Analysis
-
max time kernel
149s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
16/06/2024, 02:20
Static task
static1
Behavioral task
behavioral1
Sample
b14db4896470a237e9be533474201578_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b14db4896470a237e9be533474201578_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b14db4896470a237e9be533474201578_JaffaCakes118.html
-
Size
25KB
-
MD5
b14db4896470a237e9be533474201578
-
SHA1
bf2db5a5ab0544b23bed27ae4e8499bca77e7d17
-
SHA256
c3470e136c84bf867fc683c00d5937e517b7a5aa4eed3f79b780864304da9acc
-
SHA512
e9f6d1a188313f010177649b9668c4b1ab81ad202dc26df92b41ce0d82562ad6a9624870847fe240553599cee7fd44c797d3d8457820831e4f7c6feaaa24c99e
-
SSDEEP
192:SI3YoaFSUMXOisOpEXiwPH4GuZE8cYEBeHpxfe8TjZUhdF3k7ygUiF3knUabcXVi:SIoCx34SffRnyP
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1400 msedge.exe 1400 msedge.exe 2696 msedge.exe 2696 msedge.exe 628 identity_helper.exe 628 identity_helper.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2696 wrote to memory of 2116 2696 msedge.exe 88 PID 2696 wrote to memory of 2116 2696 msedge.exe 88 PID 2696 wrote to memory of 4396 2696 msedge.exe 89 PID 2696 wrote to memory of 4396 2696 msedge.exe 89 PID 2696 wrote to memory of 4396 2696 msedge.exe 89 PID 2696 wrote to memory of 4396 2696 msedge.exe 89 PID 2696 wrote to memory of 4396 2696 msedge.exe 89 PID 2696 wrote to memory of 4396 2696 msedge.exe 89 PID 2696 wrote to memory of 4396 2696 msedge.exe 89 PID 2696 wrote to memory of 4396 2696 msedge.exe 89 PID 2696 wrote to memory of 4396 2696 msedge.exe 89 PID 2696 wrote to memory of 4396 2696 msedge.exe 89 PID 2696 wrote to memory of 4396 2696 msedge.exe 89 PID 2696 wrote to memory of 4396 2696 msedge.exe 89 PID 2696 wrote to memory of 4396 2696 msedge.exe 89 PID 2696 wrote to memory of 4396 2696 msedge.exe 89 PID 2696 wrote to memory of 4396 2696 msedge.exe 89 PID 2696 wrote to memory of 4396 2696 msedge.exe 89 PID 2696 wrote to memory of 4396 2696 msedge.exe 89 PID 2696 wrote to memory of 4396 2696 msedge.exe 89 PID 2696 wrote to memory of 4396 2696 msedge.exe 89 PID 2696 wrote to memory of 4396 2696 msedge.exe 89 PID 2696 wrote to memory of 4396 2696 msedge.exe 89 PID 2696 wrote to memory of 4396 2696 msedge.exe 89 PID 2696 wrote to memory of 4396 2696 msedge.exe 89 PID 2696 wrote to memory of 4396 2696 msedge.exe 89 PID 2696 wrote to memory of 4396 2696 msedge.exe 89 PID 2696 wrote to memory of 4396 2696 msedge.exe 89 PID 2696 wrote to memory of 4396 2696 msedge.exe 89 PID 2696 wrote to memory of 4396 2696 msedge.exe 89 PID 2696 wrote to memory of 4396 2696 msedge.exe 89 PID 2696 wrote to memory of 4396 2696 msedge.exe 89 PID 2696 wrote to memory of 4396 2696 msedge.exe 89 PID 2696 wrote to memory of 4396 2696 msedge.exe 89 PID 2696 wrote to memory of 4396 2696 msedge.exe 89 PID 2696 wrote to memory of 4396 2696 msedge.exe 89 PID 2696 wrote to memory of 4396 2696 msedge.exe 89 PID 2696 wrote to memory of 4396 2696 msedge.exe 89 PID 2696 wrote to memory of 4396 2696 msedge.exe 89 PID 2696 wrote to memory of 4396 2696 msedge.exe 89 PID 2696 wrote to memory of 4396 2696 msedge.exe 89 PID 2696 wrote to memory of 4396 2696 msedge.exe 89 PID 2696 wrote to memory of 1400 2696 msedge.exe 90 PID 2696 wrote to memory of 1400 2696 msedge.exe 90 PID 2696 wrote to memory of 4036 2696 msedge.exe 91 PID 2696 wrote to memory of 4036 2696 msedge.exe 91 PID 2696 wrote to memory of 4036 2696 msedge.exe 91 PID 2696 wrote to memory of 4036 2696 msedge.exe 91 PID 2696 wrote to memory of 4036 2696 msedge.exe 91 PID 2696 wrote to memory of 4036 2696 msedge.exe 91 PID 2696 wrote to memory of 4036 2696 msedge.exe 91 PID 2696 wrote to memory of 4036 2696 msedge.exe 91 PID 2696 wrote to memory of 4036 2696 msedge.exe 91 PID 2696 wrote to memory of 4036 2696 msedge.exe 91 PID 2696 wrote to memory of 4036 2696 msedge.exe 91 PID 2696 wrote to memory of 4036 2696 msedge.exe 91 PID 2696 wrote to memory of 4036 2696 msedge.exe 91 PID 2696 wrote to memory of 4036 2696 msedge.exe 91 PID 2696 wrote to memory of 4036 2696 msedge.exe 91 PID 2696 wrote to memory of 4036 2696 msedge.exe 91 PID 2696 wrote to memory of 4036 2696 