Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
16-06-2024 16:05
Static task
static1
Behavioral task
behavioral1
Sample
b4611f66cbe2b2c40cbeea7eefbadffd_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b4611f66cbe2b2c40cbeea7eefbadffd_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b4611f66cbe2b2c40cbeea7eefbadffd_JaffaCakes118.html
-
Size
27KB
-
MD5
b4611f66cbe2b2c40cbeea7eefbadffd
-
SHA1
c4efb2a9e1357e0118ea2675ec15b145f74b0772
-
SHA256
ba9e5c2651ac318302f6a46c33b8e9b05e380055a6cb9cb937a174acdaac39ba
-
SHA512
7410edcde4be3f5ca80fbafdce0996a1f2e3cadd777d348aa690b2f194badbec832fafb7b46536d65152dd3feb290133ac1e488304acc2deda7453ef4d3bfcc2
-
SSDEEP
192:uwjMb5nCmnQjxn5Q/VnQiewNnOnQOkEntTXnQTbn5nQ9eOsm6ud0mQl7MBQqnYnd:HQ/qDU80xS6tl
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1500 msedge.exe 1500 msedge.exe 4260 msedge.exe 4260 msedge.exe 4004 identity_helper.exe 4004 identity_helper.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4260 wrote to memory of 4624 4260 msedge.exe 82 PID 4260 wrote to memory of 4624 4260 msedge.exe 82 PID 4260 wrote to memory of 3572 4260 msedge.exe 83 PID 4260 wrote to memory of 3572 4260 msedge.exe 83 PID 4260 wrote to memory of 3572 4260 msedge.exe 83 PID 4260 wrote to memory of 3572 4260 msedge.exe 83 PID 4260 wrote to memory of 3572 4260 msedge.exe 83 PID 4260 wrote to memory of 3572 4260 msedge.exe 83 PID 4260 wrote to memory of 3572 4260 msedge.exe 83 PID 4260 wrote to memory of 3572 4260 msedge.exe 83 PID 4260 wrote to memory of 3572 4260 msedge.exe 83 PID 4260 wrote to memory of 3572 4260 msedge.exe 83 PID 4260 wrote to memory of 3572 4260 msedge.exe 83 PID 4260 wrote to memory of 3572 4260 msedge.exe 83 PID 4260 wrote to memory of 3572 4260 msedge.exe 83 PID 4260 wrote to memory of 3572 4260 msedge.exe 83 PID 4260 wrote to memory of 3572 4260 msedge.exe 83 PID 4260 wrote to memory of 3572 4260 msedge.exe 83 PID 4260 wrote to memory of 3572 4260 msedge.exe 83 PID 4260 wrote to memory of 3572 4260 msedge.exe 83 PID 4260 wrote to memory of 3572 4260 msedge.exe 83 PID 4260 wrote to memory of 3572 4260 msedge.exe 83 PID 4260 wrote to memory of 3572 4260 msedge.exe 83 PID 4260 wrote to memory of 3572 4260 msedge.exe 83 PID 4260 wrote to memory of 3572 4260 msedge.exe 83 PID 4260 wrote to memory of 3572 4260 msedge.exe 83 PID 4260 wrote to memory of 3572 4260 msedge.exe 83 PID 4260 wrote to memory of 3572 4260 msedge.exe 83 PID 4260 wrote to memory of 3572 4260 msedge.exe 83 PID 4260 wrote to memory of 3572 4260 msedge.exe 83 PID 4260 wrote to memory of 3572 4260 msedge.exe 83 PID 4260 wrote to memory of 3572 4260 msedge.exe 83 PID 4260 wrote to memory of 3572 4260 msedge.exe 83 PID 4260 wrote to memory of 3572 4260 msedge.exe 83 PID 4260 wrote to memory of 3572 4260 msedge.exe 83 PID 4260 wrote to memory of 3572 4260 msedge.exe 83 PID 4260 wrote to memory of 3572 4260 msedge.exe 83 PID 4260 wrote to memory of 3572 4260 msedge.exe 83 PID 4260 wrote to memory of 3572 4260 msedge.exe 83 PID 4260 wrote to memory of 3572 4260 msedge.exe 83 PID 4260 wrote to memory of 3572 4260 msedge.exe 83 PID 4260 wrote to memory of 3572 4260 msedge.exe 83 PID 4260 wrote to memory of 1500 4260 msedge.exe 84 PID 4260 wrote to memory of 1500 4260 msedge.exe 84 PID 4260 wrote to memory of 3200 4260 msedge.exe 85 PID 4260 wrote to memory of 3200 4260 msedge.exe 85 PID 4260 wrote to memory of 3200 4260 msedge.exe 85 PID 4260 wrote to memory of 3200 4260 msedge.exe 85 PID 4260 wrote to memory of 3200 4260 msedge.exe 85 PID 4260 wrote to memory of 3200 4260 msedge.exe 85 PID 4260 wrote to memory of 3200 4260 msedge.exe 85 PID 4260 wrote to memory of 3200 4260 msedge.exe 85 PID 4260 wrote to memory of 3200 4260 msedge.exe 85 PID 4260 wrote to memory of 3200 4260 msedge.exe 85 PID 4260 wrote to memory of 3200 4260 msedge.exe 85 PID 4260 wrote to memory of 3200 4260 msedge.exe 85 PID 4260 wrote to memory of 3200 4260 msedge.exe 85 PID 4260 wrote to memory of 3200 4260 msedge.exe 85 PID 4260 wrote to memory of 3200 4260 msedge.exe 85 PID 4260 wrote to memory