Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
16/06/2024, 07:36
Static task
static1
Behavioral task
behavioral1
Sample
b26029f30b429affbe47a0ab44b1c97c_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b26029f30b429affbe47a0ab44b1c97c_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b26029f30b429affbe47a0ab44b1c97c_JaffaCakes118.html
-
Size
20KB
-
MD5
b26029f30b429affbe47a0ab44b1c97c
-
SHA1
83900ef16d72131c66927b083bc4704a640ec11f
-
SHA256
3bdd7b827eb4f6fdeeec00a518b5aad7c1e62cd07e02e9f5ec523cc7dc22789b
-
SHA512
a9b79e9d1113f9b33e4860aa49f4a64ffc134793d63509b2e4c6cc8cc869c604e58ddd07d5ce94a9a1489187fbb35b375efe55b973d83d914665aa0f59d25b53
-
SSDEEP
384:i4VY7B6sJJ3p0fOYtUIYZIzgbu1UqjqXG7D2YCAYnJ0URn0lUx:zsJJ3p0fOYtFrb7D2PNJ0URn0lUx
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4716 msedge.exe 4716 msedge.exe 2820 msedge.exe 2820 msedge.exe 3684 identity_helper.exe 3684 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2820 wrote to memory of 184 2820 msedge.exe 83 PID 2820 wrote to memory of 184 2820 msedge.exe 83 PID 2820 wrote to memory of 976 2820 msedge.exe 84 PID 2820 wrote to memory of 976 2820 msedge.exe 84 PID 2820 wrote to memory of 976 2820 msedge.exe 84 PID 2820 wrote to memory of 976 2820 msedge.exe 84 PID 2820 wrote to memory of 976 2820 msedge.exe 84 PID 2820 wrote to memory of 976 2820 msedge.exe 84 PID 2820 wrote to memory of 976 2820 msedge.exe 84 PID 2820 wrote to memory of 976 2820 msedge.exe 84 PID 2820 wrote to memory of 976 2820 msedge.exe 84 PID 2820 wrote to memory of 976 2820 msedge.exe 84 PID 2820 wrote to memory of 976 2820 msedge.exe 84 PID 2820 wrote to memory of 976 2820 msedge.exe 84 PID 2820 wrote to memory of 976 2820 msedge.exe 84 PID 2820 wrote to memory of 976 2820 msedge.exe 84 PID 2820 wrote to memory of 976 2820 msedge.exe 84 PID 2820 wrote to memory of 976 2820 msedge.exe 84 PID 2820 wrote to memory of 976 2820 msedge.exe 84 PID 2820 wrote to memory of 976 2820 msedge.exe 84 PID 2820 wrote to memory of 976 2820 msedge.exe 84 PID 2820 wrote to memory of 976 2820 msedge.exe 84 PID 2820 wrote to memory of 976 2820 msedge.exe 84 PID 2820 wrote to memory of 976 2820 msedge.exe 84 PID 2820 wrote to memory of 976 2820 msedge.exe 84 PID 2820 wrote to memory of 976 2820 msedge.exe 84 PID 2820 wrote to memory of 976 2820 msedge.exe 84 PID 2820 wrote to memory of 976 2820 msedge.exe 84 PID 2820 wrote to memory of 976 2820 msedge.exe 84 PID 2820 wrote to memory of 976 2820 msedge.exe 84 PID 2820 wrote to memory of 976 2820 msedge.exe 84 PID 2820 wrote to memory of 976 2820 msedge.exe 84 PID 2820 wrote to memory of 976 2820 msedge.exe 84 PID 2820 wrote to memory of 976 2820 msedge.exe 84 PID 2820 wrote to memory of 976 2820 msedge.exe 84 PID 2820 wrote to memory of 976 2820 msedge.exe 84 PID 2820 wrote to memory of 976 2820 msedge.exe 84 PID 2820 wrote to memory of 976 2820 msedge.exe 84 PID 2820 wrote to memory of 976 2820 msedge.exe 84 PID 2820 wrote to memory of 976 2820 msedge.exe 84 PID 2820 wrote to memory of 976 2820 msedge.exe 84 PID 2820 wrote to memory of 976 2820 msedge.exe 84 PID 2820 wrote to memory of 4716 2820 msedge.exe 85 PID 2820 wrote to memory of 4716 2820 msedge.exe 85 PID 2820 wrote to memory of 1564 2820 msedge.exe 86 PID 2820 wrote to memory of 1564 2820 msedge.exe 86 PID 2820 wrote to memory of 1564 2820 msedge.exe 86 PID 2820 wrote to memory of 1564 2820 msedge.exe 86 PID 2820 wrote to memory of 1564 2820 msedge.exe 86 PID 2820 wrote to memory of 1564 2820 msedge.exe 86 PID 2820 wrote to memory of 1564 2820 msedge.exe 86 PID 2820 wrote to memory of 1564 2820 msedge.exe 86 PID 2820 wrote to memory of 1564 2820 msedge.exe 86 PID 2820 wrote to memory of 1564 2820 msedge.exe 86 PID 2820 wrote to memory of 1564 2820 msedge.exe 86 PID 2820 wrote to memory of 1564 2820 msedge.exe 86 PID 2820 wrote to memory of 1564 2820 msedge.exe 86 PID 2820 wrote to memory of 1564 2820 msedge.exe 86 PID 2820 wrote to memory of 1564 2820 msedge.exe 86 PID 2820 wrote to memory of 1564 2820 msedge.exe 86 PID 2820 wrote to memory of 1564 2820 msedge.exe 86 PID 2820 wrote to memory of 1564 2820 msedge.exe 86 PID 2820 wrote to memory of 1564 2820 msedge.exe 86 PID 2820 wrote to memory of 1564 2820 