Analysis
-
max time kernel
139s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
14/06/2024, 15:18
Static task
static1
Behavioral task
behavioral1
Sample
aa62caede3dcb6e2a55a1793adfdbf02_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
aa62caede3dcb6e2a55a1793adfdbf02_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
aa62caede3dcb6e2a55a1793adfdbf02_JaffaCakes118.html
-
Size
35KB
-
MD5
aa62caede3dcb6e2a55a1793adfdbf02
-
SHA1
a4a77c10e0c5d2053ab1782aca19fd8c9c8e93a9
-
SHA256
4127781b5656791fe27bf075b95c7333e87fc31a3377297e1c4572729d818ce3
-
SHA512
7c03dba5f7e7f09e4efe449752fd46ef467cebd303f0ef9ec239d5bd5fab85c5a9ef3181e8014d4760d68bd70ca6f53a2e3d3d8cc2fc15a31563ae936fdf8659
-
SSDEEP
768:SdsfaYT//ysnzNm9F18Hc9snzNm9F18HVAv12CSxUcPiQZ7wris0pvic0ID4fJWi:Sd2aYT//ysnzNm9F18Hc9snzNm9F18H4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4252 msedge.exe 4252 msedge.exe 4024 msedge.exe 4024 msedge.exe 2544 identity_helper.exe 2544 identity_helper.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe 4292 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4024 wrote to memory of 3044 4024 msedge.exe 81 PID 4024 wrote to memory of 3044 4024 msedge.exe 81 PID 4024 wrote to memory of 3100 4024 msedge.exe 82 PID 4024 wrote to memory of 3100 4024 msedge.exe 82 PID 4024 wrote to memory of 3100 4024 msedge.exe 82 PID 4024 wrote to memory of 3100 4024 msedge.exe 82 PID 4024 wrote to memory of 3100 4024 msedge.exe 82 PID 4024 wrote to memory of 3100 4024 msedge.exe 82 PID 4024 wrote to memory of 3100 4024 msedge.exe 82 PID 4024 wrote to memory of 3100 4024 msedge.exe 82 PID 4024 wrote to memory of 3100 4024 msedge.exe 82 PID 4024 wrote to memory of 3100 4024 msedge.exe 82 PID 4024 wrote to memory of 3100 4024 msedge.exe 82 PID 4024 wrote to memory of 3100 4024 msedge.exe 82 PID 4024 wrote to memory of 3100 4024 msedge.exe 82 PID 4024 wrote to memory of 3100 4024 msedge.exe 82 PID 4024 wrote to memory of 3100 4024 msedge.exe 82 PID 4024 wrote to memory of 3100 4024 msedge.exe 82 PID 4024 wrote to memory of 3100 4024 msedge.exe 82 PID 4024 wrote to memory of 3100 4024 msedge.exe 82 PID 4024 wrote to memory of 3100 4024 msedge.exe 82 PID 4024 wrote to memory of 3100 4024 msedge.exe 82 PID 4024 wrote to memory of 3100 4024 msedge.exe 82 PID 4024 wrote to memory of 3100 4024 msedge.exe 82 PID 4024 wrote to memory of 3100 4024 msedge.exe 82 PID 4024 wrote to memory of 3100 4024 msedge.exe 82 PID 4024 wrote to memory of 3100 4024 msedge.exe 82 PID 4024 wrote to memory of 3100 4024 msedge.exe 82 PID 4024 wrote to memory of 3100 4024 msedge.exe 82 PID 4024 wrote to memory of 3100 4024 msedge.exe 82 PID 4024 wrote to memory of 3100 4024 msedge.exe 82 PID 4024 wrote to memory of 3100 4024 msedge.exe 82 PID 4024 wrote to memory of 3100 4024 msedge.exe 82 PID 4024 wrote to memory of 3100 4024 msedge.exe 82 PID 4024 wrote to memory of 3100 4024 msedge.exe 82 PID 4024 wrote to memory of 3100 4024 msedge.exe 82 PID 4024 wrote to memory of 3100 4024 msedge.exe 82 PID 4024 wrote to memory of 3100 4024 msedge.exe 82 PID 4024 wrote to memory of 3100 4024 msedge.exe 82 PID 4024 wrote to memory of 3100 4024 msedge.exe 82 PID 4024 wrote to memory of 3100 4024 msedge.exe 82 PID 4024 wrote to memory of 3100 4024 msedge.exe 82 PID 4024 wrote to memory of 4252 4024 msedge.exe 83 PID 4024 wrote to memory of 4252 4024 msedge.exe 83 PID 4024 wrote to memory of 1112 4024 msedge.exe 84 PID 4024 wrote to memory of 1112 4024 msedge.exe 84 PID 4024 wrote to memory of 1112 4024 msedge.exe 84 PID 4024 wrote to memory of 1112 4024 msedge.exe 84 PID 4024 wrote to memory of 1112 4024 msedge.exe 84 PID 4024 wrote to memory of 1112 4024 msedge.exe 84 PID 4024 wrote to memory of 1112 4024 msedge.exe 84 PID 4024 wrote to memory of 1112 4024 msedge.exe 84 PID 4024 wrote to memory of 1112 4024 msedge.exe 84 PID 4024 wrote to memory of 1112 4024 msedge.exe 84 PID 4024 wrote to memory of 1112 4024 msedge.exe 84 PID 4024 wrote to memory of 1112 4024 msedge.exe 84 PID 4024 wrote to memory of 1112 4024 msedge.exe 84 PID 4024 wrote to memory of 1112 4024 msedge.exe 84 PID 4024 wrote to memory of 1112 4024 msedge.exe 84 PID 4024 wrote to memory of 1112 4024 msedge.exe 84 PID 4024 wrote to memory of 1112 4024 msedge.exe 84 PID 4024 wrote to memory of 1112 4024 msedge.exe 84 PID 4024 wrote to memory of 1112 4024 msedge.exe 84 PID 4024 wrote to memory of 1112 4024 