Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 22:16
Static task
static1
Behavioral task
behavioral1
Sample
b06148994e38074e803f7e16501bfa8c_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b06148994e38074e803f7e16501bfa8c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b06148994e38074e803f7e16501bfa8c_JaffaCakes118.html
-
Size
18KB
-
MD5
b06148994e38074e803f7e16501bfa8c
-
SHA1
660305cee468bb0838de9c54b53b44d07333b26f
-
SHA256
dabb916ba37a0685a87884f9a8814f2c1a0544cdaaac31e94c84d85145efbf01
-
SHA512
086606b1539584c7aea769ad1b3453d790235c0a46fecaef52c7759894d8a8b61bb8d4dab2d772c9a855020d9010271d90e1105a4f3b7a90f4fdb53e8ca2d00c
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIa4QzUnjBhMm82qDB8:SIMd0I5nvHrsvMlxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4612 msedge.exe 4612 msedge.exe 804 msedge.exe 804 msedge.exe 1080 identity_helper.exe 1080 identity_helper.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 804 wrote to memory of 4812 804 msedge.exe 82 PID 804 wrote to memory of 4812 804 msedge.exe 82 PID 804 wrote to memory of 1276 804 msedge.exe 83 PID 804 wrote to memory of 1276 804 msedge.exe 83 PID 804 wrote to memory of 1276 804 msedge.exe 83 PID 804 wrote to memory of 1276 804 msedge.exe 83 PID 804 wrote to memory of 1276 804 msedge.exe 83 PID 804 wrote to memory of 1276 804 msedge.exe 83 PID 804 wrote to memory of 1276 804 msedge.exe 83 PID 804 wrote to memory of 1276 804 msedge.exe 83 PID 804 wrote to memory of 1276 804 msedge.exe 83 PID 804 wrote to memory of 1276 804 msedge.exe 83 PID 804 wrote to memory of 1276 804 msedge.exe 83 PID 804 wrote to memory of 1276 804 msedge.exe 83 PID 804 wrote to memory of 1276 804 msedge.exe 83 PID 804 wrote to memory of 1276 804 msedge.exe 83 PID 804 wrote to memory of 1276 804 msedge.exe 83 PID 804 wrote to memory of 1276 804 msedge.exe 83 PID 804 wrote to memory of 1276 804 msedge.exe 83 PID 804 wrote to memory of 1276 804 msedge.exe 83 PID 804 wrote to memory of 1276 804 msedge.exe 83 PID 804 wrote to memory of 1276 804 msedge.exe 83 PID 804 wrote to memory of 1276 804 msedge.exe 83 PID 804 wrote to memory of 1276 804 msedge.exe 83 PID 804 wrote to memory of 1276 804 msedge.exe 83 PID 804 wrote to memory of 1276 804 msedge.exe 83 PID 804 wrote to memory of 1276 804 msedge.exe 83 PID 804 wrote to memory of 1276 804 msedge.exe 83 PID 804 wrote to memory of 1276 804 msedge.exe 83 PID 804 wrote to memory of 1276 804 msedge.exe 83 PID 804 wrote to memory of 1276 804 msedge.exe 83 PID 804 wrote to memory of 1276 804 msedge.exe 83 PID 804 wrote to memory of 1276 804 msedge.exe 83 PID 804 wrote to memory of 1276 804 msedge.exe 83 PID 804 wrote to memory of 1276 804 msedge.exe 83 PID 804 wrote to memory of 1276 804 msedge.exe 83 PID 804 wrote to memory of 1276 804 msedge.exe 83 PID 804 wrote to memory of 1276 804 msedge.exe 83 PID 804 wrote to memory of 1276 804 msedge.exe 83 PID 804 wrote to memory of 1276 804 msedge.exe 83 PID 804 wrote to memory of 1276 804 msedge.exe 83 PID 804 wrote to memory of 1276 804 msedge.exe 83 PID 804 wrote to memory of 4612 804 msedge.exe 84 PID 804 wrote to memory of 4612 804 msedge.exe 84 PID 804 wrote to memory of 1056 804 msedge.exe 85 PID 804 wrote to memory of 1056 804 msedge.exe 85 PID 804 wrote to memory of 1056 804 msedge.exe 85 PID 804 wrote to memory of 1056 804 msedge.exe 85 PID 804 wrote to memory of 1056 804 msedge.exe 85 PID 804 wrote to memory of 1056 804 msedge.exe 85 PID 804 wrote to memory of 1056 804 msedge.exe 85 PID 804 wrote to memory of 1056 804 msedge.exe 85 PID 804 wrote to memory of 1056 804 msedge.exe 85 PID 804 wrote to memory of 1056 804 msedge.exe 85 PID 804 wrote to memory of 1056 804 msedge.exe 85 PID 804 wrote to memory of 1056 804 msedge.exe 85 PID 804 wrote to memory of 1056 804 msedge.exe 85 PID 804 wrote to memory of 1056 804 msedge.exe 85 PID 804 wrote to memory of 1056 804 msedge.exe 85 PID 804 wrote to memory of 1056 804 msedge.exe 85 PID 804 wrote to memory of 1056 804 msedge.exe 85 PID 804 wrote to memory of 1056 804 msedge.exe 85 PID 804 wrote to memory of 1056 804 msedge.exe 85 PID 804 wrote to memory of 1056 804 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b06148994e38074e803f7e16501bfa8c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe902246f8,0x7ffe90224708,0x7ffe902247182⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,13650910794926554285,11696140893967124825,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,13650910794926554285,11696140893967124825,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,13650910794926554285,11696140893967124825,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:82⤵PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13650910794926554285,11696140893967124825,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13650910794926554285,11696140893967124825,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,13650910794926554285,11696140893967124825,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4332 /prefetch:82⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,13650910794926554285,11696140893967124825,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4332 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13650910794926554285,11696140893967124825,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4508 /prefetch:12⤵PID:4148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13650910794926554285,11696140893967124825,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4316 /prefetch:12⤵PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13650910794926554285,11696140893967124825,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3972 /prefetch:12⤵PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13650910794926554285,11696140893967124825,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:12⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,13650910794926554285,11696140893967124825,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4148 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4784
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1828
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
5KB
MD5e487d6442cbd53061620accaec17c084
SHA1726d7fdd0aab84f1fad8c5869c355dfa57738ce9
SHA2565245f9025bc12785fc2016108456fa0770dc40c7282bc64cc91480ab26c5a414
SHA512b8d582e2f8543b0e9cae28f7eff49cb0d46575c800f8cb39b13e3ce4d7071eb451b201b0041678b5042e955c8c48d31c12176fcf731511f5a71e32d7c00cc243
-
Filesize
5KB
MD53f712d8902573c3f97c575b0cc1f7c8c
SHA1990b54c137dfec8e78a854d409f777ad0b0e3b2c
SHA2568c2b61b14f07ed677a26dfbdba49dd7fc458c6b7e24220fccd8e598328a2d072
SHA5127dc803d655644c08837486572f48f1e61ca88f83ca37136adb1ac90582d217e13668bc96c16de8c9d60a1a3fc7d5cb6caff2f7c84de6414d6cb7c38a4e3fa00a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD58bdc8aaf94023f849bcd7d60296d23cf
SHA1b4b09ef889aa160323aa905c7b0aea37983c78c4
SHA2567a2a93c9883a2b0e41583bfccf4c896871df97bfa719fefe88297a00299fe9f7
SHA512936233ac8d2bf8d681420b6c79231dff67b30b2cf76f6d271c283c50b32669a095970f7949063a54529f72891fd65ae1b335e73996b7a9397c501aa23f32ad96