Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
16/06/2024, 20:09
Static task
static1
Behavioral task
behavioral1
Sample
b4f9d756f857a7e1e641a9d8d521f9da_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
b4f9d756f857a7e1e641a9d8d521f9da_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b4f9d756f857a7e1e641a9d8d521f9da_JaffaCakes118.html
-
Size
151KB
-
MD5
b4f9d756f857a7e1e641a9d8d521f9da
-
SHA1
fb3b12bb5bf49b70b7d9c64891c687e60e2b5e02
-
SHA256
afb1fe94c6cd7e58e7628895fca30756436b3bc1e3acb436503e17e1934f5d7f
-
SHA512
064d248150b64777af96060c172ed7b554a2de593f14f170573a0501a96db4ec54fbd443d59f38ebf7771509e42c53e0588be5729ffe0aae11629baecabe50e9
-
SSDEEP
1536:SnFRIJ35J1iEk9/yroyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXAZ:SiroyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2208 msedge.exe 2208 msedge.exe 5548 msedge.exe 5548 msedge.exe 5160 msedge.exe 5160 msedge.exe 5160 msedge.exe 5160 msedge.exe 5544 identity_helper.exe 5544 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5548 msedge.exe 5548 msedge.exe 5548 msedge.exe 5548 msedge.exe 5548 msedge.exe 5548 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5548 msedge.exe 5548 msedge.exe 5548 msedge.exe 5548 msedge.exe 5548 msedge.exe 5548 msedge.exe 5548 msedge.exe 5548 msedge.exe 5548 msedge.exe 5548 msedge.exe 5548 msedge.exe 5548 msedge.exe 5548 msedge.exe 5548 msedge.exe 5548 msedge.exe 5548 msedge.exe 5548 msedge.exe 5548 msedge.exe 5548 msedge.exe 5548 msedge.exe 5548 msedge.exe 5548 msedge.exe 5548 msedge.exe 5548 msedge.exe 5548 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5548 msedge.exe 5548 msedge.exe 5548 msedge.exe 5548 msedge.exe 5548 msedge.exe 5548 msedge.exe 5548 msedge.exe 5548 msedge.exe 5548 msedge.exe 5548 msedge.exe 5548 msedge.exe 5548 msedge.exe 5548 msedge.exe 5548 msedge.exe 5548 msedge.exe 5548 msedge.exe 5548 msedge.exe 5548 msedge.exe 5548 msedge.exe 5548 msedge.exe 5548 msedge.exe 5548 msedge.exe 5548 msedge.exe 5548 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5548 wrote to memory of 5540 5548 msedge.exe 81 PID 5548 wrote to memory of 5540 5548 msedge.exe 81 PID 5548 wrote to memory of 4472 5548 msedge.exe 82 PID 5548 wrote to memory of 4472 5548 msedge.exe 82 PID 5548 wrote to memory of 4472 5548 msedge.exe 82 PID 5548 wrote to memory of 4472 5548 msedge.exe 82 PID 5548 wrote to memory of 4472 5548 msedge.exe 82 PID 5548 wrote to memory of 4472 5548 msedge.exe 82 PID 5548 wrote to memory of 4472 5548 msedge.exe 82 PID 5548 wrote to memory of 4472 5548 msedge.exe 82 PID 5548 wrote to memory of 4472 5548 msedge.exe 82 PID 5548 wrote to memory of 4472 5548 msedge.exe 82 PID 5548 wrote to memory of 4472 5548 msedge.exe 82 PID 5548 wrote to memory of 4472 5548 msedge.exe 82 PID 5548 wrote to memory of 4472 5548 msedge.exe 82 PID 5548 wrote to memory of 4472 5548 msedge.exe 82 PID 5548 wrote to memory of 4472 5548 msedge.exe 82 PID 5548 wrote to memory of 4472 5548 msedge.exe 82 PID 5548 wrote to memory of 4472 5548 msedge.exe 82 PID 5548 wrote to memory of 4472 5548 msedge.exe 82 PID 5548 wrote to memory of 4472 5548 msedge.exe 82 PID 5548 wrote to memory of 4472 5548 msedge.exe 82 PID 5548 wrote to memory of 4472 5548 msedge.exe 82 PID 5548 wrote to memory of 4472 5548 msedge.exe 82 PID 5548 wrote to memory of 4472 5548 msedge.exe 82 PID 5548 wrote to memory of 4472 5548 msedge.exe 82 PID 5548 wrote to memory of 4472 5548 msedge.exe 82 PID 5548 wrote to memory of 4472 5548 msedge.exe 82 PID 5548 wrote to memory of 4472 5548 msedge.exe 82 PID 5548 wrote to memory of 4472 5548 msedge.exe 82 PID 5548 wrote to memory of 4472 5548 msedge.exe 82 PID 5548 wrote to memory of 4472 5548 msedge.exe 82 PID 5548 wrote to memory of 4472 5548 msedge.exe 82 PID 5548 wrote to memory of 4472 5548 msedge.exe 82 PID 5548 wrote to memory of 4472 5548 msedge.exe 82 PID 5548 wrote to memory of 4472 5548 msedge.exe 82 PID 5548 wrote to memory of 4472 5548 msedge.exe 82 PID 5548 wrote to memory of 4472 5548 msedge.exe 82 PID 5548 wrote to memory of 4472 5548 msedge.exe 82 PID 5548 wrote to memory of 4472 5548 msedge.exe 82 PID 5548 wrote to memory of 4472 5548 msedge.exe 82 PID 5548 wrote to memory of 4472 5548 msedge.exe 82 PID 5548 wrote to memory of 2208 5548 msedge.exe 83 PID 5548 wrote to memory of 2208 5548 msedge.exe 83 PID 5548 wrote to memory of 5124 5548 msedge.exe 84 PID 5548 wrote to memory of 5124 5548 msedge.exe 84 PID 5548 wrote to memory of 5124 5548 msedge.exe 84 PID 5548 wrote to memory of 5124 5548 msedge.exe 84 PID 5548 wrote to memory of 5124 5548 msedge.exe 84 PID 5548 wrote to memory of 5124 5548 msedge.exe 84 PID 5548 wrote to memory of 5124 5548 msedge.exe 84 PID 5548 wrote