Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14-06-2024 14:53
Static task
static1
Behavioral task
behavioral1
Sample
aa4666ee729ffe275e3da1711620f23b_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
aa4666ee729ffe275e3da1711620f23b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
aa4666ee729ffe275e3da1711620f23b_JaffaCakes118.html
-
Size
11KB
-
MD5
aa4666ee729ffe275e3da1711620f23b
-
SHA1
10aea43f6ca4a6abcaa4b5afec90189cd21603de
-
SHA256
95271b761e637748581bba195c504bdfa2ede909dc496ea12fcc4c878ea754a9
-
SHA512
30b38b6c68992a26f71fc5fbc737022284cb6b55528214c9cf8769b2acf2945bc6df1bd3987017255df008a6252dcc0f6a735c6681df4df6f8cb703bbdf61329
-
SSDEEP
192:ShyN/R/jIB/TDOt96FnKH8UabBv6OUf8SN0JCnqp4Vz6Id0dvdKdh:ShyN/R/jIB/TqtsFndUUBy9f8SQCm+u6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4476 msedge.exe 4476 msedge.exe 856 msedge.exe 856 msedge.exe 1564 identity_helper.exe 1564 identity_helper.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 856 wrote to memory of 4328 856 msedge.exe 82 PID 856 wrote to memory of 4328 856 msedge.exe 82 PID 856 wrote to memory of 1332 856 msedge.exe 83 PID 856 wrote to memory of 1332 856 msedge.exe 83 PID 856 wrote to memory of 1332 856 msedge.exe 83 PID 856 wrote to memory of 1332 856 msedge.exe 83 PID 856 wrote to memory of 1332 856 msedge.exe 83 PID 856 wrote to memory of 1332 856 msedge.exe 83 PID 856 wrote to memory of 1332 856 msedge.exe 83 PID 856 wrote to memory of 1332 856 msedge.exe 83 PID 856 wrote to memory of 1332 856 msedge.exe 83 PID 856 wrote to memory of 1332 856 msedge.exe 83 PID 856 wrote to memory of 1332 856 msedge.exe 83 PID 856 wrote to memory of 1332 856 msedge.exe 83 PID 856 wrote to memory of 1332 856 msedge.exe 83 PID 856 wrote to memory of 1332 856 msedge.exe 83 PID 856 wrote to memory of 1332 856 msedge.exe 83 PID 856 wrote to memory of 1332 856 msedge.exe 83 PID 856 wrote to memory of 1332 856 msedge.exe 83 PID 856 wrote to memory of 1332 856 msedge.exe 83 PID 856 wrote to memory of 1332 856 msedge.exe 83 PID 856 wrote to memory of 1332 856 msedge.exe 83 PID 856 wrote to memory of 1332 856 msedge.exe 83 PID 856 wrote to memory of 1332 856 msedge.exe 83 PID 856 wrote to memory of 1332 856 msedge.exe 83 PID 856 wrote to memory of 1332 856 msedge.exe 83 PID 856 wrote to memory of 1332 856 msedge.exe 83 PID 856 wrote to memory of 1332 856 msedge.exe 83 PID 856 wrote to memory of 1332 856 msedge.exe 83 PID 856 wrote to memory of 1332 856 msedge.exe 83 PID 856 wrote to memory of 1332 856 msedge.exe 83 PID 856 wrote to memory of 1332 856 msedge.exe 83 PID 856 wrote to memory of 1332 856 msedge.exe 83 PID 856 wrote to memory of 1332 856 msedge.exe 83 PID 856 wrote to memory of 1332 856 msedge.exe 83 PID 856 wrote to memory of 1332 856 msedge.exe 83 PID 856 wrote to memory of 1332 856 msedge.exe 83 PID 856 wrote to memory of 1332 856 msedge.exe 83 PID 856 wrote to memory of 1332 856 msedge.exe 83 PID 856 wrote to memory of 1332 856 msedge.exe 83 PID 856 wrote to memory of 1332 856 msedge.exe 83 PID 856 wrote to memory of 1332 856 msedge.exe 83 PID 856 wrote to memory of 4476 856 msedge.exe 84 PID 856 wrote to memory of 4476 856 msedge.exe 84 PID 856 wrote to memory of 2356 856 msedge.exe 85 PID 856 wrote to memory of 2356 856 msedge.exe 85 PID 856 wrote to memory of 2356 856 msedge.exe 85 PID 856 wrote to memory of 2356 856 msedge.exe 85 PID 856 wrote to memory of 2356 856 msedge.exe 85 PID 856 wrote to memory of 2356 856 msedge.exe 85 PID 856 wrote to memory of 2356 856 msedge.exe 85 PID 856 wrote to memory of 2356 856 msedge.exe 85 PID 856 wrote to memory of 2356 856 msedge.exe 85 PID 856 wrote to memory of 2356 856 msedge.exe 85 PID 856 wrote