Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
14/06/2024, 14:20
Static task
static1
Behavioral task
behavioral1
Sample
aa24dee5964b914afafa26dc77ac2d16_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
aa24dee5964b914afafa26dc77ac2d16_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
aa24dee5964b914afafa26dc77ac2d16_JaffaCakes118.html
-
Size
36KB
-
MD5
aa24dee5964b914afafa26dc77ac2d16
-
SHA1
612e520a726a50b37bb00c0468e15a3b065088c3
-
SHA256
364952fdd077be29967d7013769d2e84a5ce2ecfa98fe860b99abb8c40cd489a
-
SHA512
86dbe9534eaa6fb1486b5d247262688fd884fedad1d5c56fcb02c6ca609ceadbed4ea2e36babf24cf4cd0aab5c8532bb85c0264af0ad83870ba22bd185ad69f2
-
SSDEEP
768:zwx/MDTHAa88hAR4ZPXDE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6ThZOg6f9U56lLRB:Q/vbJxNVNufSM/P8IK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 3400 msedge.exe 3400 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 1512 identity_helper.exe 1512 identity_helper.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2872 wrote to memory of 4384 2872 msedge.exe 81 PID 2872 wrote to memory of 4384 2872 msedge.exe 81 PID 2872 wrote to memory of 1956 2872 msedge.exe 82 PID 2872 wrote to memory of 1956 2872 msedge.exe 82 PID 2872 wrote to memory of 1956 2872 msedge.exe 82 PID 2872 wrote to memory of 1956 2872 msedge.exe 82 PID 2872 wrote to memory of 1956 2872 msedge.exe 82 PID 2872 wrote to memory of 1956 2872 msedge.exe 82 PID 2872 wrote to memory of 1956 2872 msedge.exe 82 PID 2872 wrote to memory of 1956 2872 msedge.exe 82 PID 2872 wrote to memory of 1956 2872 msedge.exe 82 PID 2872 wrote to memory of 1956 2872 msedge.exe 82 PID 2872 wrote to memory of 1956 2872 msedge.exe 82 PID 2872 wrote to memory of 1956 2872 msedge.exe 82 PID 2872 wrote to memory of 1956 2872 msedge.exe 82 PID 2872 wrote to memory of 1956 2872 msedge.exe 82 PID 2872 wrote to memory of 1956 2872 msedge.exe 82 PID 2872 wrote to memory of 1956 2872 msedge.exe 82 PID 2872 wrote to memory of 1956 2872 msedge.exe 82 PID 2872 wrote to memory of 1956 2872 msedge.exe 82 PID 2872 wrote to memory of 1956 2872 msedge.exe 82 PID 2872 wrote to memory of 1956 2872 msedge.exe 82 PID 2872 wrote to memory of 1956 2872 msedge.exe 82 PID 2872 wrote to memory of 1956 2872 msedge.exe 82 PID 2872 wrote to memory of 1956 2872 msedge.exe 82 PID 2872 wrote to memory of 1956 2872 msedge.exe 82 PID 2872 wrote to memory of 1956 2872 msedge.exe 82 PID 2872 wrote to memory of 1956 2872 msedge.exe 82 PID 2872 wrote to memory of 1956 2872 msedge.exe 82 PID 2872 wrote to memory of 1956 2872 msedge.exe 82 PID 2872 wrote to memory of 1956 2872 msedge.exe 82 PID 2872 wrote to memory of 1956 2872 msedge.exe 82 PID 2872 wrote to memory of 1956 2872 msedge.exe 82 PID 2872 wrote to memory of 1956 2872 msedge.exe 82 PID 2872 wrote to memory of 1956 2872 msedge.exe 82 PID 2872 wrote to memory of 1956 2872 msedge.exe 82 PID 2872 wrote to memory of 1956 2872 msedge.exe 82 PID 2872 wrote to memory of 1956 2872 msedge.exe 82 PID 2872 wrote to memory of 1956 2872 msedge.exe 82 PID 2872 wrote to memory of 1956 2872 msedge.exe 82 PID 2872 wrote to memory of 1956 2872 msedge.exe 82 PID 2872 wrote to memory of 1956 2872 msedge.exe 82 PID 2872 wrote to memory of 3400 2872 msedge.exe 83 PID 2872 wrote to memory of 3400 2872 msedge.exe 83 PID 2872 wrote to memory of 1048 2872 msedge.exe 84 PID 2872 wrote to memory of 1048 2872 msedge.exe 84 PID 2872 wrote to memory of 1048 2872 msedge.exe 84 PID 2872 wrote to memory of 1048 2872 msedge.exe 84 PID 2872 wrote to memory of 1048 2872 msedge.exe 84 PID 2872 wrote to memory of 1048 2872 msedge.exe 84 PID 2872 wrote to memory of 1048 2872 msedge.exe 84 PID 2872 wrote to memory of 1048 2872 msedge.exe 84 PID 2872 wrote to memory of 1048 2872 msedge.exe 84 PID 2872 wrote to memory of 1048 2872 msedge.exe 84 PID 2872 wrote to memory of 1048 2872 msedge.exe 84 PID 2872 wrote to memory of 1048 2872 msedge.exe 84 PID 2872 wrote to memory of 1048 2872 msedge.exe 84 