Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
16/06/2024, 05:59
Static task
static1
Behavioral task
behavioral1
Sample
b206865e7fad05981bc74308693dfb20_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
b206865e7fad05981bc74308693dfb20_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b206865e7fad05981bc74308693dfb20_JaffaCakes118.html
-
Size
10KB
-
MD5
b206865e7fad05981bc74308693dfb20
-
SHA1
3ac8ca2a6cccc82e54463d45177405b64e43db63
-
SHA256
428949bcae74c4bfc5ac572635c7f39adec04bfc579e38bec73072e736df317b
-
SHA512
1494913d7f8409ccf6cf0a657879c6dc6d72ddc18d5b176cf515d75c6b1a946102e7731f758e3270e29a36f5839a9db5a8d25320f0d555a4d016c76d06b0f12e
-
SSDEEP
192:UbGy1ZuFq3XhyNu5En4kQ1Vsl0F0Hqjlk3HukFIDHsz2gsXgG:UbdZu8XhumI/eVsGOHqjaekaAziJ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1632 msedge.exe 1632 msedge.exe 3692 msedge.exe 3692 msedge.exe 4328 identity_helper.exe 4328 identity_helper.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3692 wrote to memory of 5036 3692 msedge.exe 81 PID 3692 wrote to memory of 5036 3692 msedge.exe 81 PID 3692 wrote to memory of 1392 3692 msedge.exe 82 PID 3692 wrote to memory of 1392 3692 msedge.exe 82 PID 3692 wrote to memory of 1392 3692 msedge.exe 82 PID 3692 wrote to memory of 1392 3692 msedge.exe 82 PID 3692 wrote to memory of 1392 3692 msedge.exe 82 PID 3692 wrote to memory of 1392 3692 msedge.exe 82 PID 3692 wrote to memory of 1392 3692 msedge.exe 82 PID 3692 wrote to memory of 1392 3692 msedge.exe 82 PID 3692 wrote to memory of 1392 3692 msedge.exe 82 PID 3692 wrote to memory of 1392 3692 msedge.exe 82 PID 3692 wrote to memory of 1392 3692 msedge.exe 82 PID 3692 wrote to memory of 1392 3692 msedge.exe 82 PID 3692 wrote to memory of 1392 3692 msedge.exe 82 PID 3692 wrote to memory of 1392 3692 msedge.exe 82 PID 3692 wrote to memory of 1392 3692 msedge.exe 82 PID 3692 wrote to memory of 1392 3692 msedge.exe 82 PID 3692 wrote to memory of 1392 3692 msedge.exe 82 PID 3692 wrote to memory of 1392 3692 msedge.exe 82 PID 3692 wrote to memory of 1392 3692 msedge.exe 82 PID 3692 wrote to memory of 1392 3692 msedge.exe 82 PID 3692 wrote to memory of 1392 3692 msedge.exe 82 PID 3692 wrote to memory of 1392 3692 msedge.exe 82 PID 3692 wrote to memory of 1392 3692 msedge.exe 82 PID 3692 wrote to memory of 1392 3692 msedge.exe 82 PID 3692 wrote to memory of 1392 3692 msedge.exe 82 PID 3692 wrote to memory of 1392 3692 msedge.exe 82 PID 3692 wrote to memory of 1392 3692 msedge.exe 82 PID 3692 wrote to memory of 1392 3692 msedge.exe 82 PID 3692 wrote to memory of 1392 3692 msedge.exe 82 PID 3692 wrote to memory of 1392 3692 msedge.exe 82 PID 3692 wrote to memory of 1392 3692 msedge.exe 82 PID 3692 wrote to memory of 1392 3692 msedge.exe 82 PID 3692 wrote to memory of 1392 3692 msedge.exe 82 PID 3692 wrote to memory of 1392 3692 msedge.exe 82 PID 3692 wrote to memory of 1392 3692 msedge.exe 82 PID 3692 wrote to memory of 1392 3692 msedge.exe 82 PID 3692 wrote to memory of 1392 3692 msedge.exe 82 PID 3692 wrote to memory of 1392 3692 msedge.exe 82 PID 3692 wrote to memory of 1392 3692 msedge.exe 82 PID 3692 wrote to memory of 1392 3692 msedge.exe 82 PID 3692 wrote to memory of 1632 3692 msedge.exe 83 PID 3692 wrote to memory of 1632 3692 msedge.exe 83 PID 3692 wrote to memory of 1988 3692 msedge.exe 84 PID 3692 wrote to memory of 1988 3692 msedge.exe 84 PID 3692 wrote to memory of 1988 3692 msedge.exe 84 PID 3692 wrote to memory of 1988 3692 msedge.exe 84 PID 3692 wrote to memory of 1988 3692 msedge.exe 84 PID 3692 wrote to memory of 1988 3692 msedge.exe 84 PID 3692 wrote to memory of 1988 3692 msedge.exe 84 PID 3692 wrote to memory of 1988 3692 msedge.exe 84 PID 3692 wrote to memory of 1988 3692 msedge.exe 84 PID 3692 wrote to memory of 1988 3692 msedge.exe 84 PID 3692 wrote to memory of 1988 3692 msedge.exe 84 PID 3692 wrote to memory of 1988 3692 msedge.exe 84 PID 3692 wrote to memory of 1988 3692 msedge.exe 84 PID 3692 wrote to memory of 1988 3692 msedge.exe 84 PID 3692 wrote to memory of 1988 3692 msedge.exe 84 PID 3692 wrote to memory of 1988 3692 msedge.exe 