Analysis
-
max time kernel
145s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
16-06-2024 11:05
Static task
static1
Behavioral task
behavioral1
Sample
b32dd14b2e1aa52eba88475d81da8a23_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b32dd14b2e1aa52eba88475d81da8a23_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b32dd14b2e1aa52eba88475d81da8a23_JaffaCakes118.html
-
Size
764B
-
MD5
b32dd14b2e1aa52eba88475d81da8a23
-
SHA1
ed6c99162f37be1609a024f6ca19fec873f1b43c
-
SHA256
80496447c76d9ce75b3550f8934148f3694f54f277e75c4a2c626d0d7cb9ee27
-
SHA512
e942866af62a70529d295264c15cb2c99c7c019b95784a616547f931f7c2c09225056a6d2f11ea5c171e95d99e4676a8c4216b69551d1263677f426813677a19
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1608 msedge.exe 1608 msedge.exe 2608 msedge.exe 2608 msedge.exe 3048 identity_helper.exe 3048 identity_helper.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2608 wrote to memory of 5088 2608 msedge.exe 81 PID 2608 wrote to memory of 5088 2608 msedge.exe 81 PID 2608 wrote to memory of 1620 2608 msedge.exe 82 PID 2608 wrote to memory of 1620 2608 msedge.exe 82 PID 2608 wrote to memory of 1620 2608 msedge.exe 82 PID 2608 wrote to memory of 1620 2608 msedge.exe 82 PID 2608 wrote to memory of 1620 2608 msedge.exe 82 PID 2608 wrote to memory of 1620 2608 msedge.exe 82 PID 2608 wrote to memory of 1620 2608 msedge.exe 82 PID 2608 wrote to memory of 1620 2608 msedge.exe 82 PID 2608 wrote to memory of 1620 2608 msedge.exe 82 PID 2608 wrote to memory of 1620 2608 msedge.exe 82 PID 2608 wrote to memory of 1620 2608 msedge.exe 82 PID 2608 wrote to memory of 1620 2608 msedge.exe 82 PID 2608 wrote to memory of 1620 2608 msedge.exe 82 PID 2608 wrote to memory of 1620 2608 msedge.exe 82 PID 2608 wrote to memory of 1620 2608 msedge.exe 82 PID 2608 wrote to memory of 1620 2608 msedge.exe 82 PID 2608 wrote to memory of 1620 2608 msedge.exe 82 PID 2608 wrote to memory of 1620 2608 msedge.exe 82 PID 2608 wrote to memory of 1620 2608 msedge.exe 82 PID 2608 wrote to memory of 1620 2608 msedge.exe 82 PID 2608 wrote to memory of 1620 2608 msedge.exe 82 PID 2608 wrote to memory of 1620 2608 msedge.exe 82 PID 2608 wrote to memory of 1620 2608 msedge.exe 82 PID 2608 wrote to memory of 1620 2608 msedge.exe 82 PID 2608 wrote to memory of 1620 2608 msedge.exe 82 PID 2608 wrote to memory of 1620 2608 msedge.exe 82 PID 2608 wrote to memory of 1620 2608 msedge.exe 82 PID 2608 wrote to memory of 1620 2608 msedge.exe 82 PID 2608 wrote to memory of 1620 2608 msedge.exe 82 PID 2608 wrote to memory of 1620 2608 msedge.exe 82 PID 2608 wrote to memory of 1620 2608 msedge.exe 82 PID 2608 wrote to memory of 1620 2608 msedge.exe 82 PID 2608 wrote to memory of 1620 2608 msedge.exe 82 PID 2608 wrote to memory of 1620 2608 msedge.exe 82 PID 2608 wrote to memory of 1620 2608 msedge.exe 82 PID 2608 wrote to memory of 1620 2608 msedge.exe 82 PID 2608 wrote to memory of 1620 2608 msedge.exe 82 PID 2608 wrote to memory of 1620 2608 msedge.exe 82 PID 2608 wrote to memory of 1620 2608 msedge.exe 82 PID 2608 wrote to memory of 1620 2608 msedge.exe 82 PID 2608 wrote to memory of 1608 2608 msedge.exe 83 PID 2608 wrote to memory of 1608 2608 msedge.exe 83 PID 2608 wrote to memory of 3456 2608 msedge.exe 84 PID 2608 wrote to memory of 3456 2608 msedge.exe 84 PID 2608 wrote to memory of 3456 2608 msedge.exe 84 PID 2608 wrote to memory of 3456 2608 msedge.exe 84 PID 2608 wrote to memory of 3456 2608 msedge.exe 84 PID 2608 wrote to memory of 3456 2608 msedge.exe 84 PID 2608 wrote to memory of 3456 2608 msedge.exe 84 PID 2608 wrote to memory of 3456 2608 msedge.exe 84 PID 2608 wrote to memory of 3456 2608 msedge.exe 84 PID 2608 wrote to memory of 3456 2608 msedge.exe 84 PID 2608 wrote to memory of 3456 2608 msedge.exe 84 PID 2608 wrote to memory of 3456 2608 msedge.exe 84 PID 2608 wrote to memory of 3456 2608 msedge.exe 84 PID 2608 wrote to memory of 3456 2608 msedge.exe 84 PID 2608 wrote to memory of 3456 2608 msedge.exe 84 PID 2608 wrote to memory of 3456 2608 msedge.exe 84 PID 2608 wrote to memory of 3456 2608 msedge.exe 84 PID 2608 wrote