Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
14/06/2024, 20:53
Static task
static1
Behavioral task
behavioral1
Sample
ab695698037de0205e90b986174d233c_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
ab695698037de0205e90b986174d233c_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
ab695698037de0205e90b986174d233c_JaffaCakes118.html
-
Size
18KB
-
MD5
ab695698037de0205e90b986174d233c
-
SHA1
b3a44696141606c456459d36b3e1cda8479f5f9f
-
SHA256
239ce9be2d1e5704af82513eb53a0bd08b7d5fb9000e08e8b88f7755c96d76d5
-
SHA512
c341b6d2c3927a0b35b617dbf41ea479fabbc53fcca70bf4f603926c10ddd75ab3a1511da5bb3b76dd3c8f44b982f44da498dd92864d9e82361a1f86be55a518
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIm4czUnjBhQK82qDB8:SIMd0I5nvHfsvQJxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4912 msedge.exe 4912 msedge.exe 4060 msedge.exe 4060 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4060 msedge.exe 4060 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4060 wrote to memory of 4332 4060 msedge.exe 81 PID 4060 wrote to memory of 4332 4060 msedge.exe 81 PID 4060 wrote to memory of 748 4060 msedge.exe 82 PID 4060 wrote to memory of 748 4060 msedge.exe 82 PID 4060 wrote to memory of 748 4060 msedge.exe 82 PID 4060 wrote to memory of 748 4060 msedge.exe 82 PID 4060 wrote to memory of 748 4060 msedge.exe 82 PID 4060 wrote to memory of 748 4060 msedge.exe 82 PID 4060 wrote to memory of 748 4060 msedge.exe 82 PID 4060 wrote to memory of 748 4060 msedge.exe 82 PID 4060 wrote to memory of 748 4060 msedge.exe 82 PID 4060 wrote to memory of 748 4060 msedge.exe 82 PID 4060 wrote to memory of 748 4060 msedge.exe 82 PID 4060 wrote to memory of 748 4060 msedge.exe 82 PID 4060 wrote to memory of 748 4060 msedge.exe 82 PID 4060 wrote to memory of 748 4060 msedge.exe 82 PID 4060 wrote to memory of 748 4060 msedge.exe 82 PID 4060 wrote to memory of 748 4060 msedge.exe 82 PID 4060 wrote to memory of 748 4060 msedge.exe 82 PID 4060 wrote to memory of 748 4060 msedge.exe 82 PID 4060 wrote to memory of 748 4060 msedge.exe 82 PID 4060 wrote to memory of 748 4060 msedge.exe 82 PID 4060 wrote to memory of 748 4060 msedge.exe 82 PID 4060 wrote to memory of 748 4060 msedge.exe 82 PID 4060 wrote to memory of 748 4060 msedge.exe 82 PID 4060 wrote to memory of 748 4060 msedge.exe 82 PID 4060 wrote to memory of 748 4060 msedge.exe 82 PID 4060 wrote to memory of 748 4060 msedge.exe 82 PID 4060 wrote to memory of 748 4060 msedge.exe 82 PID 4060 wrote to memory of 748 4060 msedge.exe 82 PID 4060 wrote to memory of 748 4060 msedge.exe 82 PID 4060 wrote to memory of 748 4060 msedge.exe 82 PID 4060 wrote to memory of 748 4060 msedge.exe 82 PID 4060 wrote to memory of 748 4060 msedge.exe 82 PID 4060 wrote to memory of 748 4060 msedge.exe 82 PID 4060 wrote to memory of 748 4060 msedge.exe 82 PID 4060 wrote to memory of 748 4060 msedge.exe 82 PID 4060 wrote to memory of 748 4060 msedge.exe 82 PID 4060 wrote to memory of 748 4060 msedge.exe 82 PID 4060 wrote to memory of 748 4060 msedge.exe 82 PID 4060 wrote to memory of 748 4060 msedge.exe 82 PID 4060 wrote to memory of 748 4060 msedge.exe 82 PID 4060 wrote to memory of 4912 4060 msedge.exe 83 PID 4060 wrote to memory of 4912 4060 msedge.exe 83 PID 4060 wrote to memory of 2492 4060 msedge.exe 84 PID 4060 wrote to memory of 2492 4060 msedge.exe 84 PID 4060 wrote to memory of 2492 4060 msedge.exe 84 PID 4060 wrote to memory of 2492 4060 msedge.exe 84 PID 4060 wrote to memory of 2492 4060 msedge.exe 84 PID 4060 wrote to