Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
16-06-2024 06:11
Static task
static1
Behavioral task
behavioral1
Sample
b211ab1252779c1110bb8c2807d17922_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b211ab1252779c1110bb8c2807d17922_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b211ab1252779c1110bb8c2807d17922_JaffaCakes118.html
-
Size
87KB
-
MD5
b211ab1252779c1110bb8c2807d17922
-
SHA1
7ce058afed11edc673ccf22a4866b72166f136a0
-
SHA256
cb73061f5b36ed9125d17fdcba35e4a89057c26789d5c421961215f95f899107
-
SHA512
4167efe148c9d23794fce3d018c7c67c0ba069b5637bbf14a8390a5ea34dedab587f570e052e362288409d8cc201c11a79b5fed28f3626c09e76fccdc296c263
-
SSDEEP
1536:yvGIJV6gtrEtaxtFZo793CauKThjWzymrAamvLf7WCYOLM2rqzf5+lwyb+3vXTM3:IV6gtrEaxBauuhjWWmr3mvLf7WC9LM2r
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3508 msedge.exe 3508 msedge.exe 4728 msedge.exe 4728 msedge.exe 4016 identity_helper.exe 4016 identity_helper.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4728 wrote to memory of 3376 4728 msedge.exe 82 PID 4728 wrote to memory of 3376 4728 msedge.exe 82 PID 4728 wrote to memory of 4852 4728 msedge.exe 83 PID 4728 wrote to memory of 4852 4728 msedge.exe 83 PID 4728 wrote to memory of 4852 4728 msedge.exe 83 PID 4728 wrote to memory of 4852 4728 msedge.exe 83 PID 4728 wrote to memory of 4852 4728 msedge.exe 83 PID 4728 wrote to memory of 4852 4728 msedge.exe 83 PID 4728 wrote to memory of 4852 4728 msedge.exe 83 PID 4728 wrote to memory of 4852 4728 msedge.exe 83 PID 4728 wrote to memory of 4852 4728 msedge.exe 83 PID 4728 wrote to memory of 4852 4728 msedge.exe 83 PID 4728 wrote to memory of 4852 4728 msedge.exe 83 PID 4728 wrote to memory of 4852 4728 msedge.exe 83 PID 4728 wrote to memory of 4852 4728 msedge.exe 83 PID 4728 wrote to memory of 4852 4728 msedge.exe 83 PID 4728 wrote to memory of 4852 4728 msedge.exe 83 PID 4728 wrote to memory of 4852 4728 msedge.exe 83 PID 4728 wrote to memory of 4852 4728 msedge.exe 83 PID 4728 wrote to memory of 4852 4728 msedge.exe 83 PID 4728 wrote to memory of 4852 4728 msedge.exe 83 PID 4728 wrote to memory of 4852 4728 msedge.exe 83 PID 4728 wrote to memory of 4852 4728 msedge.exe 83 PID 4728 wrote to memory of 4852 4728 msedge.exe 83 PID 4728 wrote to memory of 4852 4728 msedge.exe 83 PID 4728 wrote to memory of 4852 4728 msedge.exe 83 PID 4728 wrote to memory of 4852 4728 msedge.exe 83 PID 4728 wrote to memory of 4852 4728 msedge.exe 83 PID 4728 wrote to memory of 4852 4728 msedge.exe 83 PID 4728 wrote to memory of 4852 4728 msedge.exe 83 PID 4728 wrote to memory of 4852 4728 msedge.exe 83 PID 4728 wrote to memory of 4852 4728 msedge.exe 83 PID 4728 wrote to memory of 4852 4728 msedge.exe 83 PID 4728 wrote to memory of 4852 4728 msedge.exe 83 PID 4728 wrote to memory of 4852 4728 msedge.exe 83 PID 4728 wrote to memory of 4852 4728 msedge.exe 83 PID 4728 wrote to memory of 4852 4728 msedge.exe 83 PID 4728 wrote to memory of 4852 4728 msedge.exe 83 PID 4728 wrote to memory of 4852 4728 msedge.exe 83 PID 4728 wrote to memory of 4852 4728 msedge.exe 83 PID 4728 wrote to memory of 4852 4728 msedge.exe 83 PID 4728 wrote to memory of 4852 4728 msedge.exe 83 PID 4728 wrote to memory of 3508 4728 msedge.exe 84 PID 4728 wrote to memory of 3508 4728 msedge.exe 84 PID 4728 wrote to memory of 1644 4728 msedge.exe 85 PID 4728 wrote to memory of 1644 4728 msedge.exe 85 PID 4728 wrote to memory of 1644 4728 msedge.exe 85 PID 4728 wrote to memory of 1644 4728 msedge.exe 85 PID 4728 wrote to memory of 1644 4728 msedge.exe 85 PID 4728 wrote to memory of 1644 4728 msedge.exe 85 PID 4728 wrote to memory of 1644 4728 msedge.exe 85 PID 4728 wrote to memory of 1644 4728 msedge.exe 85 PID 4728 wrote to memory of 1644 4728 msedge.exe 85 PID 4728 wrote to memory of 1644 4728 msedge.exe 85 PID 4728 wrote to memory of 1644 4728 msedge.exe 85 PID 4728 wrote to memory of 1644 4728 msedge.exe 85 PID 4728 wrote to memory of 1644 4728 msedge.exe 85 PID 4728 wrote to memory of 1644 4728 msedge.exe 85 PID 4728 wrote to memory of 1644 4728 msedge.exe 85 PID 4728 wrote to memory of 1644 4728 msedge.exe 85 PID 4728 wrote to memory of 1644 4728 msedge.exe 