Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
14-06-2024 17:46
Static task
static1
Behavioral task
behavioral1
Sample
aafa08a586d6662da99a18115d06eb19_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
aafa08a586d6662da99a18115d06eb19_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
aafa08a586d6662da99a18115d06eb19_JaffaCakes118.html
-
Size
27KB
-
MD5
aafa08a586d6662da99a18115d06eb19
-
SHA1
6a64a1bb4a8b0978a08be2ddd26c74edabcb33c1
-
SHA256
34ef08f7641420f4843710078190a4694e5a5900a10c26f2e48a79b5dcf241f5
-
SHA512
b7d2f5fe23497a45479dbed968b9b209a47fb3f0696215438e8781ebdd07c5ecc35b9412729ca072b48caa52a624fd3ed2638870c9aeb88d1c525c61c713b28e
-
SSDEEP
192:uwfMb5n0SnQjxn5Q/fnQieWNn18nQOkEnthxnQTbn2cnQ9egum6uHh2AGoQl7MBB:VQ/z4nxmu2AG7Ss3o
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 920 msedge.exe 920 msedge.exe 428 msedge.exe 428 msedge.exe 540 identity_helper.exe 540 identity_helper.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 428 wrote to memory of 4344 428 msedge.exe 82 PID 428 wrote to memory of 4344 428 msedge.exe 82 PID 428 wrote to memory of 1996 428 msedge.exe 83 PID 428 wrote to memory of 1996 428 msedge.exe 83 PID 428 wrote to memory of 1996 428 msedge.exe 83 PID 428 wrote to memory of 1996 428 msedge.exe 83 PID 428 wrote to memory of 1996 428 msedge.exe 83 PID 428 wrote to memory of 1996 428 msedge.exe 83 PID 428 wrote to memory of 1996 428 msedge.exe 83 PID 428 wrote to memory of 1996 428 msedge.exe 83 PID 428 wrote to memory of 1996 428 msedge.exe 83 PID 428 wrote to memory of 1996 428 msedge.exe 83 PID 428 wrote to memory of 1996 428 msedge.exe 83 PID 428 wrote to memory of 1996 428 msedge.exe 83 PID 428 wrote to memory of 1996 428 msedge.exe 83 PID 428 wrote to memory of 1996 428 msedge.exe 83 PID 428 wrote to memory of 1996 428 msedge.exe 83 PID 428 wrote to memory of 1996 428 msedge.exe 83 PID 428 wrote to memory of 1996 428 msedge.exe 83 PID 428 wrote to memory of 1996 428 msedge.exe 83 PID 428 wrote to memory of 1996 428 msedge.exe 83 PID 428 wrote to memory of 1996 428 msedge.exe 83 PID 428 wrote to memory of 1996 428 msedge.exe 83 PID 428 wrote to memory of 1996 428 msedge.exe 83 PID 428 wrote to memory of 1996 428 msedge.exe 83 PID 428 wrote to memory of 1996 428 msedge.exe 83 PID 428 wrote to memory of 1996 428 msedge.exe 83 PID 428 wrote to memory of 1996 428 msedge.exe 83 PID 428 wrote to memory of 1996 428 msedge.exe 83 PID 428 wrote to memory of 1996 428 msedge.exe 83 PID 428 wrote to memory of 1996 428 msedge.exe 83 PID 428 wrote to memory of 1996 428 msedge.exe 83 PID 428 wrote to memory of 1996 428 msedge.exe 83 PID 428 wrote to memory of 1996 428 msedge.exe 83 PID 428 wrote to memory of 1996 428 msedge.exe 83 PID 428 wrote to memory of 1996 428 msedge.exe 83 PID 428 wrote to memory of 1996 428 msedge.exe 83 PID 428 wrote to memory of 1996 428 msedge.exe 83 PID 428 wrote to memory of 1996 428 msedge.exe 83 PID 428 wrote to memory of 1996 428 msedge.exe 83 PID 428 wrote to memory of 1996 428 msedge.exe 83 PID 428 wrote to memory of 1996 428 msedge.exe 83 PID 428 wrote to memory of 920 428 msedge.exe 84 PID 428 wrote to memory of 920 428 msedge.exe 84 PID 428 wrote to memory of 4632 428 msedge.exe 85 PID 428 wrote to memory of 4632 428 msedge.exe 85 PID 428 wrote to memory of 4632 428 msedge.exe 85 PID 428 wrote to memory of 4632 428 msedge.exe 85 PID 428 wrote to memory of 4632 428 msedge.exe 85 PID 428 wrote to memory of 4632 428 msedge.exe 85 PID 428 wrote to memory of 4632 428 msedge.exe 85 PID 428 wrote to memory of 4632 428 msedge.exe 85 PID 428 wrote to memory of 4632 428 msedge.exe 85 PID 428 wrote to memory of 4632 428 msedge.exe 85 PID 428 wrote to memory of 4632 428 msedge.exe 85 PID 428 wrote to memory of 4632 428 msedge.exe 85 PID 428 wrote to memory of 4632 428 msedge.exe 85 PID 428 wrote to memory of 4632 428 msedge.exe 85 PID 428 wrote to memory of 4632 428 msedge.exe 85 PID 428 wrote to memory