Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16/06/2024, 18:35
Static task
static1
Behavioral task
behavioral1
Sample
b49910de8da2f7af928b8c9e472e7d57_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
b49910de8da2f7af928b8c9e472e7d57_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b49910de8da2f7af928b8c9e472e7d57_JaffaCakes118.html
-
Size
69KB
-
MD5
b49910de8da2f7af928b8c9e472e7d57
-
SHA1
2e3fc6388820f7cf72aa90faac17a9c2c3f6bef5
-
SHA256
a9232a044b4a882cf0274400cb3b529dc7b408576a7cefaf0967da709d9b0558
-
SHA512
21fa0ad93e8b2740753375ac21e825331826191d5d636474b6b0177b06e982020e7d0b05727745d3fdf421a069bd995fe12f329d813b8c8baa7dcede365b4768
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6sY6pigioTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVGo:J3bTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4416 msedge.exe 4416 msedge.exe 2852 msedge.exe 2852 msedge.exe 2332 identity_helper.exe 2332 identity_helper.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2852 wrote to memory of 1524 2852 msedge.exe 81 PID 2852 wrote to memory of 1524 2852 msedge.exe 81 PID 2852 wrote to memory of 440 2852 msedge.exe 82 PID 2852 wrote to memory of 440 2852 msedge.exe 82 PID 2852 wrote to memory of 440 2852 msedge.exe 82 PID 2852 wrote to memory of 440 2852 msedge.exe 82 PID 2852 wrote to memory of 440 2852 msedge.exe 82 PID 2852 wrote to memory of 440 2852 msedge.exe 82 PID 2852 wrote to memory of 440 2852 msedge.exe 82 PID 2852 wrote to memory of 440 2852 msedge.exe 82 PID 2852 wrote to memory of 440 2852 msedge.exe 82 PID 2852 wrote to memory of 440 2852 msedge.exe 82 PID 2852 wrote to memory of 440 2852 msedge.exe 82 PID 2852 wrote to memory of 440 2852 msedge.exe 82 PID 2852 wrote to memory of 440 2852 msedge.exe 82 PID 2852 wrote to memory of 440 2852 msedge.exe 82 PID 2852 wrote to memory of 440 2852 msedge.exe 82 PID 2852 wrote to memory of 440 2852 msedge.exe 82 PID 2852 wrote to memory of 440 2852 msedge.exe 82 PID 2852 wrote to memory of 440 2852 msedge.exe 82 PID 2852 wrote to memory of 440 2852 msedge.exe 82 PID 2852 wrote to memory of 440 2852 msedge.exe 82 PID 2852 wrote to memory of 440 2852 msedge.exe 82 PID 2852 wrote to memory of 440 2852 msedge.exe 82 PID 2852 wrote to memory of 440 2852 msedge.exe 82 PID 2852 wrote to memory of 440 2852 msedge.exe 82 PID 2852 wrote to memory of 440 2852 msedge.exe 82 PID 2852 wrote to memory of 440 2852 msedge.exe 82 PID 2852 wrote to memory of 440 2852 msedge.exe 82 PID 2852 wrote to memory of 440 2852 msedge.exe 82 PID 2852 wrote to memory of 440 2852 msedge.exe 82 PID 2852 wrote to memory of 440 2852 msedge.exe 82 PID 2852 wrote to memory of 440 2852 msedge.exe 82 PID 2852 wrote to memory of 440 2852 msedge.exe 82 PID 2852 wrote to memory of 440 2852 msedge.exe 82 PID 2852 wrote to memory of 440 2852 msedge.exe 82 PID 2852 wrote to memory of 440 2852 msedge.exe 82 PID 2852 wrote to memory of 440 2852 msedge.exe 82 PID 2852 wrote to memory of 440 2852 msedge.exe 82 PID 2852 wrote to memory of 440 2852 msedge.exe 82 PID 2852 wrote to memory of 440 2852 msedge.exe 82 PID 2852 wrote to memory of 440 2852 msedge.exe 82 PID 2852 wrote to memory of 4416 2852 msedge.exe 83 PID 2852 wrote to memory of 4416 2852 msedge.exe 83 PID 2852 wrote to memory of 3560 2852 msedge.exe 84 PID 2852 wrote to memory of 3560 2852 msedge.exe 84 PID 2852 wrote to memory of 3560 2852 msedge.exe 84 PID 2852 wrote to memory of 3560 2852 msedge.exe 84 PID 2852 wrote to memory of 3560 2852 msedge.exe 84 PID 2852 wrote to memory of 3560 2852 msedge.exe 84 PID 2852 wrote to memory of 3560 2852 msedge.exe 84 PID 2852 wrote to memory of 3560 2852 msedge.exe 84 PID 2852 wrote to memory of 3560 2852 msedge.exe 84 PID 2852 wrote to memory of 3560 2852 msedge.exe 84 PID 2852 wrote to memory of 3560 2852 msedge.exe 84 PID 2852 wrote to memory of 3560 2852 msedge.exe 84 PID 2852 wrote to memory of 3560 2852 msedge.exe 84 PID 2852 wrote to memory of 3560 2852 msedge.exe 84 PID 2852 wrote to memory of 3560 2852 msedge.exe 84 PID 2852 wrote to memory of 3560 2852 msedge.exe 84 PID 2852 wrote to memory of 3560 2852 msedge.exe 84 PID 2852 wrote to memory of 3560 2852 msedge.exe 84 PID 2852 wrote to memory of 3560 2852 msedge.exe 84 PID 2852 wrote to memory of 3560 2852 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b49910de8da2f7af928b8c9e472e7d57_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd6a4b46f8,0x7ffd6a4b4708,0x7ffd6a4b47182⤵PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,9853030251295641481,8159469242637969424,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:22⤵PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2204,9853030251295641481,8159469242637969424,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2204,9853030251295641481,8159469242637969424,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,9853030251295641481,8159469242637969424,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,9853030251295641481,8159469242637969424,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,9853030251295641481,8159469242637969424,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5100 /prefetch:82⤵PID:1300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,9853030251295641481,8159469242637969424,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5100 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,9853030251295641481,8159469242637969424,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:2624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,9853030251295641481,8159469242637969424,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,9853030251295641481,8159469242637969424,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4200 /prefetch:12⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,9853030251295641481,8159469242637969424,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,9853030251295641481,8159469242637969424,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1320 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2072
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1492
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
5KB
MD52aad5b11e06d25affffd60ef04cff5e9
SHA13a70a18a9878f4706015f0c3c6169416ae12533b
SHA2564b7019d53621fc2cee40e793d7722e6e0d679c9ca2c94dfe730c1adecb2710c1
SHA5124e2c81a84e2ebb23bf71045613ec1738dc994b52e27fc244c5660f0d9f075dde98cfe19a62d7d52a81a06097685bc6e2d547741c1c3c3858796f11b425d6c151
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5ca5eca4266a77e597605d3c5e34055df
SHA1312cbcf9eae0b4e9e03d741b592b5a77e443b46e
SHA256c8ae4a3e613353cabb9db4ebf1895950c2a12eef92793a81e6c0a06240f64ad9
SHA512cf0042f2b27b904ad2f4f2d2b8d370be3c387929ef75901cdd8882a81df7e19472d59414cf58ec0bc995794644406e223dd04d2b7583df21c9380eb8a4bc809f