Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16/06/2024, 05:48
Static task
static1
Behavioral task
behavioral1
Sample
b1fc6d682f73f57cfb39c074ff5eebe1_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
b1fc6d682f73f57cfb39c074ff5eebe1_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b1fc6d682f73f57cfb39c074ff5eebe1_JaffaCakes118.html
-
Size
46KB
-
MD5
b1fc6d682f73f57cfb39c074ff5eebe1
-
SHA1
e1edda840b7ded76d7e8dedbe860af7220c8326b
-
SHA256
b40a0f609ef3d4f15a2b3baa609c0ce22a92a99f4b4cbebf40a3b7cc76498d17
-
SHA512
1a4cfaa4b64936e5beb566de8fd31f79ce5a5b0c64a3ae907002b474d3019509ad412484e0e8ac006ce3ae71e75412ac5e54ffd38728c1d3c5ce0c50667333d7
-
SSDEEP
768:6pKtC0BFqpiyjgGjjR+OD2J/33jMgnIgc6jBc0AxQvzJeKT0M2S/5:6pKtpXyjJIODIv3jcgxjBxAyLJeKT0q
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3984 msedge.exe 3984 msedge.exe 4420 msedge.exe 4420 msedge.exe 1240 identity_helper.exe 1240 identity_helper.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4420 wrote to memory of 3280 4420 msedge.exe 82 PID 4420 wrote to memory of 3280 4420 msedge.exe 82 PID 4420 wrote to memory of 4112 4420 msedge.exe 83 PID 4420 wrote to memory of 4112 4420 msedge.exe 83 PID 4420 wrote to memory of 4112 4420 msedge.exe 83 PID 4420 wrote to memory of 4112 4420 msedge.exe 83 PID 4420 wrote to memory of 4112 4420 msedge.exe 83 PID 4420 wrote to memory of 4112 4420 msedge.exe 83 PID 4420 wrote to memory of 4112 4420 msedge.exe 83 PID 4420 wrote to memory of 4112 4420 msedge.exe 83 PID 4420 wrote to memory of 4112 4420 msedge.exe 83 PID 4420 wrote to memory of 4112 4420 msedge.exe 83 PID 4420 wrote to memory of 4112 4420 msedge.exe 83 PID 4420 wrote to memory of 4112 4420 msedge.exe 83 PID 4420 wrote to memory of 4112 4420 msedge.exe 83 PID 4420 wrote to memory of 4112 4420 msedge.exe 83 PID 4420 wrote to memory of 4112 4420 msedge.exe 83 PID 4420 wrote to memory of 4112 4420 msedge.exe 83 PID 4420 wrote to memory of 4112 4420 msedge.exe 83 PID 4420 wrote to memory of 4112 4420 msedge.exe 83 PID 4420 wrote to memory of 4112 4420 msedge.exe 83 PID 4420 wrote to memory of 4112 4420 msedge.exe 83 PID 4420 wrote to memory of 4112 4420 msedge.exe 83 PID 4420 wrote to memory of 4112 4420 msedge.exe 83 PID 4420 wrote to memory of 4112 4420 msedge.exe 83 PID 4420 wrote to memory of 4112 4420 msedge.exe 83 PID 4420 wrote to memory of 4112 4420 msedge.exe 83 PID 4420 wrote to memory of 4112 4420 msedge.exe 83 PID 4420 wrote to memory of 4112 4420 msedge.exe 83 PID 4420 wrote to memory of 4112 4420 msedge.exe 83 PID 4420 wrote to memory of 4112 4420 msedge.exe 83 PID 4420 wrote to memory of 4112 4420 msedge.exe 83 PID 4420 wrote to memory of 4112 4420 msedge.exe 83 PID 4420 wrote to memory of 4112 4420 msedge.exe 83 PID 4420 wrote to memory of 4112 4420 msedge.exe 83 PID 4420 wrote to memory of 4112 4420 msedge.exe 83 PID 4420 wrote to memory of 4112 4420 msedge.exe 83 PID 4420 wrote to memory of 4112 4420 msedge.exe 83 PID 4420 wrote to memory of 4112 4420 msedge.exe 83 PID 4420 wrote to memory of 4112 4420 msedge.exe 83 PID 4420 wrote to memory of 4112 4420 msedge.exe 83 PID 4420 wrote to memory of 4112 4420 msedge.exe 83 PID 4420 wrote to memory of 3984 4420 msedge.exe 84 PID 4420 wrote to memory of 3984 4420 msedge.exe 84 PID 4420 wrote to memory of 3884 4420 msedge.exe 85 PID 4420 wrote to memory of 3884 4420 msedge.exe 85 PID 4420 wrote to memory of 3884 4420 msedge.exe 85 PID 4420 wrote to memory of 3884 4420 msedge.exe 85 PID 4420 wrote to memory of 3884 4420 msedge.exe 85 PID 4420 wrote to memory