memory of 2492 4060 msedge.exe 84 PID 4060 wrote to memory of 2492 4060 msedge.exe 84 PID 4060 wrote to memory of 2492 4060 msedge.exe 84 PID 4060 wrote to memory of 2492 4060 msedge.exe 84 PID 4060 wrote to memory of 2492 4060 msedge.exe 84 PID 4060 wrote to memory of 2492 4060 msedge.exe 84 PID 4060 wrote to memory of 2492 4060 msedge.exe 84 PID 4060 wrote to memory of 2492 4060 msedge.exe 84 PID 4060 wrote to memory of 2492 4060 msedge.exe 84 PID 4060 wrote to memory of 2492 4060 msedge.exe 84 PID 4060 wrote to memory of 2492 4060 msedge.exe 84 PID 4060 wrote to memory of 2492 4060 msedge.exe 84 PID 4060 wrote to memory of 2492 4060 msedge.exe 84 PID 4060 wrote to memory of 2492 4060 msedge.exe 84 PID 4060 wrote to memory of 2492 4060 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ab695698037de0205e90b986174d233c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd510a46f8,0x7ffd510a4708,0x7ffd510a47182⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,5412705569106258851,7766889926834485194,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,5412705569106258851,7766889926834485194,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,5412705569106258851,7766889926834485194,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:82⤵PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,5412705569106258851,7766889926834485194,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,5412705569106258851,7766889926834485194,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,5412705569106258851,7766889926834485194,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3504
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3324
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5db9081c34e133c32d02f593df88f047a
SHA1a0da007c14fd0591091924edc44bee90456700c6
SHA256c9cd202ebb55fe8dd3e5563948bab458e947d7ba33bc0f38c6b37ce5d0bd7c3e
SHA51212f9809958b024571891fae646208a76f3823ae333716a5cec303e15c38281db042b7acf95bc6523b6328ac9c8644794d39a0e03d9db196f156a6ee1fb4f2744
-
Filesize
152B
MD53a09f853479af373691d131247040276
SHA11b6f098e04da87e9cf2d3284943ec2144f36ac04
SHA256a358de2c0eba30c70a56022c44a3775aa99ffa819cd7f42f7c45ac358b5e739f
SHA512341cf0f363621ee02525cd398ae0d462319c6a80e05fd25d9aca44234c42a3071b51991d4cf102ac9d89561a1567cbe76dfeaad786a304bec33821ca77080016
-
Filesize
6KB
MD5b99599fc8ead4c7678f90c18955304ef
SHA1e7897eaf9f38b20827fa84ca834d688aa2e6e40f
SHA256526e54c54d8930943b04a0c793b3db4c3edb9a648d5e5636d42c1792facb1576
SHA51260fb52e804ae4e8cc2c964fff1a95bd5e8011b97aced8068ed0b4909e921e08df20bc617e16736e74dfe5341722edcda4ce6fa919c3cd94c915d2a1f8f537ec0
-
Filesize
6KB
MD58bd588b76f832c6adc5fb7651610a517
SHA147cd7cd77330fb326bad9a13a58d65da3d3c7353
SHA2566a7e01a51756d1b731e537e4a0fe2621ca96261c96cf21d0a1dd26f9449390b3
SHA512bb33566dd31c061cf986d70590de890178128a38fe3dc589d27e0bedd07169a8cc4e2a146914d2dd3a00d6f93d97712ff2903f8ddf6e0236671d803a536223d3
-
Filesize
6KB
MD5c151f945718091efee6ec8563f1d5f27
SHA11fba0f4f77e2f5166a1d8748bb992ab0dbae9f01
SHA256898190aa5866501181cf3c9952ce31d56bd8999d5a340c8253aa3bac84d77c9a
SHA512ad847e2109e4cc00265e52ae35c8b41a0a4d19b99e6f17356c184196206be402d80bc9cb05361db1319b35e074e82cb24b83b3246bdb55988fa7c517e050c4fa
-
Filesize
11KB
MD591222c2b69bcc7c427c2d23d09892cc0
SHA1896d1d121bbbc91d5b413d5e8bf9511b9d7a371c
SHA2566c9e5b0cb3b0bc5c7d1a912c8998606485b3d88dec7f553242c44aab1549d7b2
SHA5129c8c229f5a24b0787c1eab4251e15ed709a73444b21379f3c331671e491560955b54a171eab0d879ea6f82771822f2e5f0032f5b78c034452ffcfce669b0e816