Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
14/06/2024, 12:14
Static task
static1
Behavioral task
behavioral1
Sample
a99f08b7d6c2a5dd65ee874cb948ac31_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a99f08b7d6c2a5dd65ee874cb948ac31_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a99f08b7d6c2a5dd65ee874cb948ac31_JaffaCakes118.html
-
Size
187KB
-
MD5
a99f08b7d6c2a5dd65ee874cb948ac31
-
SHA1
2eec01371ae1fc5a48593ca966ff8890528a5a8c
-
SHA256
7133123ee35d9da8033d7d5f0c888383220ffd4ef24639ac64d93910e8c13427
-
SHA512
76d19dabd07ff81fc5fba1e70690cb7f00066f8d403777cef0690cfae57a2d095060bd6063a01be1ab7ac0490a05737dc3c0c9e9bc1a10c07bb1ec785bae90ed
-
SSDEEP
3072:bh0StzzlW7nQaH48jsqbRIdWjJLYxH5Ae18ze56QLlo8udjqBEVMvBISDERchAPz:nU48jsqbRI8yBISDEShAP0XCJ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1900 msedge.exe 1900 msedge.exe 1276 msedge.exe 1276 msedge.exe 4352 identity_helper.exe 4352 identity_helper.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1276 wrote to memory of 3964 1276 msedge.exe 82 PID 1276 wrote to memory of 3964 1276 msedge.exe 82 PID 1276 wrote to memory of 244 1276 msedge.exe 84 PID 1276 wrote to memory of 244 1276 msedge.exe 84 PID 1276 wrote to memory of 244 1276 msedge.exe 84 PID 1276 wrote to memory of 244 1276 msedge.exe 84 PID 1276 wrote to memory of 244 1276 msedge.exe 84 PID 1276 wrote to memory of 244 1276 msedge.exe 84 PID 1276 wrote to memory of 244 1276 msedge.exe 84 PID 1276 wrote to memory of 244 1276 msedge.exe 84 PID 1276 wrote to memory of 244 1276 msedge.exe 84 PID 1276 wrote to memory of 244 1276 msedge.exe 84 PID 1276 wrote to memory of 244 1276 msedge.exe 84 PID 1276 wrote to memory of 244 1276 msedge.exe 84 PID 1276 wrote to memory of 244 1276 msedge.exe 84 PID 1276 wrote to memory of 244 1276 msedge.exe 84 PID 1276 wrote to memory of 244 1276 msedge.exe 84 PID 1276 wrote to memory of 244 1276 msedge.exe 84 PID 1276 wrote to memory of 244 1276 msedge.exe 84 PID 1276 wrote to memory of 244 1276 msedge.exe 84 PID 1276 wrote to memory of 244 1276 msedge.exe 84 PID 1276 wrote to memory of 244 1276 msedge.exe 84 PID 1276 wrote to memory of 244 1276 msedge.exe 84 PID 1276 wrote to memory of 244 1276 msedge.exe 84 PID 1276 wrote to memory of 244 1276 msedge.exe 84 PID 1276 wrote to memory of 244 1276 msedge.exe 84 PID 1276 wrote to memory of 244 1276 msedge.exe 84 PID 1276 wrote to memory of 244 1276 msedge.exe 84 PID 1276 wrote to memory of 244 1276 msedge.exe 84 PID 1276 wrote to memory of 244 1276 msedge.exe 84 PID 1276 wrote to memory of 244 1276 msedge.exe 84 PID 1276 wrote to memory of 244 1276 msedge.exe 84 PID 1276 wrote to memory of 244 1276 msedge.exe 84 PID 1276 wrote to memory of 244 1276 msedge.exe 84 PID 1276 wrote to memory of 244 1276 msedge.exe 84 PID 1276 wrote to memory of 244 1276 msedge.exe 84 PID 1276 wrote to memory of 244 1276 msedge.exe 84 PID 1276 wrote to memory of 244 1276 msedge.exe 84 PID 1276 wrote to memory of 244 1276 msedge.exe 84 PID 1276 wrote to memory of 244 1276 msedge.exe 84 PID 1276 wrote to memory of 244 1276 msedge.exe 84 PID 1276 wrote to memory of 244 1276 msedge.exe 84 PID 1276 wrote to memory of 1900 1276 msedge.exe 85 PID 1276 wrote to memory of 1900 1276 msedge.exe 85 PID 1276 wrote to memory of 1588 1276 msedge.exe 86 PID 1276 wrote to memory of 1588 1276 msedge.exe 86 PID 1276 wrote to memory of 1588 1276 msedge.exe 86 PID 1276 wrote to memory of 1588 1276 msedge.exe 86 PID 1276 wrote to memory of 1588 1276 msedge.exe 86 PID 1276 wrote to memory of 1588 1276 msedge.exe 86 PID 1276 wrote to memory of 1588 1276 msedge.exe 86 PID 1276 wrote to memory of 1588 1276 msedge.exe 86 PID 1276 wrote to memory of 1588 1276 msedge.exe 86 PID 1276 wrote to memory of 1588 1276 msedge.exe 86 PID 1276 wrote to memory of 1588 1276 msedge.exe 86 PID 1276 wrote to memory of 1588 1276 msedge.exe 86 PID 1276 wrote to memory of 1588 1276 msedge.exe 86 PID 1276 wrote to memory of 1588 1276 msedge.exe 86 PID 1276 wrote to memory of 1588 1276 msedge.exe 86 PID 1276 wrote to memory of 1588 1276 msedge.exe 86 PID 1276 wrote to memory of 1588 1276 msedge.exe 86 PID 1276 wrote to memory of 1588 1276 msedge.exe 86 PID 1276 wrote to memory of 1588 1276 msedge.exe 86 PID 1276 wrote to memory of 1588 1276 