of 3200 4260 msedge.exe 85 PID 4260 wrote to memory of 3200 4260 msedge.exe 85 PID 4260 wrote to memory of 3200 4260 msedge.exe 85 PID 4260 wrote to memory of 3200 4260 msedge.exe 85 PID 4260 wrote to memory of 3200 4260 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b4611f66cbe2b2c40cbeea7eefbadffd_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa025546f8,0x7ffa02554708,0x7ffa025547182⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,14978111002988134673,4091128554265390431,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1984 /prefetch:22⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,14978111002988134673,4091128554265390431,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,14978111002988134673,4091128554265390431,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,14978111002988134673,4091128554265390431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,14978111002988134673,4091128554265390431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,14978111002988134673,4091128554265390431,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6100 /prefetch:82⤵PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,14978111002988134673,4091128554265390431,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6100 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,14978111002988134673,4091128554265390431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,14978111002988134673,4091128554265390431,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:12⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,14978111002988134673,4091128554265390431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5736 /prefetch:12⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,14978111002988134673,4091128554265390431,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5892 /prefetch:12⤵PID:1264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,14978111002988134673,4091128554265390431,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4712 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3560
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4000
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:944
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c5abc082d9d9307e797b7e89a2f755f4
SHA154c442690a8727f1d3453b6452198d3ec4ec13df
SHA256a055d69c6aba59e97e632d118b7960a5fdfbe35cfdfaa0de14f194fc6f874716
SHA512ad765cddbf89472988de5356db5e0ee254ca3475491c6034fba1897c373702ab7cfa4bd21662ab862eebb48a757c3eb86b1f8ed58629751f71863822a59cd26c
-
Filesize
152B
MD5b4a74bc775caf3de7fc9cde3c30ce482
SHA1c6ed3161390e5493f71182a6cb98d51c9063775d
SHA256dfad4e020a946f85523604816a0a9781091ee4669c870db2cabab027f8b6f280
SHA51255578e254444a645f455ea38480c9e02599ebf9522c32aca50ff37aad33976db30e663d35ebe31ff0ecafb4007362261716f756b3a0d67ac3937ca62ff10e25f
-
Filesize
6KB
MD5fd6c8181378fa369fc81f639fcf507bc
SHA14378261035ab4c47846f10fe4eac18cfd71845ff
SHA256774698d3e28c3234718dc6027126129fd34a223e326fe2653360f0c601a4f45c
SHA512f4d6e59090509ab9848cb7297e6dab3b1f4395c32fb2eac0bbba386d9192a159a97de474620e6b3367d18c58f1b69137233c35b59793b106f3f59c104fb29715
-
Filesize
6KB
MD5a33fe70aec9f049f8275d1786cbcd75d
SHA1a8b3141d27bebefde9f9ad466c14f85c7801ebbf
SHA256941cbaf594f3aea86b63a1863c2ef6f19729eb78e672549e3902313b9beb2609
SHA5125c9c3e6e2dc57cfd43e39abc923e29e5d95a79c017355ecf7aca518c5c1df26b023c585b8360aa50a6baa00f397b59e3a0e0be4a2dd91dcf97d1b121986630d1
-
Filesize
6KB
MD5000c1a5c0e75b6c4a74e439c7df5258a
SHA1083a61d3017f08ebae7c6c144c2b7637d9de8cec
SHA256a986c68168b9e588adb6753713a80410140909b1e219362a65c1adb5463394f6
SHA51249201f86091fafcf7f992d10168db6ce49bd366edb28b09354f58c58f19dcb47fa6fac051ea6aade104fadcdcc4ccfbf80ddd808dd1c16c63f9da3e224976f35
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5f76fd2b40fb4b23748d2fe901bbb77c9
SHA145a87e976c757a1358b500b7e38e53e47766a099
SHA256fa1c5dbe2644c38262618b7802ecf5a107cdc92d33f75a17641d9998856f75fd
SHA512f888a98044969bbaff4ee8545d91189de98d21ff216f23b5d51a9a4d84a655cf17319ed21f2cce6ffb10bb531978d567031adc1e77a66398cb39932b2716d92e