Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
16-06-2024 20:55
Static task
static1
Behavioral task
behavioral1
Sample
b529755c67e41155e417d2c72737f5e0_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b529755c67e41155e417d2c72737f5e0_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b529755c67e41155e417d2c72737f5e0_JaffaCakes118.html
-
Size
211KB
-
MD5
b529755c67e41155e417d2c72737f5e0
-
SHA1
311d6b80d27978e528683a668c6696e8ff6b700a
-
SHA256
87ad436a98c08d2e29434998b31813d9725631c37b9c2604afeefd35e5ba0315
-
SHA512
324c4e6aba939706333940c6a44c41ee77f39beda5d1af7059532efa4c051439e094387d371209b454ef542f181106e427006e227f208baab5b6a1198891dede
-
SSDEEP
6144:/rtpuICb6ZQ0SUlfhphikwC5JgQLHT+WQCpp:DtpuIrZQh4hphikwC5JgQLHT+WQCpp
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3284 msedge.exe 3284 msedge.exe 4968 msedge.exe 4968 msedge.exe 1516 identity_helper.exe 1516 identity_helper.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4968 wrote to memory of 2824 4968 msedge.exe 82 PID 4968 wrote to memory of 2824 4968 msedge.exe 82 PID 4968 wrote to memory of 3076 4968 msedge.exe 83 PID 4968 wrote to memory of 3076 4968 msedge.exe 83 PID 4968 wrote to memory of 3076 4968 msedge.exe 83 PID 4968 wrote to memory of 3076 4968 msedge.exe 83 PID 4968 wrote to memory of 3076 4968 msedge.exe 83 PID 4968 wrote to memory of 3076 4968 msedge.exe 83 PID 4968 wrote to memory of 3076 4968 msedge.exe 83 PID 4968 wrote to memory of 3076 4968 msedge.exe 83 PID 4968 wrote to memory of 3076 4968 msedge.exe 83 PID 4968 wrote to memory of 3076 4968 msedge.exe 83 PID 4968 wrote to memory of 3076 4968 msedge.exe 83 PID 4968 wrote to memory of 3076 4968 msedge.exe 83 PID 4968 wrote to memory of 3076 4968 msedge.exe 83 PID 4968 wrote to memory of 3076 4968 msedge.exe 83 PID 4968 wrote to memory of 3076 4968 msedge.exe 83 PID 4968 wrote to memory of 3076 4968 msedge.exe 83 PID 4968 wrote to memory of 3076 4968 msedge.exe 83 PID 4968 wrote to memory of 3076 4968 msedge.exe 83 PID 4968 wrote to memory of 3076 4968 msedge.exe 83 PID 4968 wrote to memory of 3076 4968 msedge.exe 83 PID 4968 wrote to memory of 3076 4968 msedge.exe 83 PID 4968 wrote to memory of 3076 4968 msedge.exe 83 PID 4968 wrote to memory of 3076 4968 msedge.exe 83 PID 4968 wrote to memory of 3076 4968 msedge.exe 83 PID 4968 wrote to memory of 3076 4968 msedge.exe 83 PID 4968 wrote to memory of 3076 4968 msedge.exe 83 PID 4968 wrote to memory of 3076 4968 msedge.exe 83 PID 4968 wrote to memory of 3076 4968 msedge.exe 83 PID 4968 wrote to memory of 3076 4968 msedge.exe 83 PID 4968 wrote to memory of 3076 4968 msedge.exe 83 PID 4968 wrote to memory of 3076 4968 msedge.exe 83 PID 4968 wrote to memory of 3076 4968 msedge.exe 83 PID 4968 wrote to memory of 3076 4968 msedge.exe 83 PID 4968 wrote to memory of 3076 4968 msedge.exe 83 PID 4968 wrote to memory of 3076 4968 msedge.exe 83 PID 4968 wrote to memory of 3076 4968 msedge.exe 83 PID 4968 wrote to memory of 3076 4968 msedge.exe 83 PID 4968 wrote to memory of 3076 4968 msedge.exe 83 PID 4968 wrote to memory of 3076 4968 msedge.exe 83 PID 4968 wrote to memory of 3076 4968 msedge.exe 83 PID 4968 wrote to memory of 3284 4968 msedge.exe 84 PID 4968 wrote to memory of 3284 4968 msedge.exe 84 PID 4968 wrote to memory of 3140 4968 msedge.exe 85 PID 4968 wrote to memory of 3140 4968 msedge.exe 85 PID 4968 wrote to memory of 3140 4968 msedge.exe 85 PID 4968 wrote to memory of 3140 4968 msedge.exe 85 PID 4968 wrote to memory of 3140 4968 msedge.exe 85 PID 4968 wrote to memory of 3140 4968 msedge.exe 85 PID 4968 wrote to memory of 3140 4968 msedge.exe 85 PID 4968 wrote to memory of 3140 4968 msedge.exe 85 PID 4968 wrote to memory of 3140 4968 msedge.exe 85 PID 4968 wrote to memory of 3140 4968 msedge.exe 85 PID 4968 wrote to memory of 3140 4968 msedge.exe 85 PID 4968 wrote to memory of 3140 4968 msedge.exe 85 PID 4968 wrote to memory of 3140 4968 msedge.exe 85 PID 4968 wrote to memory of 3140 4968 msedge.exe 85 PID 4968 wrote to memory of 3140 4968 msedge.exe 85 PID 4968 wrote to memory of 3140 4968 msedge.exe 85 PID 4968 wrote to memory of 3140 4968 msedge.exe 85 PID 4968 wrote to memory of 3140 4968 msedge.exe 85 PID 4968 wrote to memory of 3140 4968 msedge.exe 85 PID 4968 wrote to memory of 3140 4968 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b529755c67e41155e417d2c72737f5e0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffcaab46f8,0x7fffcaab4708,0x7fffcaab47182⤵PID:2824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,3660445987262993282,13956998847120248489,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,3660445987262993282,13956998847120248489,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2476 