Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14/06/2024, 12:43
Static task
static1
Behavioral task
behavioral1
Sample
a9bcb8788547829944bc2ec1abebae74_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
a9bcb8788547829944bc2ec1abebae74_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a9bcb8788547829944bc2ec1abebae74_JaffaCakes118.html
-
Size
94KB
-
MD5
a9bcb8788547829944bc2ec1abebae74
-
SHA1
065daae560112c8b6b7d9727612d62a0ee2a1b2d
-
SHA256
77ae8ad5adab1eb947a351b6c7942a0906c466ebc099c4316d45f84d4cbf7c57
-
SHA512
c79879baea331c04f4452563378f873c960c463d430320106154df80ce27ca5927997ce531c553b88cbe519cf6bf6cd69a21037d40991bb3e6421594b098fc50
-
SSDEEP
1536:WMLiNoHf5lA6hj6A7La/WTP220FLhvPBjZinyW5BdkrY8mgHC+qpEyW:WAi8HDBdkrY8mgHC+qpEyW
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 384 msedge.exe 384 msedge.exe 1928 msedge.exe 1928 msedge.exe 4076 identity_helper.exe 4076 identity_helper.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1928 wrote to memory of 376 1928 msedge.exe 81 PID 1928 wrote to memory of 376 1928 msedge.exe 81 PID 1928 wrote to memory of 1136 1928 msedge.exe 82 PID 1928 wrote to memory of 1136 1928 msedge.exe 82 PID 1928 wrote to memory of 1136 1928 msedge.exe 82 PID 1928 wrote to memory of 1136 1928 msedge.exe 82 PID 1928 wrote to memory of 1136 1928 msedge.exe 82 PID 1928 wrote to memory of 1136 1928 msedge.exe 82 PID 1928 wrote to memory of 1136 1928 msedge.exe 82 PID 1928 wrote to memory of 1136 1928 msedge.exe 82 PID 1928 wrote to memory of 1136 1928 msedge.exe 82 PID 1928 wrote to memory of 1136 1928 msedge.exe 82 PID 1928 wrote to memory of 1136 1928 msedge.exe 82 PID 1928 wrote to memory of 1136 1928 msedge.exe 82 PID 1928 wrote to memory of 1136 1928 msedge.exe 82 PID 1928 wrote to memory of 1136 1928 msedge.exe 82 PID 1928 wrote to memory of 1136 1928 msedge.exe 82 PID 1928 wrote to memory of 1136 1928 msedge.exe 82 PID 1928 wrote to memory of 1136 1928 msedge.exe 82 PID 1928 wrote to memory of 1136 1928 msedge.exe 82 PID 1928 wrote to memory of 1136 1928 msedge.exe 82 PID 1928 wrote to memory of 1136 1928 msedge.exe 82 PID 1928 wrote to memory of 1136 1928 msedge.exe 82 PID 1928 wrote to memory of 1136 1928 msedge.exe 82 PID 1928 wrote to memory of 1136 1928 msedge.exe 82 PID 1928 wrote to memory of 1136 1928 msedge.exe 82 PID 1928 wrote to memory of 1136 1928 msedge.exe 82 PID 1928 wrote to memory of 1136 1928 msedge.exe 82 PID 1928 wrote to memory of 1136 1928 msedge.exe 82 PID 1928 wrote to memory of 1136 1928 msedge.exe 82 PID 1928 wrote to memory of 1136 1928 msedge.exe 82 PID 1928 wrote to memory of 1136 1928 msedge.exe 82 PID 1928 wrote to memory of 1136 1928 msedge.exe 82 PID 1928 wrote to memory of 1136 1928 msedge.exe 82 PID 1928 wrote to memory of 1136 1928 msedge.exe 82 PID 1928 wrote to memory of 1136 1928 msedge.exe 82 PID 1928 wrote to memory of 1136 1928 msedge.exe 82 PID 1928 wrote to memory of 1136 1928 msedge.exe 82 PID 1928 wrote to memory of 1136 1928 msedge.exe 82 PID 1928 wrote to memory of 1136 1928 msedge.exe 82 PID 1928 wrote to memory of 1136 1928 msedge.exe 82 PID 1928 wrote to memory of 1136 1928 msedge.exe 82 PID 1928 wrote to memory of 384 1928 msedge.exe 83 PID 1928 wrote to memory of 384 1928 msedge.exe 83 PID 1928 wrote to memory of 3672 1928 msedge.exe 84 PID 1928 wrote to memory of 3672 1928 msedge.exe 84 PID 1928 wrote to memory of 3672 1928 msedge.exe 84 PID 1928 wrote to memory of 3672 1928 msedge.exe 84 PID 1928 wrote to memory of 3672 1928 msedge.exe 84 PID 1928 wrote to memory of 3672 