Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
15/06/2024, 19:15
Static task
static1
Behavioral task
behavioral1
Sample
aff1d0e674f60b1e6c457cdb8392d421_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
aff1d0e674f60b1e6c457cdb8392d421_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
aff1d0e674f60b1e6c457cdb8392d421_JaffaCakes118.html
-
Size
96KB
-
MD5
aff1d0e674f60b1e6c457cdb8392d421
-
SHA1
7480474be45b2147cf3c2a4c9bf5bb962097640f
-
SHA256
af17c99466eb0aca038d1f9377bc26051d1adec30dd702723b67f51661dbac36
-
SHA512
997f35bd8c2f6533f849205debcb7b675a250add76f625b067a1d3663b583542b2d7a5237725b49832dddd30b6bd7dce449f603633d9b509456c716302cea942
-
SSDEEP
3072:D5F9X6PhuWCshUI83ZlGyvQWQz+LNnMOqVljisTnrbAmS3ogtrJN:02v3TGG
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1900 msedge.exe 1900 msedge.exe 1580 msedge.exe 1580 msedge.exe 4876 identity_helper.exe 4876 identity_helper.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1580 wrote to memory of 2112 1580 msedge.exe 82 PID 1580 wrote to memory of 2112 1580 msedge.exe 82 PID 1580 wrote to memory of 3180 1580 msedge.exe 84 PID 1580 wrote to memory of 3180 1580 msedge.exe 84 PID 1580 wrote to memory of 3180 1580 msedge.exe 84 PID 1580 wrote to memory of 3180 1580 msedge.exe 84 PID 1580 wrote to memory of 3180 1580 msedge.exe 84 PID 1580 wrote to memory of 3180 1580 msedge.exe 84 PID 1580 wrote to memory of 3180 1580 msedge.exe 84 PID 1580 wrote to memory of 3180 1580 msedge.exe 84 PID 1580 wrote to memory of 3180 1580 msedge.exe 84 PID 1580 wrote to memory of 3180 1580 msedge.exe 84 PID 1580 wrote to memory of 3180 1580 msedge.exe 84 PID 1580 wrote to memory of 3180 1580 msedge.exe 84 PID 1580 wrote to memory of 3180 1580 msedge.exe 84 PID 1580 wrote to memory of 3180 1580 msedge.exe 84 PID 1580 wrote to memory of 3180 1580 msedge.exe 84 PID 1580 wrote to memory of 3180 1580 msedge.exe 84 PID 1580 wrote to memory of 3180 1580 msedge.exe 84 PID 1580 wrote to memory of 3180 1580 msedge.exe 84 PID 1580 wrote to memory of 3180 1580 msedge.exe 84 PID 1580 wrote to memory of 3180 1580 msedge.exe 84 PID 1580 wrote to memory of 3180 1580 msedge.exe 84 PID 1580 wrote to memory of 3180 1580 msedge.exe 84 PID 1580 wrote to memory of 3180 1580 msedge.exe 84 PID 1580 wrote to memory of 3180 1580 msedge.exe 84 PID 1580 wrote to memory of 3180 1580 msedge.exe 84 PID 1580 wrote to memory of 3180 1580 msedge.exe 84 PID 1580 wrote to memory of 3180 1580 msedge.exe 84 PID 1580 wrote to memory of 3180 1580 msedge.exe 84 PID 1580 wrote to memory of 3180 1580 msedge.exe 84 PID 1580 wrote to memory of 3180 1580 msedge.exe 84 PID 1580 wrote to memory of 3180 1580 msedge.exe 84 PID 1580 wrote to memory of 3180 1580 msedge.exe 84 PID 1580 wrote to memory of 3180 1580 msedge.exe 84 PID 1580 wrote to memory of 3180 1580 msedge.exe 84 PID 1580 wrote to memory of 3180 1580 msedge.exe 84 PID 1580 wrote to memory of 3180 1580 msedge.exe 84 PID 1580 wrote to memory of 3180 1580 msedge.exe 84 PID 1580 wrote to memory of 3180 1580 msedge.exe 84 PID 1580 wrote to memory of 3180 1580 msedge.exe 84 PID 1580 wrote to memory of 3180 1580 msedge.exe 84 PID 1580 wrote to memory of 1900 1580 msedge.exe 85 PID 1580 wrote to memory of 1900 1580 msedge.exe 85 PID 1580 wrote to memory of 1428 1580 msedge.exe 86 PID 1580 wrote to memory of 1428 1580 msedge.exe 86 PID 1580 wrote to memory of 1428 1580 msedge.exe 86 PID 1580 wrote to memory of 1428 1580 msedge.exe 86 PID 1580 wrote to memory of 1428 1580 msedge.exe 86 PID 1580 wrote to memory of 1428 1580 msedge.exe 86 PID 1580 wrote to memory of 1428 1580 msedge.exe 86 PID 1580 wrote to memory of 1428 1580 msedge.exe 86 PID 1580 wrote to memory of 1428 1580 msedge.exe 86 PID 1580 wrote to memory of 1428 1580 msedge.exe 86 PID 1580 wrote to memory of 1428 1580 msedge.exe 86 PID 1580 wrote to memory of 1428 1580 msedge.exe 86 PID 1580 wrote to memory of 1428 1580 msedge.exe 86 PID 1580 wrote to memory of 1428 1580 msedge.exe 86 PID 1580 wrote to memory of 1428 1580 msedge.exe 86 PID 1580 wrote to memory of 1428 1580 msedge.exe 86 PID 1580 wrote to memory of 1428 1580 msedge.exe 86 PID 1580 wrote to memory of 1428 1580 msedge.exe 86 PID 1580 