Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
16-06-2024 18:13
Static task
static1
Behavioral task
behavioral1
Sample
b481affed6f9da588dc1d9e498fbee04_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b481affed6f9da588dc1d9e498fbee04_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b481affed6f9da588dc1d9e498fbee04_JaffaCakes118.html
-
Size
18KB
-
MD5
b481affed6f9da588dc1d9e498fbee04
-
SHA1
f7c0df8a44b51edd6724041cd18d631331fff1a8
-
SHA256
15f16591bbe9be1b19eca6efc9a342a5a82f99ef0ddfd6aa2de10e1c823a6ea5
-
SHA512
b836257686bedfba9b447956a4a3c14c8119c635fdc10a6b21ed38b92bbb7efbfef74be558691f707f58adac72ac3d291a391e92c921b160342379dac8e1c838
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAI44mzUnjBhSE82qDB8:SIMd0I5nvHjsvSHxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3104 msedge.exe 3104 msedge.exe 1128 msedge.exe 1128 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1128 msedge.exe 1128 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1128 wrote to memory of 4960 1128 msedge.exe 84 PID 1128 wrote to memory of 4960 1128 msedge.exe 84 PID 1128 wrote to memory of 424 1128 msedge.exe 86 PID 1128 wrote to memory of 424 1128 msedge.exe 86 PID 1128 wrote to memory of 424 1128 msedge.exe 86 PID 1128 wrote to memory of 424 1128 msedge.exe 86 PID 1128 wrote to memory of 424 1128 msedge.exe 86 PID 1128 wrote to memory of 424 1128 msedge.exe 86 PID 1128 wrote to memory of 424 1128 msedge.exe 86 PID 1128 wrote to memory of 424 1128 msedge.exe 86 PID 1128 wrote to memory of 424 1128 msedge.exe 86 PID 1128 wrote to memory of 424 1128 msedge.exe 86 PID 1128 wrote to memory of 424 1128 msedge.exe 86 PID 1128 wrote to memory of 424 1128 msedge.exe 86 PID 1128 wrote to memory of 424 1128 msedge.exe 86 PID 1128 wrote to memory of 424 1128 msedge.exe 86 PID 1128 wrote to memory of 424 1128 msedge.exe 86 PID 1128 wrote to memory of 424 1128 msedge.exe 86 PID 1128 wrote to memory of 424 1128 msedge.exe 86 PID 1128 wrote to memory of 424 1128 msedge.exe 86 PID 1128 wrote to memory of 424 1128 msedge.exe 86 PID 1128 wrote to memory of 424 1128 msedge.exe 86 PID 1128 wrote to memory of 424 1128 msedge.exe 86 PID 1128 wrote to memory of 424 1128 msedge.exe 86 PID 1128 wrote to memory of 424 1128 msedge.exe 86 PID 1128 wrote to memory of 424 1128 msedge.exe 86 PID 1128 wrote to memory of 424 1128 msedge.exe 86 PID 1128 wrote to memory of 424 1128 msedge.exe 86 PID 1128 wrote to memory of 424 1128 msedge.exe 86 PID 1128 wrote to memory of 424 1128 msedge.exe 86 PID 1128 wrote to memory of 424 1128 msedge.exe 86 PID 1128 wrote to memory of 424 1128 msedge.exe 86 PID 1128 wrote to memory of 424 1128 msedge.exe 86 PID 1128 wrote to memory of 424 1128 msedge.exe 86 PID 1128 wrote to memory of 424 1128 msedge.exe 86 PID 1128 wrote to memory of 424 1128 msedge.exe 86 PID 1128 wrote to memory of 424 1128 msedge.exe 86 PID 1128 wrote to memory of 424 1128 msedge.exe 86 PID 1128 wrote to memory of 424 1128 msedge.exe 86 PID 1128 wrote to memory of 424 1128 msedge.exe 86 PID 1128 wrote to memory of 424 1128 msedge.exe 86 PID 1128 wrote to memory of 424 1128 msedge.exe 86 PID 1128 wrote to memory of 3104 1128 msedge.exe 87 PID 1128 wrote to memory of 3104 1128 msedge.exe 87 PID 1128 wrote to memory of 1456 1128 msedge.exe 88 PID 1128 wrote to memory of 1456 1128 msedge.exe 88 PID 1128 wrote to memory of 1456 1128 msedge.exe 88 PID 1128 wrote to memory of 1456 1128 msedge.exe 88 PID 1128 wrote to memory of 1456 1128 msedge.exe 88 PID 1128 wrote to memory of 1456 1128 msedge.exe 88 PID 