to memory of 3456 2608 msedge.exe 84 PID 2608 wrote to memory of 3456 2608 msedge.exe 84 PID 2608 wrote to memory of 3456 2608 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b32dd14b2e1aa52eba88475d81da8a23_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffefebc46f8,0x7ffefebc4708,0x7ffefebc47182⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,11061237829269172091,8350111465003474840,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:1620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,11061237829269172091,8350111465003474840,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,11061237829269172091,8350111465003474840,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2644 /prefetch:82⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,11061237829269172091,8350111465003474840,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,11061237829269172091,8350111465003474840,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,11061237829269172091,8350111465003474840,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4252 /prefetch:12⤵PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,11061237829269172091,8350111465003474840,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,11061237829269172091,8350111465003474840,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,11061237829269172091,8350111465003474840,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3652 /prefetch:82⤵PID:2680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,11061237829269172091,8350111465003474840,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3652 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,11061237829269172091,8350111465003474840,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,11061237829269172091,8350111465003474840,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,11061237829269172091,8350111465003474840,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,11061237829269172091,8350111465003474840,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,11061237829269172091,8350111465003474840,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1732 /prefetch:12⤵PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,11061237829269172091,8350111465003474840,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,11061237829269172091,8350111465003474840,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1832 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2676
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3280
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD581e892ca5c5683efdf9135fe0f2adb15
SHA139159b30226d98a465ece1da28dc87088b20ecad
SHA256830f394548cff6eed3608476190a7ee7d65fe651adc638c5b27ce58639a91e17
SHA512c943f4cfe8615ac159cfac13c10b67e6c0c9093851dd3ac6dda3b82e195d3554e3c37962010a2d0ae5074828d376402624f0dda5499c9997e962e4cfd26444c0
-
Filesize
152B
MD556067634f68231081c4bd5bdbfcc202f
SHA15582776da6ffc75bb0973840fc3d15598bc09eb1
SHA2568c08b0cbceb301c8f960aa674c6e7f6dbf40b4a1c2684e6fb0456ec5ff0e56b4
SHA512c4657393e0b9ec682570d7e251644a858d33e056ccd0f3eebffd0fde25244b3a699b8d9244bcdac00d6f74b49833629b270e099c2b557f729a9066922583f784
-
Filesize
6KB
MD50ce06383641cf8c2f1a904752ea901cc
SHA1d929b4f320627ff8ad13b6179e761edcb66789fe
SHA256656f1703475f1017ee84067c52aecd667d7a720164f9804c68de10bf44ef57e7
SHA51236c4ec2fa0d48c9ea0a57a814f914d0a91dcdbd1881706ab410798004115d3414bc5e833f3d600a825cab9d185ab5eb5dafcb0449c63bf195b7cea390b8a1b88
-
Filesize
6KB
MD51bbbae95cb7e74dbee4a90a6f7499490
SHA1e4b424aae528d1da094ce48db5454052aa387d77
SHA256f07c92dc88b2781948594130c05ccb6cf9041617e24ee371236017c7fdb0ff3b
SHA512277968d8e8111eceb17dd74dd4ad1900b4abdeeab5269652312d489ba714180d3b6748aaaec7d4b9be8e5930d63363ee31fa4bba7683da922ddeb70132c335bb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d7e3e2fd1aa2f89c8640ad56edbc4508
SHA11451bb4e8e25b96e683f536f0382cea178bb89cb
SHA2561a9450e497c784c3a8f29f5e4a587c4ef45c9fef1636bc2b9532d050c1682d4e
SHA512f80ee49c6a972bd5d12ea8fa6335b2cd91ec711782a654719ac4f55428389af7d5f9d06c075181833df616fe3a1179826f1c50a2e4ed017e17ddf12eafa0c8f7