wrote to memory of 1428 1580 msedge.exe 86 PID 1580 wrote to memory of 1428 1580 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\aff1d0e674f60b1e6c457cdb8392d421_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffd4e046f8,0x7fffd4e04708,0x7fffd4e047182⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,16233939008342544933,18073363229936037473,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,16233939008342544933,18073363229936037473,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,16233939008342544933,18073363229936037473,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2624 /prefetch:82⤵PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,16233939008342544933,18073363229936037473,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,16233939008342544933,18073363229936037473,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,16233939008342544933,18073363229936037473,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5872 /prefetch:12⤵PID:2604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,16233939008342544933,18073363229936037473,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5860 /prefetch:12⤵PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,16233939008342544933,18073363229936037473,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5304 /prefetch:82⤵PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,16233939008342544933,18073363229936037473,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5304 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,16233939008342544933,18073363229936037473,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:12⤵PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,16233939008342544933,18073363229936037473,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,16233939008342544933,18073363229936037473,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4764 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4992
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:440
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c5abc082d9d9307e797b7e89a2f755f4
SHA154c442690a8727f1d3453b6452198d3ec4ec13df
SHA256a055d69c6aba59e97e632d118b7960a5fdfbe35cfdfaa0de14f194fc6f874716
SHA512ad765cddbf89472988de5356db5e0ee254ca3475491c6034fba1897c373702ab7cfa4bd21662ab862eebb48a757c3eb86b1f8ed58629751f71863822a59cd26c
-
Filesize
152B
MD5b4a74bc775caf3de7fc9cde3c30ce482
SHA1c6ed3161390e5493f71182a6cb98d51c9063775d
SHA256dfad4e020a946f85523604816a0a9781091ee4669c870db2cabab027f8b6f280
SHA51255578e254444a645f455ea38480c9e02599ebf9522c32aca50ff37aad33976db30e663d35ebe31ff0ecafb4007362261716f756b3a0d67ac3937ca62ff10e25f
-
Filesize
730B
MD5fe715575e164d2e81b32a29ca9cddea3
SHA181bfab5035e9a4255ac63d814e481503ecf99b9b
SHA256f7c9786ec8e7913e9f6200fa1d372e5a86f7d51b53b9eca4e1426879c4b8880e
SHA51299d59ee8d636380f54e3e937185c9384a680a7b29073c50854dfc4e29fb7df2eb3435f10bda4f6b4446ab0ace5269ef86abb2d42e79c8887dc84277d735dfac5
-
Filesize
6KB
MD504a23ee286a742404078785404916347
SHA1ca2d290c05c6c4a00fcc08519c78bf71d39c832f
SHA2561efafc7e14ad7bf0a46d1fec0f18465e6e53e8f4d4a8daa439a2a57949bc5de4
SHA512d7fb4f63c47713ab616e8713e1c818b08efbf6ee7fe8c707ec26c4ee038fb6c1683e984ec57c39069a2b26cf5c1367e73117c3a314746d6c467b0c86207c32e8
-
Filesize
6KB
MD5b41ce36dc0735aba74a065cb558bd18d
SHA197bfe8c0868212bb92f10f80c6dac0404d593704
SHA256d2d69ab307b6d2b5540197b2ad7bb0d8501ec7adcd389a2b7c4d6f14833b0dba
SHA512d8e186b4e859588492478de1b3018919d5824cbd0d9eb30b9434a819a3ec3e00ba9313ee93c909d3720fa09034f9dcb1f95f46acda6842c853f9b54a0936ad26
-
Filesize
6KB
MD518a837b1e92c07224e879fdf155a2226
SHA1fc019f0a24992b3c95a600670e89d9e1c2d805a7
SHA2566345ecf6ab4c7b2aa4105a5792ecfa5c20dbbcb6aa8d9fbe47ebdc22397f4ad4
SHA5129731921d79c646e293a54dde466fed04013f44a8c96c7bfa02ac67370850bdd7e8f8e82750b4e73623d5e0851f2ff74b52658ca22e1028fc021c94c85292ba78
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD58e017952e09513de5954f4fe0c81314e
SHA15aee7df1fd7b08518c6fa38023f3092d4ca2e4e0
SHA2562f9eb2e35564f095909213b13e7f644c1beb504bdaa475d067f883b3ca8266bd
SHA5126fedc11cf5ef1095cf8d756239c608f364892e1d83b9be8928229adfa8720dd1fc32a57321090d100b7e3509eca0dc48df7e87d5a80a1329f8e90a6e055433d9