Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
16/06/2024, 20:56
Static task
static1
Behavioral task
behavioral1
Sample
b52a9dc6e57b44d65a1f45e0efa660e4_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b52a9dc6e57b44d65a1f45e0efa660e4_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b52a9dc6e57b44d65a1f45e0efa660e4_JaffaCakes118.html
-
Size
181KB
-
MD5
b52a9dc6e57b44d65a1f45e0efa660e4
-
SHA1
255fddc7c4c389f34648c22c1d967a036b0bbdaf
-
SHA256
e2454dd56104029ca367f47619de756d841fcffc94590fcb6d4cd8a93e83b42e
-
SHA512
435b4fe2f06fbbd06e73250e9b4f4423236f7ed966fb12983a0befe85cf8568fde21fdb1ce9dd17e998fb2005f1626386fc2f4a31e92cc4ab44314e384a93d86
-
SSDEEP
1536:djBjIe24sMsHxpbuxIV5UCiUZUc2W/Urq6kDCnBhG1V44Dz1IOECDRxiaDr07X:djBixxRuxIvUxkDCnBhG1V4MzrDRxw
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4880 msedge.exe 4880 msedge.exe 2428 msedge.exe 2428 msedge.exe 1468 identity_helper.exe 1468 identity_helper.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2428 wrote to memory of 2180 2428 msedge.exe 81 PID 2428 wrote to memory of 2180 2428 msedge.exe 81 PID 2428 wrote to memory of 4532 2428 msedge.exe 82 PID 2428 wrote to memory of 4532 2428 msedge.exe 82 PID 2428 wrote to memory of 4532 2428 msedge.exe 82 PID 2428 wrote to memory of 4532 2428 msedge.exe 82 PID 2428 wrote to memory of 4532 2428 msedge.exe 82 PID 2428 wrote to memory of 4532 2428 msedge.exe 82 PID 2428 wrote to memory of 4532 2428 msedge.exe 82 PID 2428 wrote to memory of 4532 2428 msedge.exe 82 PID 2428 wrote to memory of 4532 2428 msedge.exe 82 PID 2428 wrote to memory of 4532 2428 msedge.exe 82 PID 2428 wrote to memory of 4532 2428 msedge.exe 82 PID 2428 wrote to memory of 4532 2428 msedge.exe 82 PID 2428 wrote to memory of 4532 2428 msedge.exe 82 PID 2428 wrote to memory of 4532 2428 msedge.exe 82 PID 2428 wrote to memory of 4532 2428 msedge.exe 82 PID 2428 wrote to memory of 4532 2428 msedge.exe 82 PID 2428 wrote to memory of 4532 2428 msedge.exe 82 PID 2428 wrote to memory of 4532 2428 msedge.exe 82 PID 2428 wrote to memory of 4532 2428 msedge.exe 82 PID 2428 wrote to memory of 4532 2428 msedge.exe 82 PID 2428 wrote to memory of 4532 2428 msedge.exe 82 PID 2428 wrote to memory of 4532 2428 msedge.exe 82 PID 2428 wrote to memory of 4532 2428 msedge.exe 82 PID 2428 wrote to memory of 4532 2428 msedge.exe 82 PID 2428 wrote to memory of 4532 2428 msedge.exe 82 PID 2428 wrote to memory of 4532 2428 msedge.exe 82 PID 2428 wrote to memory of 4532 2428 msedge.exe 82 PID 2428 wrote to memory of 4532 2428 msedge.exe 82 PID 2428 wrote to memory of 4532 2428 msedge.exe 82 PID 2428 wrote to memory of 4532 2428 msedge.exe 82 PID 2428 wrote to memory of 4532 2428 msedge.exe 82 PID 2428 wrote to memory of 4532 2428 msedge.exe 82 PID 2428 wrote to memory of 4532 2428 msedge.exe 82 PID 2428 wrote to memory of 4532 2428 msedge.exe 82 PID 2428 wrote to memory of 4532 2428 msedge.exe 82 PID 2428 wrote to memory of 4532 2428 msedge.exe 82 PID 2428 wrote to memory of 4532 2428 msedge.exe 82 PID 2428 wrote to memory of 4532 2428 msedge.exe 82 PID 2428 wrote to memory of 4532 2428 msedge.exe 82 PID 2428 wrote to memory of 4532 2428 msedge.exe 82 PID 2428 wrote to memory of 4880 2428 msedge.exe 83 PID 2428 wrote to memory of 4880 2428 msedge.exe 83 PID 2428 wrote to memory of 3912 2428 msedge.exe 84 PID 2428 wrote to memory of 3912 2428 msedge.exe 84 PID 2428 wrote to memory of 3912 2428 msedge.exe 84 PID 2428 wrote to memory of 3912 2428 msedge.exe 84 PID 2428 wrote to memory of 3912 2428 msedge.exe 84 PID 2428 wrote to memory of 3912 2428 msedge.exe 84 PID 2428 wrote to memory of 3912 2428 msedge.exe 84 PID 2428 wrote to memory of 3912 2428 msedge.exe 84 PID 2428 wrote to memory of 3912 2428 msedge.exe 84 PID 2428 wrote to memory of 3912 2428 msedge.exe 84 PID 2428 wrote to memory of 3912 2428 msedge.exe 84 PID 2428 wrote to memory of 3912 2428 msedge.exe 84 PID 2428 wrote to memory of 3912 2428 msedge.exe 84 PID 2428 wrote to memory of 3912 2428 msedge.exe 84 PID 2428 wrote to memory of 3912 2428 msedge.exe 84 PID 2428 wrote to memory of 3912 2428 msedge.exe 84 PID 2428 wrote to memory of 3912 2428 msedge.exe 