1928 msedge.exe 84 PID 1928 wrote to memory of 3672 1928 msedge.exe 84 PID 1928 wrote to memory of 3672 1928 msedge.exe 84 PID 1928 wrote to memory of 3672 1928 msedge.exe 84 PID 1928 wrote to memory of 3672 1928 msedge.exe 84 PID 1928 wrote to memory of 3672 1928 msedge.exe 84 PID 1928 wrote to memory of 3672 1928 msedge.exe 84 PID 1928 wrote to memory of 3672 1928 msedge.exe 84 PID 1928 wrote to memory of 3672 1928 msedge.exe 84 PID 1928 wrote to memory of 3672 1928 msedge.exe 84 PID 1928 wrote to memory of 3672 1928 msedge.exe 84 PID 1928 wrote to memory of 3672 1928 msedge.exe 84 PID 1928 wrote to memory of 3672 1928 msedge.exe 84 PID 1928 wrote to memory of 3672 1928 msedge.exe 84 PID 1928 wrote to memory of 3672 1928 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a9bcb8788547829944bc2ec1abebae74_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff912ed46f8,0x7ff912ed4708,0x7ff912ed47182⤵PID:376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,15006146080044141909,15552597878645093582,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,15006146080044141909,15552597878645093582,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,15006146080044141909,15552597878645093582,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:82⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15006146080044141909,15552597878645093582,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15006146080044141909,15552597878645093582,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,15006146080044141909,15552597878645093582,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4336 /prefetch:82⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,15006146080044141909,15552597878645093582,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4336 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15006146080044141909,15552597878645093582,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15006146080044141909,15552597878645093582,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15006146080044141909,15552597878645093582,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:12⤵PID:2192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15006146080044141909,15552597878645093582,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4292 /prefetch:12⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,15006146080044141909,15552597878645093582,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1996 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1100
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1964
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
5KB
MD5093fea74bc12f5b6421a1512576658cf
SHA1a23d5c89eb1875c5542f2941f4c18c4f824640c3
SHA256df5727dd42fa4faf4ba678e367949a7c6f12cb9d1a3cd98e500ea6975ee7e098
SHA512a17ed45095124189fd2be8b666ea4b2b008060262deb77a1d8c84d3195c8aec8e98b1577920784622266061d39f8d1def54cfc89a90ff1443e30b196686626c6
-
Filesize
6KB
MD549950dda6a3f1f207d4a7799b59c996e
SHA153beecd9a506e3cb09728ccc24685260aa8ff8bd
SHA2565ff343267b3e8ad01a753cd39d6d570e484935b9c01805e3c259a5441e720f37
SHA51289d53250c421f2ca43796f50ab44676c09b345391593a2bddfd9c8bcaeed3f9e38a78379d7ba4603bdac3b2baf104ed698e5a1454657d54f94264cd3364aede1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD52909d443dbb0020d9fc402ee464b2e07
SHA1ad8ad671cd8253809329a345d8120365f064db6d
SHA256b70775b69b70490ce64b53a4a1245e604898f5720a3da6d9222968124943fae0
SHA512056abe5cdfac29b0729719d4f01010aeeca789a1014c2e6f4da7a71fb7237391c3e4b662fcb75a77982fa59b5f90496d0af1de9cd1870bd6bb54ca1267166c95