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,3660445987262993282,13956998847120248489,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,3660445987262993282,13956998847120248489,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,3660445987262993282,13956998847120248489,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,3660445987262993282,13956998847120248489,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:12⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,3660445987262993282,13956998847120248489,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6028 /prefetch:82⤵PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,3660445987262993282,13956998847120248489,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6028 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,3660445987262993282,13956998847120248489,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,3660445987262993282,13956998847120248489,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5736 /prefetch:12⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,3660445987262993282,13956998847120248489,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:12⤵PID:812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,3660445987262993282,13956998847120248489,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,3660445987262993282,13956998847120248489,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4968 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4432
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3460
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3608
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c5abc082d9d9307e797b7e89a2f755f4
SHA154c442690a8727f1d3453b6452198d3ec4ec13df
SHA256a055d69c6aba59e97e632d118b7960a5fdfbe35cfdfaa0de14f194fc6f874716
SHA512ad765cddbf89472988de5356db5e0ee254ca3475491c6034fba1897c373702ab7cfa4bd21662ab862eebb48a757c3eb86b1f8ed58629751f71863822a59cd26c
-
Filesize
152B
MD5b4a74bc775caf3de7fc9cde3c30ce482
SHA1c6ed3161390e5493f71182a6cb98d51c9063775d
SHA256dfad4e020a946f85523604816a0a9781091ee4669c870db2cabab027f8b6f280
SHA51255578e254444a645f455ea38480c9e02599ebf9522c32aca50ff37aad33976db30e663d35ebe31ff0ecafb4007362261716f756b3a0d67ac3937ca62ff10e25f
-
Filesize
409B
MD5a56945db3509f728cf23ef5da9fe64fd
SHA183675e030a48f1fbdbec98a8b9b29089ee1c5856
SHA25612f8d8b06c1b00e308d542218e5e6ec7100e62a317175f2313a6552247766b80
SHA51280fdc077d0841b4b8cbd605f39e56901d81b213db91820c108e2057d862d686d133503f6bffcfd16dbed46d298d4c38285ff518ed806de4684cf374d2ba03456
-
Filesize
6KB
MD59b826e26ff05c90ea000abdf9932e85a
SHA1ec8d10856cf29962a4ad9916c274e63028c1f03e
SHA25691b65a34497e21dd1355ec4be187a74c9e3e90f1000f25e33c800ccb3399daf8
SHA5128c893fa1245646e549e0ad52bf42d0897e29d05f7de2d625e7182050934353b98f9a93b7ecff78e0e0c6dfb7c7d39dca40d959b3fcde795baf7c574ed0ee8f58
-
Filesize
7KB
MD552a7b1250d295dcf7f0f3029e6310068
SHA1ee80abb39d0dfff48c387c6315c8bb04c20c31a1
SHA25621628212a69d7e166a98feb0e866b33167021ce9b6ebee7beaa6fd913859bc99
SHA5126c57612dd18d2bf0837a59b98a92dc6b6c8200c213da2c47aafd4cd5beba1145412597d7a866d9d2d26c1e9a04f7e24bdaecd5eae7b550c150010aec5f9cbf1d
-
Filesize
6KB
MD54c4cdc5656c9c2005181207c5460f737
SHA1fbbc2916d0b29477e15e3bed1ad0a6bfa20c429e
SHA2560d5f095901e6b8a2cff64dbf0df666c1fa4c574d14af5c51bd7ef148060a39d5
SHA5125b860e3416abc480131c3c3dfe5fe7986e530e868219a3e73455ac511c6bb34f2ddc74505a2a0dfd3a6a377aec09c5eee234be01b9695f7545e6e8a98c5454dd
-
Filesize
1KB
MD522bc97986a1a9c1e2845d2e118aa2084
SHA10ed74ca7d201a5940d51caff5ef122cb6a41def2
SHA2563bf861f3d66788018840a771dd949c1271a437b341e94d7e11362eb9c451e8de
SHA5127dc15affef4dc55b715c1a44f667997a07e5fb30309a41deea0bba6f28f54d7c719c47f8c9bed0de382bfea420c5819ea9ea5ca342518ac8257052cd8f4d2265
-
Filesize
1KB
MD5a92c389382caf2cfe69cda94857248fa
SHA1bb9734bf48a0e7a5cc3df0a62466387fec70a6fa
SHA256378e01e29294845bb67d315a931c06e8648e73691be9c1d6ae2e719bacd2a3f1
SHA512979ec4c9ef2a1fc5fef8adcf8e7ecd58ed661e7a03e8bd34464165677344d8667f18fe5f92d58de562633fecfd55488942071f2686689fb30f73ecb27ca48916
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5da6e536a9a9a032fbb10fcced98d755e
SHA1d498e2966038ac41dd024d0df037115a8909a223
SHA2563df18d88e580a33cafef7bacd5ae1032bca573239adc8f07b42fed7529204e1b
SHA5126f1c96087698f647f1b7cae58f147fa84950c3350b996ef111992b29532aabfb70801938c5bf614c752eda1c6f7b0e94547e820b48a1af2a2f9291574e4ddba8