Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16/06/2024, 03:54
Static task
static1
Behavioral task
behavioral1
Sample
b19e68d5b38316a7f9b15e4b52c22778_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b19e68d5b38316a7f9b15e4b52c22778_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b19e68d5b38316a7f9b15e4b52c22778_JaffaCakes118.html
-
Size
15KB
-
MD5
b19e68d5b38316a7f9b15e4b52c22778
-
SHA1
b950351097b413caba4b42fd07552e8cb7e3989a
-
SHA256
b5683de82277c44537f7bc33b6c8e3eb66713b35937b250e2f38c1b4751e1284
-
SHA512
985c9f6955d51eb8c0b299a2608c6d4efe00ace8f741f87b2f68ddc4cf5242232b93207a094539a45ba14d740ea502d6e3e30c47073e285183c76a2873a69cbd
-
SSDEEP
384:54/y48Z+uQuTXQPhMwAbK5M4T4K464Y4S49:56ylZ+qXQ5/CKWAp997a
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3776 msedge.exe 3776 msedge.exe 1076 msedge.exe 1076 msedge.exe 1180 identity_helper.exe 1180 identity_helper.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1076 wrote to memory of 3120 1076 msedge.exe 81 PID 1076 wrote to memory of 3120 1076 msedge.exe 81 PID 1076 wrote to memory of 1108 1076 msedge.exe 82 PID 1076 wrote to memory of 1108 1076 msedge.exe 82 PID 1076 wrote to memory of 1108 1076 msedge.exe 82 PID 1076 wrote to memory of 1108 1076 msedge.exe 82 PID 1076 wrote to memory of 1108 1076 msedge.exe 82 PID 1076 wrote to memory of 1108 1076 msedge.exe 82 PID 1076 wrote to memory of 1108 1076 msedge.exe 82 PID 1076 wrote to memory of 1108 1076 msedge.exe 82 PID 1076 wrote to memory of 1108 1076 msedge.exe 82 PID 1076 wrote to memory of 1108 1076 msedge.exe 82 PID 1076 wrote to memory of 1108 1076 msedge.exe 82 PID 1076 wrote to memory of 1108 1076 msedge.exe 82 PID 1076 wrote to memory of 1108 1076 msedge.exe 82 PID 1076 wrote to memory of 1108 1076 msedge.exe 82 PID 1076 wrote to memory of 1108 1076 msedge.exe 82 PID 1076 wrote to memory of 1108 1076 msedge.exe 82 PID 1076 wrote to memory of 1108 1076 msedge.exe 82 PID 1076 wrote to memory of 1108 1076 msedge.exe 82 PID 1076 wrote to memory of 1108 1076 msedge.exe 82 PID 1076 wrote to memory of 1108 1076 msedge.exe 82 PID 1076 wrote to memory of 1108 1076 msedge.exe 82 PID 1076 wrote to memory of 1108 1076 msedge.exe 82 PID 1076 wrote to memory of 1108 1076 msedge.exe 82 PID 1076 wrote to memory of 1108 1076 msedge.exe 82 PID 1076 wrote to memory of 1108 1076 msedge.exe 82 PID 1076 wrote to memory of 1108 1076 msedge.exe 82 PID 1076 wrote to memory of 1108 1076 msedge.exe 82 PID 1076 wrote to memory of 1108 1076 msedge.exe 82 PID 1076 wrote to memory of 1108 1076 msedge.exe 82 PID 1076 wrote to memory of 1108 1076 msedge.exe 82 PID 1076 wrote to memory of 1108 1076 msedge.exe 82 PID 1076 wrote to memory of 1108 1076 msedge.exe 82 PID 1076 wrote to memory of 1108 1076 msedge.exe 82 PID 1076 wrote to memory of 1108 1076 msedge.exe 82 PID 1076 wrote to memory of 1108 1076 msedge.exe 82 PID 1076 wrote to memory of 1108 1076 msedge.exe 82 PID 1076 wrote to memory of 1108 1076 msedge.exe 82 PID 1076 wrote to memory of 1108 1076 msedge.exe 82 PID 1076 wrote to memory of 1108 1076 msedge.exe 82 PID 1076 wrote to memory of 1108 1076 msedge.exe 82 PID 1076 wrote to memory of 3776 1076 msedge.exe 83 PID 1076 wrote to memory of 3776 1076 msedge.exe 83 PID 1076 wrote to memory of 5024 1076 msedge.exe 84 PID 1076 wrote to memory of 5024 1076 msedge.exe 84 PID 1076 wrote to memory of 5024 1076 msedge.exe 84 PID 1076 wrote to memory of 5024 1076 msedge.exe 84 PID 1076 wrote to memory of 5024 1076 msedge.exe 84 PID 1076 wrote to memory of 5024 