Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16/06/2024, 02:03
Static task
static1
Behavioral task
behavioral1
Sample
b13de83894b5f468b80a8614e98ce82b_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b13de83894b5f468b80a8614e98ce82b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b13de83894b5f468b80a8614e98ce82b_JaffaCakes118.html
-
Size
79KB
-
MD5
b13de83894b5f468b80a8614e98ce82b
-
SHA1
12ec5dd8f77f842aac76aa23cbe66f43afb5b286
-
SHA256
14aba962eee12fc6c80192f84e4787d409dc3b94e15da33615dcb674cce05135
-
SHA512
c08d160351ba53aad71a0cb9f76795dba4749914d8ca1d608cceb63d0c50c9212bc66db3f23e6b433f9f4c60ad6566ee0bff97f0155389a1f0b88bb8c9c58b89
-
SSDEEP
768:d4HStU6EJjFDAxIAXfRDP5BQuCaxq4xgaUrFD+M1GDchN28+2h/icsEic:eyepAxXfVBBLCWc51RhN2VG/i5EF
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3376 msedge.exe 3376 msedge.exe 2604 msedge.exe 2604 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2604 wrote to memory of 2320 2604 msedge.exe 82 PID 2604 wrote to memory of 2320 2604 msedge.exe 82 PID 2604 wrote to memory of 2580 2604 msedge.exe 83 PID 2604 wrote to memory of 2580 2604 msedge.exe 83 PID 2604 wrote to memory of 2580 2604 msedge.exe 83 PID 2604 wrote to memory of 2580 2604 msedge.exe 83 PID 2604 wrote to memory of 2580 2604 msedge.exe 83 PID 2604 wrote to memory of 2580 2604 msedge.exe 83 PID 2604 wrote to memory of 2580 2604 msedge.exe 83 PID 2604 wrote to memory of 2580 2604 msedge.exe 83 PID 2604 wrote to memory of 2580 2604 msedge.exe 83 PID 2604 wrote to memory of 2580 2604 msedge.exe 83 PID 2604 wrote to memory of 2580 2604 msedge.exe 83 PID 2604 wrote to memory of 2580 2604 msedge.exe 83 PID 2604 wrote to memory of 2580 2604 msedge.exe 83 PID 2604 wrote to memory of 2580 2604 msedge.exe 83 PID 2604 wrote to memory of 2580 2604 msedge.exe 83 PID 2604 wrote to memory of 2580 2604 msedge.exe 83 PID 2604 wrote to memory of 2580 2604 msedge.exe 83 PID 2604 wrote to memory of 2580 2604 msedge.exe 83 PID 2604 wrote to memory of 2580 2604 msedge.exe 83 PID 2604 wrote to memory of 2580 2604 msedge.exe 83 PID 2604 wrote to memory of 2580 2604 msedge.exe 83 PID 2604 wrote to memory of 2580 2604 msedge.exe 83 PID 2604 wrote to memory of 2580 2604 msedge.exe 83 PID 2604 wrote to memory of 2580 2604 msedge.exe 83 PID 2604 wrote to memory of 2580 2604 msedge.exe 83 PID 2604 wrote to memory of 2580 2604 msedge.exe 83 PID 2604 wrote to memory of 2580 2604 msedge.exe 83 PID 2604 wrote to memory of 2580 2604 msedge.exe 83 PID 2604 wrote to memory of 2580 2604 msedge.exe 83 PID 2604 wrote to memory of 2580 2604 msedge.exe 83 PID 2604 wrote to memory of 2580 2604 msedge.exe 83 PID 2604 wrote to memory of 2580 2604 msedge.exe 83 PID 2604 wrote to memory of 2580 2604 msedge.exe 83 PID 2604 wrote to memory of 2580 2604 msedge.exe 83 PID 2604 wrote to memory of 2580 2604 msedge.exe 83 PID 2604 wrote to memory of 2580 2604 msedge.exe 83 PID 2604 wrote to memory of 2580 2604 msedge.exe 83 PID 2604 wrote to memory of 2580 2604 msedge.exe 83 PID 2604 wrote to memory of 2580 2604 msedge.exe 83 PID 2604 wrote to memory of 2580 2604 msedge.exe 83 PID 2604 wrote to memory of 3376 2604 msedge.exe 84 PID 2604 wrote to memory of 3376 2604 msedge.exe 84 PID 2604 wrote