of 4632 428 msedge.exe 85 PID 428 wrote to memory of 4632 428 msedge.exe 85 PID 428 wrote to memory of 4632 428 msedge.exe 85 PID 428 wrote to memory of 4632 428 msedge.exe 85 PID 428 wrote to memory of 4632 428 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\aafa08a586d6662da99a18115d06eb19_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb60b546f8,0x7ffb60b54708,0x7ffb60b547182⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,9897902175027735830,5351760902731262816,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,9897902175027735830,5351760902731262816,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,9897902175027735830,5351760902731262816,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2940 /prefetch:82⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,9897902175027735830,5351760902731262816,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,9897902175027735830,5351760902731262816,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,9897902175027735830,5351760902731262816,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2596 /prefetch:82⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,9897902175027735830,5351760902731262816,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2596 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,9897902175027735830,5351760902731262816,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,9897902175027735830,5351760902731262816,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,9897902175027735830,5351760902731262816,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:12⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,9897902175027735830,5351760902731262816,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5880 /prefetch:12⤵PID:900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,9897902175027735830,5351760902731262816,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5012 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4668
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4424
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5cf6227dbdd57a2c4e7511a85fd719d06
SHA19a90b08eb50140bfd7ec6d1afe53d7689191cfee
SHA256d5f6e700004914402623d77afcd3a184d6ba9031d378a35ee6ceff607069c0f0
SHA512e09da4e32310c4fd14bba7257c6eae9309e0e4eefd4e0b4bb034e7ba9fe91c24cccc69c5492db3fa691bab7a829660446390969e41dccd83cf8249ace8b56c91
-
Filesize
152B
MD5477462b6ad8eaaf8d38f5e3a4daf17b0
SHA186174e670c44767c08a39cc2a53c09c318326201
SHA256e6bbd4933b9baa1df4bb633319174de07db176ec215e71c8568d27c5c577184d
SHA512a0acc2ef7fd0fcf413572eeb94d1e38aa6a682195cc03d6eaaaa0bc9e5f4b2c0033da0b835f4617aebc52069d0a10b52fc31ed53c2fe7943a480b55b7481dd4e
-
Filesize
152B
MD5b704c9ca0493bd4548ac9c69dc4a4f27
SHA1a3e5e54e630dabe55ca18a798d9f5681e0620ba7
SHA2562ebd5229b9dc642afba36a27c7ac12d90196b1c50985c37e94f4c17474e15411
SHA51269c8116fb542b344a8c55e2658078bd3e0d3564b1e4c889b072dbc99d2b070dacbc4394dedbc22a4968a8cf9448e71f69ec71ded018c1bacc0e195b3b3072d32
-
Filesize
6KB
MD575bfc6802c820d799b6063406d65d00c
SHA19f164c546100e0ca6f88418f2a7f95fd3276bbb6
SHA2568eb9f0843530317dc8427f4ea7629be2588777c4147c4ffc305cadf4fde8da28
SHA5123a9ade8f05aaa41be212d54a9db7e25af5570312f92208a774cf1940ac76cd0eecf83f9a0ea2d01cf1b2fc5551824ca8ee6417c190310c5e5637904d5f5a9023
-
Filesize
6KB
MD5c4f724f41c1b3a17e114b5595dab8296
SHA1090101f9bd1aa8e9d0364b82a68f6473bd502301
SHA25667e10cd1aec6e941b30aea30f1e1659c1f3e37bceefa50e362ecc379244e0dbd
SHA512d68316a71dcd7380643728e33317dfa2d283382109e00e059b7ff5467823b0f661117ff20c3872163c17ad1b673588b21b3cb1e43c17e1a151644661a85f5cc1
-
Filesize
6KB
MD553020fe974aefd61650ae64d506d54a1
SHA18ba3bfb0cc83411bb400a9bd52fd624a581c31f2
SHA256ea10156f4896f3c6ce9318d5179b7f5b9488dda3599c04d6da45db15238afd02
SHA512def8289e90e82b53b30f28fd4bbe0a2c9e1775dc8b7d08320e5da989fcfd00f6716891bf8dfc48c065839e56e98a7efaadc184acdef85cee4b5212709cf86545
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389