to memory of 2356 856 msedge.exe 85 PID 856 wrote to memory of 2356 856 msedge.exe 85 PID 856 wrote to memory of 2356 856 msedge.exe 85 PID 856 wrote to memory of 2356 856 msedge.exe 85 PID 856 wrote to memory of 2356 856 msedge.exe 85 PID 856 wrote to memory of 2356 856 msedge.exe 85 PID 856 wrote to memory of 2356 856 msedge.exe 85 PID 856 wrote to memory of 2356 856 msedge.exe 85 PID 856 wrote to memory of 2356 856 msedge.exe 85 PID 856 wrote to memory of 2356 856 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\aa4666ee729ffe275e3da1711620f23b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe40aa46f8,0x7ffe40aa4708,0x7ffe40aa47182⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,9915032127959298376,5116312798294239944,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:1332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,9915032127959298376,5116312798294239944,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,9915032127959298376,5116312798294239944,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:82⤵PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9915032127959298376,5116312798294239944,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9915032127959298376,5116312798294239944,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,9915032127959298376,5116312798294239944,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5072 /prefetch:82⤵PID:1272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,9915032127959298376,5116312798294239944,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5072 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9915032127959298376,5116312798294239944,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9915032127959298376,5116312798294239944,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:1388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9915032127959298376,5116312798294239944,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4888 /prefetch:12⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9915032127959298376,5116312798294239944,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4252 /prefetch:12⤵PID:772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,9915032127959298376,5116312798294239944,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5212 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3560
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2816
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD53a79d29d717d1ec168bef04e0d97eac7
SHA1d00963bbc0e39f6d9c60f2a757b35ba95d24bbfe
SHA25684b3617acc6bf620d890a8c0470fd9c09ce3f72eb4b03ce0072880962b53d07b
SHA512c0de0b9958ecaa909ecf16057573a3a2d2c15f330bea668f9b685f4ff4d2ac0907e8d690043249b3915ab19f57c0880dd85421c896ed56cb8897a52583a90728
-
Filesize
5KB
MD5658215fcbde9c63de3d3ed9fee7a07ae
SHA160865a262898e9d10d1b5136392db5e66a1300b2
SHA25630ae8d27800da0c5df2e862ed38a045e527dff0c881ba8618a8b3dd3d4e2cec4
SHA512ee1bc6cac50d2afcfa9ff2b12124eddae3f7beb33ecb560859d3df80c7426646266ce6548e92b4c87047c5ab8de30f0ca32292f7c0e02b95957bca39d1b21a33
-
Filesize
5KB
MD5dac6d683ef8f764a46977f77d89db887
SHA1f433a617bd1f7cacfe140adfabcec348068f9a48
SHA256b3cccd9e09f9e44c32d18d0448238d808feadf96032fe7dcca068998d020d111
SHA512c090d56484b326162a4e93c69b2f33d2a01a8d55da0a9893277feb1cd8c9fb3eaf4969c1148730c452fafe73770f8d8013459d5bc8e5f469180e9a5298aba9fe
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5589130a89cd4ca9b926b6e13b3062e25
SHA1a3454d78768ad3694248986eaedafcfd2b73d69a
SHA2562e2ddfdd5e8c54f7b1f38b51b8ceceed267cf88a3a8967683dffdb1c63684719
SHA512bc4185101cee0165d1ea4dc970b7f4ee9c052ae6b9e8987837cfde758d617a05360f4d461315ceb930f6b0c747fff1638c08293199708a6edd08c70fd4d5613d