Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14-06-2024 12:15
Static task
static1
Behavioral task
behavioral1
Sample
a99fa723378050ee703ab6eb0c2c81ea_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a99fa723378050ee703ab6eb0c2c81ea_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a99fa723378050ee703ab6eb0c2c81ea_JaffaCakes118.html
-
Size
68KB
-
MD5
a99fa723378050ee703ab6eb0c2c81ea
-
SHA1
35496f07e85362e896ea0697193782c9d753d4b4
-
SHA256
28bf84ac8b6e5207395cfbbe3f9f38dcd2137e3557b01a403d012fbe373aefde
-
SHA512
6e5f7b69dae761edf1180f8d9cd87e479ffddff30a8f61d5a9be2798ef0975b2cc27c29c694ce900b64989bb78242d68789c9dbf8b77f734a13d4ea7e2a282db
-
SSDEEP
768:2oDdTkgjBgTj5NNsnGoT59NFUst5P3FcSOqT3Tne61N:2oDdAgle9YP3H3dTe61N
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1912 msedge.exe 1912 msedge.exe 3872 msedge.exe 3872 msedge.exe 4540 identity_helper.exe 4540 identity_helper.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3872 wrote to memory of 4364 3872 msedge.exe 81 PID 3872 wrote to memory of 4364 3872 msedge.exe 81 PID 3872 wrote to memory of 4176 3872 msedge.exe 82 PID 3872 wrote to memory of 4176 3872 msedge.exe 82 PID 3872 wrote to memory of 4176 3872 msedge.exe 82 PID 3872 wrote to memory of 4176 3872 msedge.exe 82 PID 3872 wrote to memory of 4176 3872 msedge.exe 82 PID 3872 wrote to memory of 4176 3872 msedge.exe 82 PID 3872 wrote to memory of 4176 3872 msedge.exe 82 PID 3872 wrote to memory of 4176 3872 msedge.exe 82 PID 3872 wrote to memory of 4176 3872 msedge.exe 82 PID 3872 wrote to memory of 4176 3872 msedge.exe 82 PID 3872 wrote to memory of 4176 3872 msedge.exe 82 PID 3872 wrote to memory of 4176 3872 msedge.exe 82 PID 3872 wrote to memory of 4176 3872 msedge.exe 82 PID 3872 wrote to memory of 4176 3872 msedge.exe 82 PID 3872 wrote to memory of 4176 3872 msedge.exe 82 PID 3872 wrote to memory of 4176 3872 msedge.exe 82 PID 3872 wrote to memory of 4176 3872 msedge.exe 82 PID 3872 wrote to memory of 4176 3872 msedge.exe 82 PID 3872 wrote to memory of 4176 3872 msedge.exe 82 PID 3872 wrote to memory of 4176 3872 msedge.exe 82 PID 3872 wrote to memory of 4176 3872 msedge.exe 82 PID 3872 wrote to memory of 4176 3872 msedge.exe 82 PID 3872 wrote to memory of 4176 3872 msedge.exe 82 PID 3872 wrote to memory of 4176 3872 msedge.exe 82 PID 3872 wrote to memory of 4176 3872 msedge.exe 82 PID 3872 wrote to memory of 4176 3872 msedge.exe 82 PID 3872 wrote to memory of 4176 3872 msedge.exe 82 PID 3872 wrote to memory of 4176 3872 msedge.exe 82 PID 3872 wrote to memory of 4176 3872 msedge.exe 82 PID 3872 wrote to memory of 4176 3872 msedge.exe 82 PID 3872 wrote to memory of 4176 3872 msedge.exe 82 PID 3872 wrote to memory of 4176 3872 msedge.exe 82 PID 3872 wrote to memory of 4176 3872 msedge.exe 82 PID 3872 wrote to memory of 4176 3872 msedge.exe 82 PID 3872 wrote to memory of 4176 3872 msedge.exe 82 PID 3872 wrote to memory of 4176 3872 msedge.exe 82 PID 3872 wrote to memory of 4176 3872 msedge.exe 82 PID 3872 wrote to memory of 4176 3872 msedge.exe 82 PID 3872 wrote to memory of 4176 3872 msedge.exe 82 PID 3872 wrote to memory of 4176 3872 msedge.exe 82 PID 3872 wrote to memory of 1912 3872 msedge.exe 83 PID 3872 wrote to memory of 1912 3872 msedge.exe 83 PID 3872 wrote to memory of 4544 3872 msedge.exe 84 PID 3872 wrote to memory of 4544 3872 msedge.exe 84 PID 3872 wrote to memory of 4544 3872 msedge.exe 84 PID 3872 wrote to memory of 4544 3872 msedge.exe 84 PID 3872 wrote to memory of 4544 3872 msedge.exe 84 PID 3872 wrote to memory of 4544 3872 msedge.exe 84 PID 3872 wrote to memory of 4544 3872 msedge.exe 84 PID 3872 wrote to