84 PID 2428 wrote to memory of 3912 2428 msedge.exe 84 PID 2428 wrote to memory of 3912 2428 msedge.exe 84 PID 2428 wrote to memory of 3912 2428 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b52a9dc6e57b44d65a1f45e0efa660e4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff928b546f8,0x7ff928b54708,0x7ff928b547182⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,15659380274552617297,6071080019768595160,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,15659380274552617297,6071080019768595160,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,15659380274552617297,6071080019768595160,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,15659380274552617297,6071080019768595160,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,15659380274552617297,6071080019768595160,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,15659380274552617297,6071080019768595160,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5980 /prefetch:82⤵PID:488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,15659380274552617297,6071080019768595160,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5980 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,15659380274552617297,6071080019768595160,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1300 /prefetch:12⤵PID:1716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,15659380274552617297,6071080019768595160,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:2532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,15659380274552617297,6071080019768595160,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:12⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,15659380274552617297,6071080019768595160,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,15659380274552617297,6071080019768595160,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4820 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4816
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:680
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dabfafd78687947a9de64dd5b776d25f
SHA116084c74980dbad713f9d332091985808b436dea
SHA256c7658f407cbe799282ef202e78319e489ed4e48e23f6d056b505bc0d73e34201
SHA512dae1de5245cd9b72117c430250aa2029eb8df1b85dc414ac50152d8eba4d100bcf0320ac18446f865dc96949f8b06a5b9e7a0c84f9c1b0eada318e80f99f9d2b
-
Filesize
152B
MD5c39b3aa574c0c938c80eb263bb450311
SHA1f4d11275b63f4f906be7a55ec6ca050c62c18c88
SHA25666f8d413a30451055d4b6fa40e007197a4bb93a66a28ca4112967ec417ffab6c
SHA512eeca2e21cd4d66835beb9812e26344c8695584253af397b06f378536ca797c3906a670ed239631729c96ebb93acfb16327cf58d517e83fb8923881c5fdb6d232
-
Filesize
1KB
MD57ae5ad424880d9b090c1619b353e8a39
SHA1ece7eeb6befa860bc3ec08cad599c7b781d57811
SHA2568443587a4c519c19908220ffad8704d510fd8bda478144cc686ff3d4e99df917
SHA512e8bc2a7a629e3d830adc2bd861b37b6726ba62aa879b522845e7eba1ea310810151f3cca7be10e183b5eccf611fd5b3aac124fae7ce48fb213c4c028628d7c5c
-
Filesize
6KB
MD5b48e237dba4f4ee91fce1fd6029a90fd
SHA132c6e85409ccb28a12ace46d9158b28f01ff8283
SHA256a36c20e8c5e8d53759c191d9faaed0e515f20b1518527e411133052ddde8c931
SHA512be19fb1dcd122c6cb41e4db799cdb9e24aa64cb509654d4261807e33154910dd97d8e16a819168add03bc7a60baefdeace751506ac5ceeb5bee860cdb37874ab
-
Filesize
6KB
MD5d81a758a76929fcfa1d9e80570e33ca0
SHA12f364854c0f9112ca0145cb6f8bd17fbcbed8749
SHA25630297769cad6c4fd413e99415842d2b2b51ecf30426e615d4744e70bccd9cca4
SHA5123e22d943748ab57f8b4fea8fb30ef3c78cf8f7de6de3c120e1414a427a0f43c3efa540dc96342293f71380c4edaba48292766918ef4be39ae621d446bfef1162
-
Filesize
6KB
MD5778ea2fa4005c58d88ec31b992f2a6b2
SHA1ac275527cf04081cf6a48437e25908db7e0b533d
SHA256255988e332644e022f83c4abdc9200099020e7ec49d3f0602b8559c188c89a5f
SHA512e82abb33bd2e2ea4b6f6592b0e5a9a26453f23a8285d33228ee2a3aaa5ea32b1b89ad6f5df63c72117c4451b651dc7e800ee95e505e9cd2edd7913939be3d221
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a2d366e28d2a298e0035d350b2f93229
SHA15b882fb7c3caa1b18fea8fa4f0cac9a543de4d71
SHA2561c7072f1ff0b8a1217ada6da5ad76a0c09cd23e7b35c29d4b55a9fcd7ad21b77
SHA512386782a719e9cf8aca8c7b17dd75c44b2a45a5f32b3328c7b9848b47f88d8cf51f8dca1850c64a4265ebfb8d31e990fdad3da7de4deafc53fa1bf461a0564dfe