to memory of 5124 5548 msedge.exe 84 PID 5548 wrote to memory of 5124 5548 msedge.exe 84 PID 5548 wrote to memory of 5124 5548 msedge.exe 84 PID 5548 wrote to memory of 5124 5548 msedge.exe 84 PID 5548 wrote to memory of 5124 5548 msedge.exe 84 PID 5548 wrote to memory of 5124 5548 msedge.exe 84 PID 5548 wrote to memory of 5124 5548 msedge.exe 84 PID 5548 wrote to memory of 5124 5548 msedge.exe 84 PID 5548 wrote to memory of 5124 5548 msedge.exe 84 PID 5548 wrote to memory of 5124 5548 msedge.exe 84 PID 5548 wrote to memory of 5124 5548 msedge.exe 84 PID 5548 wrote to memory of 5124 5548 msedge.exe 84 PID 5548 wrote to memory of 5124 5548 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b4f9d756f857a7e1e641a9d8d521f9da_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5548 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbb53f46f8,0x7ffbb53f4708,0x7ffbb53f47182⤵PID:5540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,18099414772052794530,807291679136291114,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,18099414772052794530,807291679136291114,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,18099414772052794530,807291679136291114,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2648 /prefetch:82⤵PID:5124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,18099414772052794530,807291679136291114,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:5384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,18099414772052794530,807291679136291114,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,18099414772052794530,807291679136291114,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2720 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,18099414772052794530,807291679136291114,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 /prefetch:82⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,18099414772052794530,807291679136291114,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,18099414772052794530,807291679136291114,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,18099414772052794530,807291679136291114,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,18099414772052794530,807291679136291114,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3512 /prefetch:12⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,18099414772052794530,807291679136291114,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:2844
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5988
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5477462b6ad8eaaf8d38f5e3a4daf17b0
SHA186174e670c44767c08a39cc2a53c09c318326201
SHA256e6bbd4933b9baa1df4bb633319174de07db176ec215e71c8568d27c5c577184d
SHA512a0acc2ef7fd0fcf413572eeb94d1e38aa6a682195cc03d6eaaaa0bc9e5f4b2c0033da0b835f4617aebc52069d0a10b52fc31ed53c2fe7943a480b55b7481dd4e
-
Filesize
152B
MD5b704c9ca0493bd4548ac9c69dc4a4f27
SHA1a3e5e54e630dabe55ca18a798d9f5681e0620ba7
SHA2562ebd5229b9dc642afba36a27c7ac12d90196b1c50985c37e94f4c17474e15411
SHA51269c8116fb542b344a8c55e2658078bd3e0d3564b1e4c889b072dbc99d2b070dacbc4394dedbc22a4968a8cf9448e71f69ec71ded018c1bacc0e195b3b3072d32
-
Filesize
185B
MD5c1e0a949d81f81871c74eb2ab8ae50b7
SHA1b320afd001a099c6dbe6dd128f354563b7c6b247
SHA256a2f1c7009eb4587759891f52c9668995cd9414cd4227fd5fbc61ee82c60de36f
SHA5129155d4c1f834255dcc3295465282056deaa15b62d8063c0ca5cae65c863d19fd1bef8ded8ceef05c180bd10e3d559c0bce42e10ad091ab4929d187ae5815e633
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD5a290419bad212694502c6a0893cacb3c
SHA1d0370fa269c6160fa804969a330d7a95e3df9739
SHA256bce45a1f73bfebc01777cf50b547e84d239a052d9514ce663aecb68cf46ace86
SHA5120f6dff87324e398cbbbe6c93e53de095b0a524bdaa63d2318b2b3351ea8f112cd09006e0f3bb91b2d096e9bf43b117bd18b00dad382088e945c6c87cc1732d28
-
Filesize
6KB
MD5f137f3552a85ac96fecff551ddad007c
SHA1db0855dfe0b39a44c6791c5990fbd74e1c898067
SHA25660a614c8fc90d8fa73a96e29765a9c67a8dfcbf4211aab811b74bb32ddcb1efd
SHA512f9dc5c1fb79ec23e8ff0748aeb0284162452a9eac056a1f07564762d47edd657cfa2d7c660698d409bdd9861ea3c7375ba8d727f9f3dd8952d80e934a0d1e3bb
-
Filesize
6KB
MD5f26ff10fca8d3e436f364294389abb4f
SHA146525bf24a76afdf9c8d91778e6fbd336e76086a
SHA25688106e45b2a49e93d27af2922c3d0f3bb1578f8a640dd51b2be1d6f50ebcafae
SHA512203c73a498b5761392e2a9e0336afbbb43191e215cda9fd274c205ce53200f85b5c6e485c907a751846bcc509f0843c5a752ea5279cda74719e78ae71ffad3bf
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51c8227c5ae7ce7f52457802fbcd4fc8f
SHA1edd2ad9323484820d44daac707dfd49026ebd0e7
SHA2560887e5dea5bb881fdd829e671af7a472bcaa951d7d991d6a6b5c78033df4a609
SHA51262fd69e66c922182d89076785a7ed0c268942d253b5a58296106e5a0a88a5c99947da23c315ee6d520256187561dc19da73d0650cf89fb66317ff50e0cfc0b7e