msedge.exe 91 PID 2696 wrote to memory of 4036 2696 msedge.exe 91 PID 2696 wrote to memory of 4036 2696 msedge.exe 91 PID 2696 wrote to memory of 4036 2696 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b14db4896470a237e9be533474201578_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb18af46f8,0x7ffb18af4708,0x7ffb18af47182⤵PID:2116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,5495409782525175505,4652280818819556523,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,5495409782525175505,4652280818819556523,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,5495409782525175505,4652280818819556523,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2952 /prefetch:82⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,5495409782525175505,4652280818819556523,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,5495409782525175505,4652280818819556523,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,5495409782525175505,4652280818819556523,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5492 /prefetch:82⤵PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,5495409782525175505,4652280818819556523,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5492 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,5495409782525175505,4652280818819556523,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,5495409782525175505,4652280818819556523,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,5495409782525175505,4652280818819556523,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4204 /prefetch:12⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,5495409782525175505,4652280818819556523,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,5495409782525175505,4652280818819556523,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2792 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1124
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4388
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:668
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5257c0005d0c4d0bb282cb470925e4376
SHA1f9b8efb511ed64292568977c9f2ec255509e8f7d
SHA2568185c36aaacfc71e42f94fad8e198fe7fb2d868398ceabb89261cae94341cb22
SHA5122f3e8f352ed3ef88e8c28650390f93f98c92174d268330b886f3ebd1ba0163999051298ee12a054606b4986005452a241c6864cd292e69492d79c37d500556f4
-
Filesize
152B
MD54819fbc4513c82d92618f50a379ee232
SHA1ab618827ff269655283bf771fc957c8798ab51ee
SHA25605e479e8ec96b7505e01e5ec757ccfe35cb73cd46b27ff4746dce90d43d9237c
SHA512bc24fb972d04b55505101300e268f91b11e5833f1a18e925b5ded7e758b5e3e08bee1aa8f3a0b65514d6df981d0cbfa8798344db7f2a3675307df8de12ae475b
-
Filesize
5KB
MD53da5a11fd8abec86ea86666f735d797a
SHA1ee24331949036ecd12220164fbf02cc6a1223fe5
SHA256a0b028ded6569eaa9c8ae5d5974ccadcb778920e11599f641e590c535508f2d4
SHA512109f21020418c46c42067e296584e9611ee64a8b08f7bbeffa0e686369a02ebb6d7e8a8708bd3a2dfa328a3804baff346af8b16a5728b65b64c1fe293a04eea3
-
Filesize
5KB
MD54228908541df4f7e8b16aa4ea6baf5d5
SHA1f6c3bf90391c0ce1a1355c0c143b1284b44538c2
SHA2565dae9bce16021c6684401c25ba2f92740d3791944cfdefa8dfd485101137f3b2
SHA51294b1f8c7455c284a5fd9d7cfdfdda34d54cb5daf753dd895d50d51eebce3e1409238325a25fd25dfb0c29963e480ae07c6a10fcfe602cfaf44372ccd2bef5741
-
Filesize
5KB
MD5da7bfc5c30c88f6e6c2439998e97682b
SHA1d2b1425daa7b1ae49b4f83267dbacae3255c5a52
SHA2565a89a7bbe307431b0d86619b9433415b6ad928d33446172d496097026fce6a29
SHA5125192ff35afce12b0ab00dd759167b6dd7cefec2dd25be2300f8616d10bcf06edd20cae85dca7b7df36311097ae515923e7d6b3e2a47d016c92c46a3f467726ab
-
Filesize
24KB
MD595cd1581c30a5c26f698a8210bcab430
SHA15e8e551a47dd682ec51a7d6808fe8e0f2af39e86
SHA256d58162c5ae5e18fc06604c285e024c01686093d70994dc93b4ae9d85b4c3f7b9
SHA512e49403df10177053634c431203a91d26df5dfb23cbbb88847459ecdf4b6107040d0944a3e84ee6bb26cb4e8017a35c8c31b658387cd1b6938ba4cb9f59606ece
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD54541151d9c65cb456211bfbf328e2d43
SHA1c1846d170a6a6fa725e9722e1098432c924f3e34
SHA2560d7672517e030d10a14fbde8e3eb235e93a110437c4471e32a1b514c1bb48887
SHA512f08045df792f056ff19b4abd550d08b1e760dc4c5b2b8151a416d41c8875321c4c5d77432c51bb21debf00e930db475f544cc28a1601fc37f6150154abcb2460