Analysis
-
max time kernel
146s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
17-06-2024 02:56
Static task
static1
Behavioral task
behavioral1
Sample
b676a2a55e6f0fdfaba89ae91ea1c291_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b676a2a55e6f0fdfaba89ae91ea1c291_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b676a2a55e6f0fdfaba89ae91ea1c291_JaffaCakes118.html
-
Size
27KB
-
MD5
b676a2a55e6f0fdfaba89ae91ea1c291
-
SHA1
d00b58c2b3104766facad255b33319b6e5e99d7f
-
SHA256
0d4f97548c36ee9559803c459f41b6ed41f2736c218b1d9db233c415dae12406
-
SHA512
ec68be17f16e3f771daef0657aa9ddf83afabeff7b8f6c2703d5a929b922ff570536045ea66e367c59d6457a6d894fdf65518e34ac8fefbe17919ffbd3812451
-
SSDEEP
384:lll18bBbnprE7+hG0l0eoh9n1i84chGfYD6EAp1/WJBJm:llUy+hGooheHiAp8o
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1744 msedge.exe 1744 msedge.exe 4064 msedge.exe 4064 msedge.exe 960 identity_helper.exe 960 identity_helper.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4064 wrote to memory of 1756 4064 msedge.exe 85 PID 4064 wrote to memory of 1756 4064 msedge.exe 85 PID 4064 wrote to memory of 4268 4064 msedge.exe 86 PID 4064 wrote to memory of 4268 4064 msedge.exe 86 PID 4064 wrote to memory of 4268 4064 msedge.exe 86 PID 4064 wrote to memory of 4268 4064 msedge.exe 86 PID 4064 wrote to memory of 4268 4064 msedge.exe 86 PID 4064 wrote to memory of 4268 4064 msedge.exe 86 PID 4064 wrote to memory of 4268 4064 msedge.exe 86 PID 4064 wrote to memory of 4268 4064 msedge.exe 86 PID 4064 wrote to memory of 4268 4064 msedge.exe 86 PID 4064 wrote to memory of 4268 4064 msedge.exe 86 PID 4064 wrote to memory of 4268 4064 msedge.exe 86 PID 4064 wrote to memory of 4268 4064 msedge.exe 86 PID 4064 wrote to memory of 4268 4064 msedge.exe 86 PID 4064 wrote to memory of 4268 4064 msedge.exe 86 PID 4064 wrote to memory of 4268 4064 msedge.exe 86 PID 4064 wrote to memory of 4268 4064 msedge.exe 86 PID 4064 wrote to memory of 4268 4064 msedge.exe 86 PID 4064 wrote to memory of 4268 4064 msedge.exe 86 PID 4064 wrote to memory of 4268 4064 msedge.exe 86 PID 4064 wrote to memory of 4268 4064 msedge.exe 86 PID 4064 wrote to memory of 4268 4064 msedge.exe 86 PID 4064 wrote to memory of 4268 4064 msedge.exe 86 PID 4064 wrote to memory of 4268 4064 msedge.exe 86 PID 4064 wrote to memory of 4268 4064 msedge.exe 86 PID 4064 wrote to memory of 4268 4064 msedge.exe 86 PID 4064 wrote to memory of 4268 4064 msedge.exe 86 PID 4064 wrote to memory of 4268 4064 msedge.exe 86 PID 4064 wrote to memory of 4268 4064 msedge.exe 86 PID 4064 wrote to memory of 4268 4064 msedge.exe 86 PID 4064 wrote to memory of 4268 4064 msedge.exe 86 PID 4064 wrote to memory of 4268 4064 msedge.exe 86 PID 4064 wrote to memory of 4268 4064 msedge.exe 86 PID 4064 wrote to memory of 4268 4064 msedge.exe 86 PID 4064 wrote to memory of 4268 4064 msedge.exe 86 PID 4064 wrote to memory of 4268 4064 msedge.exe 86 PID 4064 wrote to memory of 4268 4064 msedge.exe 86 PID 4064 wrote to memory of 4268 4064 msedge.exe 86 PID 4064 wrote to memory of 4268 4064 msedge.exe 86 PID 4064 wrote to memory of 4268 4064 msedge.exe 86 PID 4064 wrote to memory of 4268 4064 msedge.exe 86 PID 4064 wrote to memory of 1744 4064 msedge.exe 87 PID 4064 wrote to memory of 1744 4064 msedge.exe 87 PID 4064 wrote to memory of 1496 4064 msedge.exe 88 PID 4064 wrote to memory of 1496 4064 msedge.exe 88 PID 4064 wrote to memory of 1496 4064 msedge.exe 88 PID 4064 wrote to memory of 1496 4064 msedge.exe 88 PID 4064 wrote to memory of 1496 4064 msedge.exe 88 PID 4064 wrote to memory of 1496 4064 msedge.exe 88 PID 4064 