1128 wrote to memory of 1456 1128 msedge.exe 88 PID 1128 wrote to memory of 1456 1128 msedge.exe 88 PID 1128 wrote to memory of 1456 1128 msedge.exe 88 PID 1128 wrote to memory of 1456 1128 msedge.exe 88 PID 1128 wrote to memory of 1456 1128 msedge.exe 88 PID 1128 wrote to memory of 1456 1128 msedge.exe 88 PID 1128 wrote to memory of 1456 1128 msedge.exe 88 PID 1128 wrote to memory of 1456 1128 msedge.exe 88 PID 1128 wrote to memory of 1456 1128 msedge.exe 88 PID 1128 wrote to memory of 1456 1128 msedge.exe 88 PID 1128 wrote to memory of 1456 1128 msedge.exe 88 PID 1128 wrote to memory of 1456 1128 msedge.exe 88 PID 1128 wrote to memory of 1456 1128 msedge.exe 88 PID 1128 wrote to memory of 1456 1128 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b481affed6f9da588dc1d9e498fbee04_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe199646f8,0x7ffe19964708,0x7ffe199647182⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,18093239318635384101,5857483223439421903,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,18093239318635384101,5857483223439421903,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,18093239318635384101,5857483223439421903,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:1456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,18093239318635384101,5857483223439421903,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,18093239318635384101,5857483223439421903,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,18093239318635384101,5857483223439421903,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1792 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2340
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1460
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c5abc082d9d9307e797b7e89a2f755f4
SHA154c442690a8727f1d3453b6452198d3ec4ec13df
SHA256a055d69c6aba59e97e632d118b7960a5fdfbe35cfdfaa0de14f194fc6f874716
SHA512ad765cddbf89472988de5356db5e0ee254ca3475491c6034fba1897c373702ab7cfa4bd21662ab862eebb48a757c3eb86b1f8ed58629751f71863822a59cd26c
-
Filesize
152B
MD5b4a74bc775caf3de7fc9cde3c30ce482
SHA1c6ed3161390e5493f71182a6cb98d51c9063775d
SHA256dfad4e020a946f85523604816a0a9781091ee4669c870db2cabab027f8b6f280
SHA51255578e254444a645f455ea38480c9e02599ebf9522c32aca50ff37aad33976db30e663d35ebe31ff0ecafb4007362261716f756b3a0d67ac3937ca62ff10e25f
-
Filesize
6KB
MD519c4e1ba84578eb6e9008deeeda97a2d
SHA1e2b0da7035ca4f9cae860c29fddff17f9749ef09
SHA25690dbad2dd696694aed1e23748621b536ad4ad17ea3ea6a35bb540259e28f0e51
SHA512afa5f3e4b343a39a347de8ab90bbb4e8fcbc79b771a259b38338be628107a5dd95eaeadc27c2b5a0cd1d33c217dca368bf54c82a67de90cfd43ef918f012c957
-
Filesize
6KB
MD58177bf61b55db29cc647fc291c7620cf
SHA1d9c8878cf20e37540b8d7c7d4dfc9ee23cb4dab3
SHA2569e8c0f83110cf2bc96b5a50b0a14f5cd2788c50c63a3f60d08b9a7b2f5638c7e
SHA512ff54dbf4bbd7fdec8cfacab5905702a614a5bdf746c9243cbe24c47a8d82d8e9532a9c90376169a17ef5084db214c6287503449825ba5f51ec9449a4031c4e34
-
Filesize
6KB
MD5d9726af49a8e0c2bcd4410a8acae8c36
SHA12752acf4c4b303ae743b0d3b1776a8c57b368c37
SHA2567672e0906f5b41d8c7a86c88ecf38791d2e2c536edf56b43c4c9c615c21739bc
SHA5124f11baf23fdcf53a8930944040b1bf05e49a5c496d3947af912d073c2923793bfb69cd2d7ea4dff77d52ec242af5709f83946f8da08221479f4eb5ff47348fe5
-
Filesize
11KB
MD544c469e72a0bb728bb09110c4be9a698
SHA18632008da4bff1a0cbbbcd101462347be9166c1e
SHA2567d42f406aaccbad5e45577d29864677f3ec8598f022864f0b10d1de12962f17b
SHA512a0bdeae415288efc03993643f531591a74e44159dd2a8d340dae4d8118cd680a91f7be9e49dd9f21e3bbb97f93f76a10aaadb68c5f2f8547a7ef20dc95291df1