe 82 PID 4136 wrote to memory of 3532 4136 msedge.exe 82 PID 4136 wrote to memory of 3532 4136 msedge.exe 82 PID 4136 wrote to memory of 3532 4136 msedge.exe 82 PID 4136 wrote to memory of 3532 4136 msedge.exe 82 PID 4136 wrote to memory of 3532 4136 msedge.exe 82 PID 4136 wrote to memory of 3532 4136 msedge.exe 82 PID 4136 wrote to memory of 3532 4136 msedge.exe 82 PID 4136 wrote to memory of 3532 4136 msedge.exe 82 PID 4136 wrote to memory of 3532 4136 msedge.exe 82 PID 4136 wrote to memory of 3532 4136 msedge.exe 82 PID 4136 wrote to memory of 2212 4136 msedge.exe 83 PID 4136 wrote to memory of 2212 4136 msedge.exe 83 PID 4136 wrote to memory of 2672 4136 msedge.exe 84 PID 4136 wrote to memory of 2672 4136 msedge.exe 84 PID 4136 wrote to memory of 2672 4136 msedge.exe 84 PID 4136 wrote to memory of 2672 4136 msedge.exe 84 PID 4136 wrote to memory of 2672 4136 msedge.exe 84 PID 4136 wrote to memory of 2672 4136 msedge.exe 84 PID 4136 wrote to memory of 2672 4136 msedge.exe 84 PID 4136 wrote to memory of 2672 4136 msedge.exe 84 PID 4136 wrote to memory of 2672 4136 msedge.exe 84 PID 4136 wrote to memory of 2672 4136 msedge.exe 84 PID 4136 wrote to memory of 2672 4136 msedge.exe 84 PID 4136 wrote to memory of 2672 4136 msedge.exe 84 PID 4136 wrote to memory of 2672 4136 msedge.exe 84 PID 4136 wrote to memory of 2672 4136 msedge.exe 84 PID 4136 wrote to memory of 2672 4136 msedge.exe 84 PID 4136 wrote to memory of 2672 4136 msedge.exe 84 PID 4136 wrote to memory of 2672 4136 msedge.exe 84 PID 4136 wrote to memory of 2672 4136 msedge.exe 84 PID 4136 wrote to memory of 2672 4136 msedge.exe 84 PID 4136 wrote to memory of 2672 4136 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a8cb137b7757e0167fc9f35932027414_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb108f46f8,0x7ffb108f4708,0x7ffb108f47182⤵PID:2804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,7406380922651941834,17107739513398137824,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1980 /prefetch:22⤵PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,7406380922651941834,17107739513398137824,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,7406380922651941834,17107739513398137824,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:2672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,7406380922651941834,17107739513398137824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,7406380922651941834,17107739513398137824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,7406380922651941834,17107739513398137824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1736 /prefetch:12⤵PID:2204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,7406380922651941834,17107739513398137824,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5420 /prefetch:82⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,7406380922651941834,17107739513398137824,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5420 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,7406380922651941834,17107739513398137824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,7406380922651941834,17107739513398137824,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,7406380922651941834,17107739513398137824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,7406380922651941834,17107739513398137824,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,7406380922651941834,17107739513398137824,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4760 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2104
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3900
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD52858e9e1b81e8334bb3297f041c10bde
SHA167a737db2dacb41ed643cb794aeb5c2134565141
SHA256bdd44ea6e22bdef7cf129409d7f8e8c1e619b0e5b5624dbd9d42a482ff8b4f02
SHA5127a36fa16be04f6f2db365584717f8a21ab89bba15059c75462a634323356df7d673d2279cb593b04c3adb1dc2b72e270bc9fa8356e309ed33fbdf647bd3a4892
-
Filesize
152B
MD581e892ca5c5683efdf9135fe0f2adb15
SHA139159b30226d98a465ece1da28dc87088b20ecad
SHA256830f394548cff6eed3608476190a7ee7d65fe651adc638c5b27ce58639a91e17
SHA512c943f4cfe8615ac159cfac13c10b67e6c0c9093851dd3ac6dda3b82e195d3554e3c37962010a2d0ae5074828d376402624f0dda5499c9997e962e4cfd26444c0
-
Filesize
152B
MD556067634f68231081c4bd5bdbfcc202f
SHA15582776da6ffc75bb0973840fc3d15598bc09eb1
SHA2568c08b0cbceb301c8f960aa674c6e7f6dbf40b4a1c2684e6fb0456ec5ff0e56b4
SHA512c4657393e0b9ec682570d7e251644a858d33e056ccd0f3eebffd0fde25244b3a699b8d9244bcdac00d6f74b49833629b270e099c2b557f729a9066922583f784
-
Filesize
262B
MD58c5bd48250406a0ca7eb2b3c75adb820
SHA1ffeacf3a1eb1e0549219b6428ec4af8c5054e060
SHA256a13323db9208c5d8edff0eab641bc5b9ef44044a8b4773b7e026661388089e1b
SHA512b58eebc062b32b6c526160393b9f8758024d09a9b14c0583f2252effb82bff52b83b48efdd10ff814c04bb417e93eedf5bb27d14c224681084ec64b27ae40f00
-
Filesize
6KB
MD53c5b2ba77911552f11f6af825f8dc080
SHA12ff2b5fd87e9efd8eb0ee3d60313b63b9680e338
SHA256e2f2f4504187c9476b1a5a0eb6ab5de47be471df763c94cbcbe17c4cb18975cb
SHA512ad40dcada8567679e041e9327b52cd0f0e5ab0795743f8c2059fd1c1a69982d72513c1a5f39ea3f724e08c1c6c8367750efbe8d9b2e5ba5a16ea7395136fdd11
-
Filesize
6KB
MD520789478b4fce800fbc5ba32d3020250
SHA1ec233dc26fca3c8926baecfd7f2245e51e8e4f92
SHA256fe75f81506ad9b480dfcf05755c2cd19a6cd0032ce9d2afcaf46daebf0615729
SHA5126f31fd9edebd3fff18e050f0398555aa1ecdd89e6405afc6b474ea949697c58672ae1c2d4eecbe7080f0629306b87016501a64cd07acb87524668ec423b03225
-
Filesize
6KB
MD5a54b1713db1d4580377c30c330f04bcb
SHA173382abd93766dae790c8540860ccdbe90a24ebf
SHA256173b373f4f8041d760395b16234eb51261045e397272e43ec96f14278d9dbb77
SHA512f9f005e9e49a42faf93e1a5c89936331aceb686f99bd773b929f966db82a34faa3b866e8927f18c7a434eb1e7f3a47b12cf2b278d692d21d587287e451022b09
-
Filesize
367B
MD53c626d594b8400d77007f8f8dd67ac94
SHA1eba888718d5050fd41ff4e91a75b23d725ffaaaf
SHA256ebf57ddfc77dbed3dcf647d62c889b098f0793fda026c8dce57275f36943aa7d
SHA512cdeccbbd4790850c482f9efc54880988dc07763c869cf7dab9c813aff75ee5993b966ba0dabda0e5c1e6270f0e5766e2d73e55c2b16f36cf78425e3ba19427f6
-
Filesize
367B
MD576b513700a37e4a831120ee8c7f63818
SHA1e6d33c5b854f69295588a3e09c7d052b30a3e024
SHA256e1dfb75cc3498246db66de078222cbeb397dee1a63a5831c361f68ec6b915220
SHA51262603ca207e6b6f8959501623a71bbd95cf91852458e900efecbc3599dcfd4d2cd195c405e810b7e3382b79902223e624512adc674ece80457961bc3919e2119
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389