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a99f08b7d6c2a5dd65ee874cb948ac31_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffe33b46f8,0x7fffe33b4708,0x7fffe33b47182⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,1972898132455337013,8040857764447648200,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,1972898132455337013,8040857764447648200,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,1972898132455337013,8040857764447648200,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1972898132455337013,8040857764447648200,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1972898132455337013,8040857764447648200,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,1972898132455337013,8040857764447648200,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 /prefetch:82⤵PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,1972898132455337013,8040857764447648200,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1972898132455337013,8040857764447648200,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1972898132455337013,8040857764447648200,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:12⤵PID:372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1972898132455337013,8040857764447648200,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2464 /prefetch:12⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1972898132455337013,8040857764447648200,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4628 /prefetch:12⤵PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,1972898132455337013,8040857764447648200,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3964 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3668
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3596
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c5abc082d9d9307e797b7e89a2f755f4
SHA154c442690a8727f1d3453b6452198d3ec4ec13df
SHA256a055d69c6aba59e97e632d118b7960a5fdfbe35cfdfaa0de14f194fc6f874716
SHA512ad765cddbf89472988de5356db5e0ee254ca3475491c6034fba1897c373702ab7cfa4bd21662ab862eebb48a757c3eb86b1f8ed58629751f71863822a59cd26c
-
Filesize
152B
MD5b4a74bc775caf3de7fc9cde3c30ce482
SHA1c6ed3161390e5493f71182a6cb98d51c9063775d
SHA256dfad4e020a946f85523604816a0a9781091ee4669c870db2cabab027f8b6f280
SHA51255578e254444a645f455ea38480c9e02599ebf9522c32aca50ff37aad33976db30e663d35ebe31ff0ecafb4007362261716f756b3a0d67ac3937ca62ff10e25f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\5373b4d4-bb5c-4f66-a78e-f53226524dad.tmp
Filesize725B
MD59dd4008386f63107a56a9afd13a3fadc
SHA1c92e6aa67f521698925141dddb2c494cca9503aa
SHA256e727ad18ff23e4d598a52982ffcdc99d4d1ae45b3d87714b7ec826af2b49b39e
SHA512f2f1e9bf7881e29b3b4879a391cb5d937098d09a23ba8ff46f688e0a622802165142c0aacaa47bfc54cdf2e4892abbe259f8c254bfea5a38f4cb72c5edba46a0
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD561461fa364123ae6e7ba771737d6511d
SHA1eb15a51d15b2dc81b2dc483dc8f66cc18862cc39
SHA25602a663d305d3055c19295901cff5fcf1116dfdd1ae645372ff2a6eb8a9d7758a
SHA512b60eed4fc7cda018defb3290a8c6f653bfcbf5aeeaa70dc78f27be6c46773a94fa66a8f2c6bcaf0a083f91f62c9666f2351fd1600a5be2490da12c4b14696426
-
Filesize
6KB
MD56e5cecc525b9d4539a2247ebb6dfafd0
SHA1da2ca784646b253a8bfc69da9660b7f3846e323e
SHA256aaff9f97c60c3ec4d82208770ba49653abefdaf91111fecdba64b84f8047dfb9
SHA5123ec08fd185e23f47bc44c877c0a8136b0fa4f1bd06cd797a6f6e9eb8ec3d54d6b0e81e5a5a5217fd234c0c9572cb5b9d8e867eb986710c18eddcbb56762f80f3
-
Filesize
372B
MD5dd9987d6aff5eba2c23aaabcc9bd5dd7
SHA1bfaf38cb2d2a228c339a6b88d9c1fcbc34cf69b8
SHA25663776c025595509a09869c56130a4e55ff2c3c6933c054c48f1ae5ca880430c2
SHA51228b57f913d3f9408353c1f0933333218920e8fe33d18b433f72b3e4e022e12138344cf1e923ff25eaa79c44fa408a3a8763f3760049d876db723aab6880080c4
-
Filesize
204B
MD55ab9eccad97a42dc52d146c55a3516c2
SHA1aea34bd33f75ae2cc751565ddebbe965ea01fa0e
SHA256979994ad41158aae61f43fb8d409001d9664b277acc099f520c86be597072ceb
SHA5123dcf79537df15dbc65a781a786cc3d6815106d9ef6177327347f9a5fbfe7b2466568b93ba92a66bcccbe80e64c0f066025ff4cb5b5e42b2f120113a0e86f2700
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5b276b738e4d11a4a5a790113837f0b8f
SHA17f4aeafa0450c47dfda9550fc343a3f84fb4bc92
SHA2561bdd6acb41e80090478d6446e05c07e0d4bbf294ff0bf70a56f561ea78129bb4
SHA5120022d0ae935ae173a95c7d097bf1afdd407402b7319f99ad4645c4194c0867a0a70985ef5fa93dde30178b96a3acee105ac02ff1a2b8c07965f0d46c43a93c3d