PID 2872 wrote to memory of 1048 2872 msedge.exe 84 PID 2872 wrote to memory of 1048 2872 msedge.exe 84 PID 2872 wrote to memory of 1048 2872 msedge.exe 84 PID 2872 wrote to memory of 1048 2872 msedge.exe 84 PID 2872 wrote to memory of 1048 2872 msedge.exe 84 PID 2872 wrote to memory of 1048 2872 msedge.exe 84 PID 2872 wrote to memory of 1048 2872 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\aa24dee5964b914afafa26dc77ac2d16_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcfb3746f8,0x7ffcfb374708,0x7ffcfb3747182⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,11290720296142832498,2660371164495645187,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,11290720296142832498,2660371164495645187,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,11290720296142832498,2660371164495645187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:1048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11290720296142832498,2660371164495645187,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11290720296142832498,2660371164495645187,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,11290720296142832498,2660371164495645187,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵PID:3356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,11290720296142832498,2660371164495645187,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11290720296142832498,2660371164495645187,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11290720296142832498,2660371164495645187,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:3732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11290720296142832498,2660371164495645187,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3736 /prefetch:12⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11290720296142832498,2660371164495645187,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,11290720296142832498,2660371164495645187,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2348 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1324
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3044
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5db9081c34e133c32d02f593df88f047a
SHA1a0da007c14fd0591091924edc44bee90456700c6
SHA256c9cd202ebb55fe8dd3e5563948bab458e947d7ba33bc0f38c6b37ce5d0bd7c3e
SHA51212f9809958b024571891fae646208a76f3823ae333716a5cec303e15c38281db042b7acf95bc6523b6328ac9c8644794d39a0e03d9db196f156a6ee1fb4f2744
-
Filesize
152B
MD53a09f853479af373691d131247040276
SHA11b6f098e04da87e9cf2d3284943ec2144f36ac04
SHA256a358de2c0eba30c70a56022c44a3775aa99ffa819cd7f42f7c45ac358b5e739f
SHA512341cf0f363621ee02525cd398ae0d462319c6a80e05fd25d9aca44234c42a3071b51991d4cf102ac9d89561a1567cbe76dfeaad786a304bec33821ca77080016
-
Filesize
614B
MD5486a66d1ffa2656947b61259dbbb6bfb
SHA128dc61578aaccff3852f5ce403c11ffb8b7de830
SHA25615817c67974aff1f510a31b4653e5bf1233e598c02b57a8d35546a71bb96be59
SHA5126cced4e96ca75310b4f9f1ae96baf2ab26bbdc4337fdfc0c159c9edc2a955cd2e3f00232191d34ca69c4bb87fb6ac36130bacfc32c0624e6de3ae882489c7b6e
-
Filesize
6KB
MD557ca01b989eca10fd6a534ea3232ba81
SHA116506cd7fba4673abc96ad737120080ab9477209
SHA2568b2058288368c529a33167b10e7d339356702b6193b88695064d661ef9da6a37
SHA51243e07dc13c38ed45edccc4dd7540a3a67fb50653fd71c9ae4bf57dd15a0e5e87901a72bbd0aec7fce481290aabbd85b0448415ec1cb96db427de1afea6cb0ab5
-
Filesize
6KB
MD5d9694aae906fe595b30dce62281554ec
SHA1c78db6ba16f051e4b7a95e2d282cf3d07d232bfd
SHA256f98a108018793bb1003a6c60dea166fd58f829079e51e5f627461ce7816bd077
SHA51270c245565a6de6f3b79ec10d44edcb9996cda7af55a437c57ac1f283cd59760b150f3c58ca169f22d897cb1abe71e04221e1874d044f2575e1fecfab8067553a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD560f281e6d367a947720441ec6fec12df
SHA1c84acb028e89288ba8264b7bceaa1d39bf832214
SHA25603d51f5065672403b02ce3a7ac3b859060fa5a714f850410577cf580929fcb59
SHA512747bed74229a22b362c751961b3a16a91c36d490bd214e735bfc0210a135c58eb9e3e8b8c5bced89cd1cd3f5191aacb0cae10081484c90f6e85b69b561947b59