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b26029f30b429affbe47a0ab44b1c97c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff8c9246f8,0x7fff8c924708,0x7fff8c9247182⤵PID:184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,16715567732914624140,17847633984186822788,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,16715567732914624140,17847633984186822788,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,16715567732914624140,17847633984186822788,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,16715567732914624140,17847633984186822788,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,16715567732914624140,17847633984186822788,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,16715567732914624140,17847633984186822788,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6056 /prefetch:82⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,16715567732914624140,17847633984186822788,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6056 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,16715567732914624140,17847633984186822788,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,16715567732914624140,17847633984186822788,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:12⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,16715567732914624140,17847633984186822788,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,16715567732914624140,17847633984186822788,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,16715567732914624140,17847633984186822788,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3764 /prefetch:12⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,16715567732914624140,17847633984186822788,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3088 /prefetch:12⤵PID:2204
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4776
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c5abc082d9d9307e797b7e89a2f755f4
SHA154c442690a8727f1d3453b6452198d3ec4ec13df
SHA256a055d69c6aba59e97e632d118b7960a5fdfbe35cfdfaa0de14f194fc6f874716
SHA512ad765cddbf89472988de5356db5e0ee254ca3475491c6034fba1897c373702ab7cfa4bd21662ab862eebb48a757c3eb86b1f8ed58629751f71863822a59cd26c
-
Filesize
152B
MD5b4a74bc775caf3de7fc9cde3c30ce482
SHA1c6ed3161390e5493f71182a6cb98d51c9063775d
SHA256dfad4e020a946f85523604816a0a9781091ee4669c870db2cabab027f8b6f280
SHA51255578e254444a645f455ea38480c9e02599ebf9522c32aca50ff37aad33976db30e663d35ebe31ff0ecafb4007362261716f756b3a0d67ac3937ca62ff10e25f
-
Filesize
6KB
MD56de8e0835c94e3bf30fd6efb738b3373
SHA1f25130d1aecdf5224f1aa9d754ecb70866082f8d
SHA256e96c0b038b4fe0053670db44dcb4140f3270279f0dcc3de926ea635a57c24e93
SHA512ec09122dd5ef3d910f7dbf4d3b1492683b5451a9d47b7b9979c2a7f16738d832b3a348cdd76d3a3c445074a62e7dc38a008d417dd29c57894059c89de903055a
-
Filesize
6KB
MD58e42b64852cef6137d046cf06f8ca09f
SHA1c891b3f52d3b9ee1e38e0b77d0d23283e8d16244
SHA25668f39dd489f2341664e7f490b63d7c66fa9c1548f76b6a786f50d214805310da
SHA5126873e5bea53bdf5b55a2fde7c9d2902d9761232389f86080a243a6ae8266e0f1d4b911b12a16e75005ea15db989ca747797c824dbdbb674760f290ec8fdcb5de
-
Filesize
6KB
MD5e7a22cb9c5f4f3570ba36fb238cb7d8b
SHA11864832a8bcbdaff6d27da63793cf81823440b46
SHA256fa15260ee16ee868ea3c5ed918136db4c9b7fa404ad2464a8ea4f39da84d4b52
SHA51230b3dc1202795962707c579578c283c652004454664c26efac592e51e1ffc45f55321dc033d19ce8fff85a4a45497d048c3db21fa1a3c14096a7ea9df83b835a
-
Filesize
6KB
MD55e33a9a19d408a5ad14f32e3eb4b45e4
SHA1dea9f3600d0b69823c4834617c54c3296883c642
SHA25674e5c179f98fe6d9fa82897059558827706ea88b704487b3fe97af0824d7eb7c
SHA512fdb5cbf8c048cfc22f4c0486fae65ac87e6947ad511293f77299860935926a6153038183facf1f4b363be4d09e8d62d415ca44a2104ba2a2d156f91cf611b052
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
12KB
MD5b941fb6595ee0c2a6d891ede5c13a3b3
SHA1a7da5f410b5e952cc58ff0dd2558bd1643985c0c
SHA2560ddf0c3ee9d5afb694c0d61d661b07a0852dbb63435b6edb99b1156572b7e822
SHA512b076c5647a8f569d95b30612020a07420195acf05aff8e5e482aa6171703ae8b949d0de5073a0d73d40931ea192174805c7412c0e6ed2da23bbd86d0bb209419
-
Filesize
11KB
MD53a0f17787a89752913d4a8824f6d662f
SHA1f22222f50c9b785d42ae5669f3bc2d61fa280b8f
SHA256d9e90088a85487859851ec297cdde2c5ed246afc620a55b5bfbdf8c664388432
SHA5124cad5b47a0900358e41d113300da3b982857adbc160d8d9d562504f3f861f448487dbbab23eecd6314015c6a90544cac1f086cb4dcb145aa826fba0aa4607e4b