84 PID 3692 wrote to memory of 1988 3692 msedge.exe 84 PID 3692 wrote to memory of 1988 3692 msedge.exe 84 PID 3692 wrote to memory of 1988 3692 msedge.exe 84 PID 3692 wrote to memory of 1988 3692 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b206865e7fad05981bc74308693dfb20_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xd8,0x110,0x7ffbf15a46f8,0x7ffbf15a4708,0x7ffbf15a47182⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,3526639615766822455,9260993441930831374,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:1392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2180,3526639615766822455,9260993441930831374,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2180,3526639615766822455,9260993441930831374,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,3526639615766822455,9260993441930831374,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,3526639615766822455,9260993441930831374,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,3526639615766822455,9260993441930831374,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,3526639615766822455,9260993441930831374,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:12⤵PID:2520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,3526639615766822455,9260993441930831374,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5440 /prefetch:82⤵PID:2816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,3526639615766822455,9260993441930831374,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5440 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,3526639615766822455,9260993441930831374,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,3526639615766822455,9260993441930831374,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:12⤵PID:760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,3526639615766822455,9260993441930831374,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,3526639615766822455,9260993441930831374,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,3526639615766822455,9260993441930831374,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4104
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:60
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dabfafd78687947a9de64dd5b776d25f
SHA116084c74980dbad713f9d332091985808b436dea
SHA256c7658f407cbe799282ef202e78319e489ed4e48e23f6d056b505bc0d73e34201
SHA512dae1de5245cd9b72117c430250aa2029eb8df1b85dc414ac50152d8eba4d100bcf0320ac18446f865dc96949f8b06a5b9e7a0c84f9c1b0eada318e80f99f9d2b
-
Filesize
152B
MD5c39b3aa574c0c938c80eb263bb450311
SHA1f4d11275b63f4f906be7a55ec6ca050c62c18c88
SHA25666f8d413a30451055d4b6fa40e007197a4bb93a66a28ca4112967ec417ffab6c
SHA512eeca2e21cd4d66835beb9812e26344c8695584253af397b06f378536ca797c3906a670ed239631729c96ebb93acfb16327cf58d517e83fb8923881c5fdb6d232
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
308B
MD588e003a1ada7bbeef357fb02d2baa50d
SHA19fcc08413a4a0a65cb5ee2bfa4acb04981ad04f8
SHA256762e9374ed46f031a87b848cbe9e85e18277381bfbbb82e5b3dd75b587903a26
SHA512615017db2b3ae466e56a222ae19cbcfb2e4664fa6eec9b9a2cc1d524ee511173684e2d23c789e1c5a0ebc66fda1032088139988cff3bb22c7a5286cdaa26487d
-
Filesize
6KB
MD50694a4b9b7c6bc83b42082d9607d0c7a
SHA131e99226252711630ec70e4d0dabf3df1bd93523
SHA2564708b9abc7d5587a609cc3bcedaabc36aed3b9572d1772be852283dbb58f3ac4
SHA5129f79a4713a37982ff830a17807ee18a57789dc10897bf38c54ee13433f5c5530eb7b9170041f3544269a6f76ec813d509dbbd1aca8d3996908a0dcb782b2cb07
-
Filesize
6KB
MD5e0882f08b5025f4dba9841d9af0d8d47
SHA12eddceb8378d29c764e8bd5eff7640504ebdf862
SHA25690f7d1cbdcd595685ed858a557745de6cbc2549fde5920b98d0fad8cb811bdd7
SHA512675b9c727327956bf453e038f6b4b3bb0b5a67a949ea487f80cd09de873e01ec7bcd94585a397f2b04a481a63101b48228064cf4832ffd611c6b7ce0189ea889
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a9430b9c1d37d6bd0c47462275f3fd8d
SHA19bb60e673afa05e7fba6ae07e0e5ab084f4675ad
SHA256be9fef06bc6550eedef85af787550093380c9a70ce8169c50149aaa5f99d101d
SHA512de6460cfd21357e35cbcb2dcd015f1bbc721931287907501ab13dd4eaca395aab929409b7b5fbfa1af395772d2f5b44e2574efcf7b338f37703d7b7c8f9ca0fd