1076 msedge.exe 84 PID 1076 wrote to memory of 5024 1076 msedge.exe 84 PID 1076 wrote to memory of 5024 1076 msedge.exe 84 PID 1076 wrote to memory of 5024 1076 msedge.exe 84 PID 1076 wrote to memory of 5024 1076 msedge.exe 84 PID 1076 wrote to memory of 5024 1076 msedge.exe 84 PID 1076 wrote to memory of 5024 1076 msedge.exe 84 PID 1076 wrote to memory of 5024 1076 msedge.exe 84 PID 1076 wrote to memory of 5024 1076 msedge.exe 84 PID 1076 wrote to memory of 5024 1076 msedge.exe 84 PID 1076 wrote to memory of 5024 1076 msedge.exe 84 PID 1076 wrote to memory of 5024 1076 msedge.exe 84 PID 1076 wrote to memory of 5024 1076 msedge.exe 84 PID 1076 wrote to memory of 5024 1076 msedge.exe 84 PID 1076 wrote to memory of 5024 1076 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b19e68d5b38316a7f9b15e4b52c22778_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe401546f8,0x7ffe40154708,0x7ffe401547182⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,6055158977919032791,15419877055645466107,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2004,6055158977919032791,15419877055645466107,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2448 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2004,6055158977919032791,15419877055645466107,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,6055158977919032791,15419877055645466107,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,6055158977919032791,15419877055645466107,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,6055158977919032791,15419877055645466107,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4364 /prefetch:82⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,6055158977919032791,15419877055645466107,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4364 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,6055158977919032791,15419877055645466107,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,6055158977919032791,15419877055645466107,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:12⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,6055158977919032791,15419877055645466107,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,6055158977919032791,15419877055645466107,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4328 /prefetch:12⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,6055158977919032791,15419877055645466107,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4420 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4464
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3612
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD548608a88a8844051044f57134255c9ba
SHA1ec7434a9ecaa2711e60bb53ce7045d1efe9fe3ea
SHA2567b7276b0a7b6cffc1f7e38d01b789d3d081e32dd140a7da838be655b0c1def4a
SHA512ccf2aa9fba62a97a59c5bd8f8fa3603043a093d1359bbca6fa95c158202e8157f797207ed7e0d63143ecb3175d9c12a8d467fc043ddfa0170eeb886bdc34a54f
-
Filesize
6KB
MD59dab0642b0b07915e87f55fc6028ca23
SHA1181ca4ff3bd09699d7053fbf9681caf839bfda82
SHA25620b683755dd90682a7266205934db3e87bbab520c4b0f062763fd22226439351
SHA512834a0512c7bcd5a61504c9205fd066f9780c160d1be998a8786ad1c4e0ddf417668d6b9d5d3bb647f54a3c826b4c393bc1682ef973558917ac1c2ece386b020c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5eb092bcf06d162057ee7c938a8888d28
SHA1f9a47e42e6065889707d1971b9965de4d8c01734
SHA256d27a76bfacd7d7798388fd514c48f62f7e3f3b6ed89247041683b445754a4c4a
SHA512cb6e65003ef3958a346e51880a86f704a6b7983e7d2edca64873cf593fcf827eaca76990654e67599f9d343dc7a3ea7f94103e964436b574bf931df17ea6ed03