Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
16/06/2024, 00:40
Static task
static1
Behavioral task
behavioral1
Sample
b0f108e3d91a16372dfb1eaa743d08f8_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b0f108e3d91a16372dfb1eaa743d08f8_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b0f108e3d91a16372dfb1eaa743d08f8_JaffaCakes118.html
-
Size
4KB
-
MD5
b0f108e3d91a16372dfb1eaa743d08f8
-
SHA1
410baf27def9ad1d4514fc56901bc18410bc7173
-
SHA256
e9a956035b39f4490e379e11898444ccbc3c6918bb5ebecd248e95402fbec616
-
SHA512
5f185883c1857ac58fabf53f5ee4c581c1a3d32f42411043dfae9ea0a953575dd1f9d3878c8766d34944435587c329275913a9ec024216e9fd0d4a05e04e8a65
-
SSDEEP
96:nIa7m9VIVnVtV9V2iUFgb0jF0E/bAUoryzoW1+no2w4ozZogAsoCEobcimTolyos:nIpVIVnVtV9V2iUSwR0E/bJkMf1KTVmy
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3664 msedge.exe 3664 msedge.exe 4240 msedge.exe 4240 msedge.exe 1372 identity_helper.exe 1372 identity_helper.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4240 wrote to memory of 5052 4240 msedge.exe 82 PID 4240 wrote to memory of 5052 4240 msedge.exe 82 PID 4240 wrote to memory of 4120 4240 msedge.exe 83 PID 4240 wrote to memory of 4120 4240 msedge.exe 83 PID 4240 wrote to memory of 4120 4240 msedge.exe 83 PID 4240 wrote to memory of 4120 4240 msedge.exe 83 PID 4240 wrote to memory of 4120 4240 msedge.exe 83 PID 4240 wrote to memory of 4120 4240 msedge.exe 83 PID 4240 wrote to memory of 4120 4240 msedge.exe 83 PID 4240 wrote to memory of 4120 4240 msedge.exe 83 PID 4240 wrote to memory of 4120 4240 msedge.exe 83 PID 4240 wrote to memory of 4120 4240 msedge.exe 83 PID 4240 wrote to memory of 4120 4240 msedge.exe 83 PID 4240 wrote to memory of 4120 4240 msedge.exe 83 PID 4240 wrote to memory of 4120 4240 msedge.exe 83 PID 4240 wrote to memory of 4120 4240 msedge.exe 83 PID 4240 wrote to memory of 4120 4240 msedge.exe 83 PID 4240 wrote to memory of 4120 4240 msedge.exe 83 PID 4240 wrote to memory of 4120 4240 msedge.exe 83 PID 4240 wrote to memory of 4120 4240 msedge.exe 83 PID 4240 wrote to memory of 4120 4240 msedge.exe 83 PID 4240 wrote to memory of 4120 4240 msedge.exe 83 PID 4240 wrote to memory of 4120 4240 msedge.exe 83 PID 4240 wrote to memory of 4120 4240 msedge.exe 83 PID 4240 wrote to memory of 4120 4240 msedge.exe 83 PID 4240 wrote to memory of 4120 4240 msedge.exe 83 PID 4240 wrote to memory of 4120 4240 msedge.exe 83 PID 4240 wrote to memory of 4120 4240 msedge.exe 83 PID 4240 wrote to memory of 4120 4240 msedge.exe 83 PID 4240 wrote to memory of 4120 4240 msedge.exe 83 PID 4240 wrote to memory of 4120 4240 msedge.exe 83 PID 4240 wrote to memory of 4120 4240 msedge.exe 83 PID 4240 wrote to memory of 4120 4240 msedge.exe 83 PID 4240 wrote to memory of 4120 4240 msedge.exe 83 PID 4240 wrote to memory of 4120 4240 msedge.exe 83 PID 4240 wrote to memory of 4120 4240 msedge.exe 83 PID 4240 wrote to memory of 4120 4240 msedge.exe 83 PID 4240 wrote to memory of 4120 4240 msedge.exe 83 PID 4240 wrote to memory of 4120 4240 msedge.exe 83 PID 4240 wrote to memory of 4120 4240 msedge.exe 83 PID 4240 wrote to memory of 4120 4240 msedge.exe 83 PID 4240 wrote to memory of 4120 4240 msedge.exe 83 PID 4240 wrote to memory of 3664 4240 msedge.exe 84 PID 4240 wrote to memory of 3664 4240 msedge.exe 84 PID 4240 wrote to memory of 4520 4240 msedge.exe 85 PID 4240 wrote to memory of 4520 4240 msedge.exe 85 PID 4240 wrote to memory of 4520 4240 msedge.exe 85 PID 4240 wrote to memory of 4520 4240 msedge.exe 85 PID 4240 wrote to memory of 4520 4240 msedge.exe 85 PID 4240 wrote to memory of 4520 4240 msedge.exe 85 PID 4240 wrote to memory of 4520 4240 msedge.exe 85 PID 4240 wrote to memory of 4520 4240 msedge.exe 85 PID 4240 wrote to memory of 4520 4240 msedge.exe 85 PID 4240 wrote to memory of 4520 4240 msedge.exe 85 PID 4240 wrote to memory of 4520 4240 msedge.exe 85 PID 4240 wrote to memory of 4520 4240 msedge.exe 85 PID 4240 wrote to memory of 4520 