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\aa62caede3dcb6e2a55a1793adfdbf02_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd7b6d46f8,0x7ffd7b6d4708,0x7ffd7b6d47182⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,18238944951549658389,4152372625059125870,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:22⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2212,18238944951549658389,4152372625059125870,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2212,18238944951549658389,4152372625059125870,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2304 /prefetch:82⤵PID:1112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,18238944951549658389,4152372625059125870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,18238944951549658389,4152372625059125870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,18238944951549658389,4152372625059125870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:12⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,18238944951549658389,4152372625059125870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,18238944951549658389,4152372625059125870,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4620 /prefetch:82⤵PID:2676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,18238944951549658389,4152372625059125870,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4620 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,18238944951549658389,4152372625059125870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5896 /prefetch:12⤵PID:1808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,18238944951549658389,4152372625059125870,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:12⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,18238944951549658389,4152372625059125870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,18238944951549658389,4152372625059125870,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:12⤵PID:856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,18238944951549658389,4152372625059125870,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5796 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4292
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2604
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5477462b6ad8eaaf8d38f5e3a4daf17b0
SHA186174e670c44767c08a39cc2a53c09c318326201
SHA256e6bbd4933b9baa1df4bb633319174de07db176ec215e71c8568d27c5c577184d
SHA512a0acc2ef7fd0fcf413572eeb94d1e38aa6a682195cc03d6eaaaa0bc9e5f4b2c0033da0b835f4617aebc52069d0a10b52fc31ed53c2fe7943a480b55b7481dd4e
-
Filesize
152B
MD5b704c9ca0493bd4548ac9c69dc4a4f27
SHA1a3e5e54e630dabe55ca18a798d9f5681e0620ba7
SHA2562ebd5229b9dc642afba36a27c7ac12d90196b1c50985c37e94f4c17474e15411
SHA51269c8116fb542b344a8c55e2658078bd3e0d3564b1e4c889b072dbc99d2b070dacbc4394dedbc22a4968a8cf9448e71f69ec71ded018c1bacc0e195b3b3072d32
-
Filesize
469B
MD565796b1f23d64f9f79cfcc44e592a795
SHA1f2d07f4b95f40ff476807877a3d91f86236901d3
SHA25620e46cf40d73de987bdb556fabed62016d99a8ccf6c47599fcab94ef96ff636e
SHA512ecd756e454c6170cbd59fe74e6eda732648d5cf0b8e7f459c5636ca6d964436e4b395627a94e14089d70e93615f2ce2342910e33824678ccd54658045c44e441
-
Filesize
6KB
MD540501d0cb142d05fa2e5da04b87f0c96
SHA1e6e587adaa4950fda2ccb5c64cf9c1f48753f4ff
SHA25624fe94f78a7ee252817d39ba72b1b55d486cecc3570617a936b66fad2c76fac2
SHA512b57eb2be5bcb0eed19ee0050d7825d89c25d42751d348aa69c4769997354934e589e4642773c2c024b57b01f849f69367de73e97c6cf8c357a4fd5104f893dfc
-
Filesize
6KB
MD5a03122a9d35532c8dd23c560b90a1495
SHA15f3153f01eb6d9bc88559a4e27cdd55b3b5a1c59
SHA2562af27661fc456de41ed7ecb3ba3ea5a79e5b196d76f28e0f433c867f51982155
SHA512b84eca9b3529effbd2a9696af53d7eef5556314436af3f297c40cb146cbfb9283f8f96a3f4b49f19b8e39853b984a65c29309b3d88265cd68535558d1805e553
-
Filesize
6KB
MD523ec5c9ee3dcabf38452a8e5d12ab7e7
SHA1f395af391eaddfe97af04005e73e142fe7142ff0
SHA256c2a103c0cbe394fc5bdba76be6d7db35d1a6349770887ba7b62c7969a1c0e448
SHA512f2f5f84767d8b9bdc14895a5949c1bd34f1b1ba5c042d4c4005d5cdf377d695dc35f5d31cc1caf54bee8b69a0111747c8db64c1e6cd1ab1720478452a85fceb9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5cbfe7f8f8f39cedeec754b574773774b
SHA19fae9ca44c83c1e66cef5ef0c62e764554b7486e
SHA2562495bb5a61c5aec4718d7c2a90a99b18f2179ea6ca278608b719449177504d73
SHA5121684482d4de7fcb3c0f582393f123e3f2fd8b00c42f41cd3b739d60956ba9a09dfbe67958a707c08c4b65da3f87116322df9e56a6c32d7c32191d1664b15686d