of 3884 4420 msedge.exe 85 PID 4420 wrote to memory of 3884 4420 msedge.exe 85 PID 4420 wrote to memory of 3884 4420 msedge.exe 85 PID 4420 wrote to memory of 3884 4420 msedge.exe 85 PID 4420 wrote to memory of 3884 4420 msedge.exe 85 PID 4420 wrote to memory of 3884 4420 msedge.exe 85 PID 4420 wrote to memory of 3884 4420 msedge.exe 85 PID 4420 wrote to memory of 3884 4420 msedge.exe 85 PID 4420 wrote to memory of 3884 4420 msedge.exe 85 PID 4420 wrote to memory of 3884 4420 msedge.exe 85 PID 4420 wrote to memory of 3884 4420 msedge.exe 85 PID 4420 wrote to memory of 3884 4420 msedge.exe 85 PID 4420 wrote to memory of 3884 4420 msedge.exe 85 PID 4420 wrote to memory of 3884 4420 msedge.exe 85 PID 4420 wrote to memory of 3884 4420 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b1fc6d682f73f57cfb39c074ff5eebe1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffea6ed46f8,0x7ffea6ed4708,0x7ffea6ed47182⤵PID:3280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,2681018794333778055,16194340553462593870,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,2681018794333778055,16194340553462593870,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,2681018794333778055,16194340553462593870,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,2681018794333778055,16194340553462593870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,2681018794333778055,16194340553462593870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,2681018794333778055,16194340553462593870,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4364 /prefetch:82⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,2681018794333778055,16194340553462593870,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4364 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,2681018794333778055,16194340553462593870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,2681018794333778055,16194340553462593870,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:2304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,2681018794333778055,16194340553462593870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:12⤵PID:1764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,2681018794333778055,16194340553462593870,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4240 /prefetch:12⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,2681018794333778055,16194340553462593870,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1904 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:964
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:756
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD5b31c3811338c4018f8349d98fd150429
SHA19c3cd8ab956b39392152b1e87da5b618d8ab7c02
SHA2560887325eeace99c9b8c4e667ba34aaba729c4f996b910c381c2937b685201aaa
SHA51276cb47cde5d6939bd2ebcdc272ef4a4daa101f0f0182f79968ca7d72deb6f2835dd1728f9e5dbde9f86a503f01d8f8d2f913a7beab4e9cce85e13170e7ddee5c
-
Filesize
6KB
MD53fa1c9dfc81b3e859e6d34498ef09fb1
SHA15d49a6627a3451236fdf523eb8bbef2272829f10
SHA256dc5b98f4c284497b2545dfc81b37b973a0d61f2faa5cd6d2fc5d58e7401fa077
SHA512e45f84383190fdc851fac1d3e76107d95894c81e99ea09d310dc0d641725c5f2c8ea0094e0519cfeb2362af25e24a69827ade7c18c76799d0b2fbe3578d944b0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD55b690b85adbc34b1d95747e25377a40d
SHA19271ca44d7c973d87d9e95044fe647c6192ab9fa
SHA256883afc93bae7a81f0a8127354914a3463235efe6176bc92ad64e457e6a7e134f
SHA51285de01bba093a6ae862ff899a621154af71dedcfb2dcd3623bcc949d8f3e592be30b4c071055ab38b7d57f08f3191111b82f5bd54cd9caf973cbf49ed203deab