to memory of 3180 2604 msedge.exe 85 PID 2604 wrote to memory of 3180 2604 msedge.exe 85 PID 2604 wrote to memory of 3180 2604 msedge.exe 85 PID 2604 wrote to memory of 3180 2604 msedge.exe 85 PID 2604 wrote to memory of 3180 2604 msedge.exe 85 PID 2604 wrote to memory of 3180 2604 msedge.exe 85 PID 2604 wrote to memory of 3180 2604 msedge.exe 85 PID 2604 wrote to memory of 3180 2604 msedge.exe 85 PID 2604 wrote to memory of 3180 2604 msedge.exe 85 PID 2604 wrote to memory of 3180 2604 msedge.exe 85 PID 2604 wrote to memory of 3180 2604 msedge.exe 85 PID 2604 wrote to memory of 3180 2604 msedge.exe 85 PID 2604 wrote to memory of 3180 2604 msedge.exe 85 PID 2604 wrote to memory of 3180 2604 msedge.exe 85 PID 2604 wrote to memory of 3180 2604 msedge.exe 85 PID 2604 wrote to memory of 3180 2604 msedge.exe 85 PID 2604 wrote to memory of 3180 2604 msedge.exe 85 PID 2604 wrote to memory of 3180 2604 msedge.exe 85 PID 2604 wrote to memory of 3180 2604 msedge.exe 85 PID 2604 wrote to memory of 3180 2604 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b13de83894b5f468b80a8614e98ce82b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff810c446f8,0x7ff810c44708,0x7ff810c447182⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,8573251585755774494,10296533832033072945,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:2580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,8573251585755774494,10296533832033072945,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,8573251585755774494,10296533832033072945,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,8573251585755774494,10296533832033072945,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:1312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,8573251585755774494,10296533832033072945,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,8573251585755774494,10296533832033072945,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4572 /prefetch:12⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,8573251585755774494,10296533832033072945,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4740 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4984
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3304
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1596
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD57f59f2a1551c92fd6ec57203232170fb
SHA1d2a3bdf0fdee42d7f721eedfa64ed663a726edd5
SHA256383fcc1ccf5bc1793da52e5ef1d52ca4a27825e07a95b2fd0bfd35fc037cca95
SHA5120792ec042b3e8eb3ed7fe7e31393a1e99524f2333324a633aa33d206d92b9654536069d3d2d267441c018861cc67a128a1754f81467df432c29430593829f551
-
Filesize
6KB
MD5772afeddcad5a3b3d9af26f6652ad97a
SHA1e13475aa56a4fe964ae3d78f6458a403cb6365fb
SHA2564512619a8543350832949bfd196b9af2875c7abe90c58297ba8a883f2e08c363
SHA512816a1b75c060c606c81efc3d924d54d4d6ad5ef39041e88d481b42aacb1c4246407c54f38d82795033d3873ca929b1677246839165e2b8b8b2a4b30cfa7e817b
-
Filesize
8KB
MD585fa5e2bfa841a07a58b3ff030dad431
SHA102646bb70a5c36a1caa1c83df371e87282a28577
SHA2567d6c75d807496e2d36a1f4e67ae78eaec040d9d27854b6df3a56b45dd03c4000
SHA5129775d4fbfa81ebe3d2c2df3a138147a54ec0abc4e9a1b41b6b1275046d935c398305420c7f0c5cf87d4aabfe3a7375a11164ba6ec2ecaa92d22e7f216a210737