4240 msedge.exe 85 PID 4240 wrote to memory of 4520 4240 msedge.exe 85 PID 4240 wrote to memory of 4520 4240 msedge.exe 85 PID 4240 wrote to memory of 4520 4240 msedge.exe 85 PID 4240 wrote to memory of 4520 4240 msedge.exe 85 PID 4240 wrote to memory of 4520 4240 msedge.exe 85 PID 4240 wrote to memory of 4520 4240 msedge.exe 85 PID 4240 wrote to memory of 4520 4240 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b0f108e3d91a16372dfb1eaa743d08f8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb29fd46f8,0x7ffb29fd4708,0x7ffb29fd47182⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,2908298938724911350,16141451006464259518,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,2908298938724911350,16141451006464259518,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,2908298938724911350,16141451006464259518,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2952 /prefetch:82⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,2908298938724911350,16141451006464259518,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,2908298938724911350,16141451006464259518,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,2908298938724911350,16141451006464259518,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:82⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,2908298938724911350,16141451006464259518,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,2908298938724911350,16141451006464259518,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,2908298938724911350,16141451006464259518,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,2908298938724911350,16141451006464259518,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,2908298938724911350,16141451006464259518,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,2908298938724911350,16141451006464259518,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4964 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:808
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2556
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1136
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dabfafd78687947a9de64dd5b776d25f
SHA116084c74980dbad713f9d332091985808b436dea
SHA256c7658f407cbe799282ef202e78319e489ed4e48e23f6d056b505bc0d73e34201
SHA512dae1de5245cd9b72117c430250aa2029eb8df1b85dc414ac50152d8eba4d100bcf0320ac18446f865dc96949f8b06a5b9e7a0c84f9c1b0eada318e80f99f9d2b
-
Filesize
152B
MD5c39b3aa574c0c938c80eb263bb450311
SHA1f4d11275b63f4f906be7a55ec6ca050c62c18c88
SHA25666f8d413a30451055d4b6fa40e007197a4bb93a66a28ca4112967ec417ffab6c
SHA512eeca2e21cd4d66835beb9812e26344c8695584253af397b06f378536ca797c3906a670ed239631729c96ebb93acfb16327cf58d517e83fb8923881c5fdb6d232
-
Filesize
263B
MD5fa70eb9fd4feba184cd32e6a1eb4563e
SHA12081eb84ce29f7db74d48e97510839562daa9aa4
SHA2560e30be26fb5b7de2331ca111fc9435b02681d746b26b225cc3995937972d0259
SHA5128ddc5e2c028fb65322000391b8292e99ea96dcd26b47de9d6af55ac096a7ca26853927fc88f49a0ad6c929995682d3fa19269d22f417fecac30b17631783a815
-
Filesize
6KB
MD5a0f8df8f5236683a5e4a504e6f49d96e
SHA17eaa01bcb1770bc5789ab9fceb695512d07b5e12
SHA256abd4c4f8282c026bc4f5ebca7e78e193505bf68ca6817ff684ecbbcd12d377cc
SHA512e6ed96385008215007156afc3d5bc52165a0c8aa2a47de07a7244058e6769877711080b78f6a93df5b80d4efa50e54207236ec488bb5842623512127cdc70736
-
Filesize
6KB
MD5a150c9f39e2419e83e1c886485ac888b
SHA133dbf79a9c1f52f3746a4b72991b5327c94a748b
SHA256266101f8f4a2ff024d26c48c723edbfa11e9cb5e60189f4c03de74b6d05e8f47
SHA5127f8337bc1b74ee0dcef9683bac14cc37146fb140e18e44990fcf8c672d992b3c986ea3406716f5ed880e23743079b953922ad7c1dc3a66924755c268649c7e66
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52e464318d758238df169839392fb69a6
SHA181af6d908fe8962a7cf9f40fa69776909598e6f7
SHA256420083e4b0fd911878fbac44eef6882520d2c9aec230bc03762a90bd22550047
SHA512dc6f248266c56449450de567fe1e748e24b44968d9ba31f9d53ac1c1cbb44d4009fc586b7d98045656e69cc2c7caaa1125e18848d4a49f1ddc9dba4ec528af20