85 PID 4728 wrote to memory of 1644 4728 msedge.exe 85 PID 4728 wrote to memory of 1644 4728 msedge.exe 85 PID 4728 wrote to memory of 1644 4728 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b211ab1252779c1110bb8c2807d17922_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff94a3546f8,0x7ff94a354708,0x7ff94a3547182⤵PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,7719924661335565118,14775096729702861750,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,7719924661335565118,14775096729702861750,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,7719924661335565118,14775096729702861750,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,7719924661335565118,14775096729702861750,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,7719924661335565118,14775096729702861750,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,7719924661335565118,14775096729702861750,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5860 /prefetch:82⤵PID:1304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,7719924661335565118,14775096729702861750,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5860 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,7719924661335565118,14775096729702861750,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,7719924661335565118,14775096729702861750,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,7719924661335565118,14775096729702861750,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3816 /prefetch:12⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,7719924661335565118,14775096729702861750,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:12⤵PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,7719924661335565118,14775096729702861750,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5056 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4956
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5004
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4300
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dabfafd78687947a9de64dd5b776d25f
SHA116084c74980dbad713f9d332091985808b436dea
SHA256c7658f407cbe799282ef202e78319e489ed4e48e23f6d056b505bc0d73e34201
SHA512dae1de5245cd9b72117c430250aa2029eb8df1b85dc414ac50152d8eba4d100bcf0320ac18446f865dc96949f8b06a5b9e7a0c84f9c1b0eada318e80f99f9d2b
-
Filesize
152B
MD5c39b3aa574c0c938c80eb263bb450311
SHA1f4d11275b63f4f906be7a55ec6ca050c62c18c88
SHA25666f8d413a30451055d4b6fa40e007197a4bb93a66a28ca4112967ec417ffab6c
SHA512eeca2e21cd4d66835beb9812e26344c8695584253af397b06f378536ca797c3906a670ed239631729c96ebb93acfb16327cf58d517e83fb8923881c5fdb6d232
-
Filesize
825B
MD5ac670aa28983c6c6be03b3e04c33d99a
SHA1629f457adcf88b15b75fe75ceae5c1e481be2ba5
SHA256088067ac307a56f2fb8471d72e530f658a28ab15366b59c6d2d9705029e52145
SHA5128bf367103ba4c6077dce9a0998f5a74cbafde4a6405e2339e77523a8f2437cf827ee1c36f4dadb7d2b07400cd9ae46aeb4011410b4881a2f19f4ed1dc7cdeb39
-
Filesize
6KB
MD5d86b1f02e3ac6b3566a3749b52fbd78a
SHA1194c2c390c50045d291695d5da62e47164f27366
SHA256e0d54d4d8527f1a9861d9f175b2eb793549f496ac0b0f474572800d13b33da6b
SHA51269488861d72d95dcf491b1b6d7bd56661c82e4562d5a8808d47f0ab0b33fd09c7f012d8b0fd8677047e04b3b6e5f44e1b12387637fd83abd7a347ebc3dd523f0
-
Filesize
6KB
MD5f195320b51ebbd97328e5954bcd50b4a
SHA1038c5e8a91e027009689f619c67823c5b7240b48
SHA256898afb8c239a44edd0de4ed69187c94779c556fc450c7fbf9cd408dcc560b854
SHA512b06ad386e31651d263a80ce1176461984e8bda9ae9030e4eaedcd9e653ebe470b0f9c1b6d6ed85d1bda4c33bdc6aee8409e7c99a7018527f901d4dae637998e6
-
Filesize
6KB
MD59d2bd8e06c19c0c3a640816f4ccad9aa
SHA1a4dc1e4edcba67fe6f6c2ffa0c6215f6981e3929
SHA25637c5796221d6d1d9740792a37a3ae276858f1c8ced2ad07a873cdc7ceebe80b9
SHA512c86a4bbbe02e5f4a733921458458cd428e7a9dd09e140195b7c73dc3f4e40addafae23401a1c41d8fb71aaffb6a63316c5da020f9547ed88d164d4c0ed2fa817
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5efe0f20b588964aae8bcf94c59c5bcee
SHA1b4a19c4c375e14e0712157fe2afeed9858942987
SHA25632ac614be82f3ee03bcb3f6b458439508d6f54d842c113be51a8d2a969230ebf
SHA512a5590491da0fffe3ff969be29f840c958e1d687f13066220384c5afea059e761f1db55cd07c2cf7c0d568446ced9708c4eeffc229ee4737f9f82de8fd2f3d112