memory of 4544 3872 msedge.exe 84 PID 3872 wrote to memory of 4544 3872 msedge.exe 84 PID 3872 wrote to memory of 4544 3872 msedge.exe 84 PID 3872 wrote to memory of 4544 3872 msedge.exe 84 PID 3872 wrote to memory of 4544 3872 msedge.exe 84 PID 3872 wrote to memory of 4544 3872 msedge.exe 84 PID 3872 wrote to memory of 4544 3872 msedge.exe 84 PID 3872 wrote to memory of 4544 3872 msedge.exe 84 PID 3872 wrote to memory of 4544 3872 msedge.exe 84 PID 3872 wrote to memory of 4544 3872 msedge.exe 84 PID 3872 wrote to memory of 4544 3872 msedge.exe 84 PID 3872 wrote to memory of 4544 3872 msedge.exe 84 PID 3872 wrote to memory of 4544 3872 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a99fa723378050ee703ab6eb0c2c81ea_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb923946f8,0x7ffb92394708,0x7ffb923947182⤵PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,13189475507209829447,12819965200413401361,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,13189475507209829447,12819965200413401361,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,13189475507209829447,12819965200413401361,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2596 /prefetch:82⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,13189475507209829447,12819965200413401361,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,13189475507209829447,12819965200413401361,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,13189475507209829447,12819965200413401361,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4336 /prefetch:82⤵PID:664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,13189475507209829447,12819965200413401361,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4336 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,13189475507209829447,12819965200413401361,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4048 /prefetch:12⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,13189475507209829447,12819965200413401361,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,13189475507209829447,12819965200413401361,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4196 /prefetch:12⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,13189475507209829447,12819965200413401361,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4344 /prefetch:12⤵PID:796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,13189475507209829447,12819965200413401361,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4636 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1960
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2016
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2136
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
5KB
MD5e2f891b606ac72888931c433269e5ce9
SHA1e3be005c172e47961a26a6771d2da77b5ad798a5
SHA256c217a5acb7d1d3059a9fc3fef35497b385b283f561c1d227856ff4cfe06c3cad
SHA5128ed071d5db9632ee96d5c191aa8c201ff5010f4d2ed8ba88a793d53f31ccb351da6c265fbf23d3138d2d4a0b2878f9c2509c9cb3fba45fcb65495f3caa393a03
-
Filesize
6KB
MD5604c524fd1c54626d98706c1f0fec7b0
SHA178bd4ff898b614111f3ddaa1a8ee6b249382fd2f
SHA2563f356a2979e11240943f719c9fa167402175d16ac079484d5d011f43aac15dd3
SHA512b019bf7ef07a1c66bda1f63b6dba629a93a96576f478c68fc4b59efcd5638c1f19b2419baa79e480e686ce8c43db79ab65c04a3c1859f9f85968f0a760a048e3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD50a34e7a5a96b5aa3d8733053c6df456a
SHA16f12d7bc08993aa1cc99ca464691334600a1ece5
SHA256a250de5f84546c706e7f226cf73d7d4c7f6a56d5c15c5a3512c7f6db64bffb74
SHA51241a95c4411e537a87bd33a17fdf8f1926fdce4b9fd4370ae4a5b378a0f09cfbde46811c4599101e1e2169008a922ae63d0ce5bcb8a211d18e7fa635544c2fab6