wrote to memory of 1496 4064 msedge.exe 88 PID 4064 wrote to memory of 1496 4064 msedge.exe 88 PID 4064 wrote to memory of 1496 4064 msedge.exe 88 PID 4064 wrote to memory of 1496 4064 msedge.exe 88 PID 4064 wrote to memory of 1496 4064 msedge.exe 88 PID 4064 wrote to memory of 1496 4064 msedge.exe 88 PID 4064 wrote to memory of 1496 4064 msedge.exe 88 PID 4064 wrote to memory of 1496 4064 msedge.exe 88 PID 4064 wrote to memory of 1496 4064 msedge.exe 88 PID 4064 wrote to memory of 1496 4064 msedge.exe 88 PID 4064 wrote to memory of 1496 4064 msedge.exe 88 PID 4064 wrote to memory of 1496 4064 msedge.exe 88 PID 4064 wrote to memory of 1496 4064 msedge.exe 88 PID 4064 wrote to memory of 1496 4064 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b676a2a55e6f0fdfaba89ae91ea1c291_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe697546f8,0x7ffe69754708,0x7ffe697547182⤵PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,1497324817413831947,15862192353427248,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,1497324817413831947,15862192353427248,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,1497324817413831947,15862192353427248,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:1496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1497324817413831947,15862192353427248,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1497324817413831947,15862192353427248,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,1497324817413831947,15862192353427248,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵PID:1740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,1497324817413831947,15862192353427248,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1497324817413831947,15862192353427248,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1497324817413831947,15862192353427248,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1497324817413831947,15862192353427248,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:12⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1497324817413831947,15862192353427248,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,1497324817413831947,15862192353427248,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4036
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2272
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2724
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5257c0005d0c4d0bb282cb470925e4376
SHA1f9b8efb511ed64292568977c9f2ec255509e8f7d
SHA2568185c36aaacfc71e42f94fad8e198fe7fb2d868398ceabb89261cae94341cb22
SHA5122f3e8f352ed3ef88e8c28650390f93f98c92174d268330b886f3ebd1ba0163999051298ee12a054606b4986005452a241c6864cd292e69492d79c37d500556f4
-
Filesize
152B
MD54819fbc4513c82d92618f50a379ee232
SHA1ab618827ff269655283bf771fc957c8798ab51ee
SHA25605e479e8ec96b7505e01e5ec757ccfe35cb73cd46b27ff4746dce90d43d9237c
SHA512bc24fb972d04b55505101300e268f91b11e5833f1a18e925b5ded7e758b5e3e08bee1aa8f3a0b65514d6df981d0cbfa8798344db7f2a3675307df8de12ae475b
-
Filesize
271B
MD5313b6eca97d0b315044445b41e99c2ad
SHA10718a825935cd8a77c58a2ceb025f1229a151e4e
SHA256794c260dcc16d49871f2a2d8e990ba7aaa4e0a561c799d1f89a4cb1e2b934e56
SHA5125e3c63f094ac9f03815b12ecb64f631aeda10e71b942071e3245fc74549d245766a6fd736cf6c4d4e726868dc3e1923fb20bd29a1ac6cae98f94ce7cd857cb88
-
Filesize
5KB
MD5e1e503a06be15bd099779aec6f5d741a
SHA1ebbd7fc09ee2826b7116f7ce6cd4c7a9ef748a21
SHA2560533e89b850182cfbe2a73504afb047bf449a70b399e1b24e616aaea1388eb9b
SHA512ee0e0bab81d9a1d123f8ba6531c5264cee470539b65ab0240cf2433c66554f886c8a090051a016a6ab07d6543bf824dc771278909a93ec13d306c9352dc28998
-
Filesize
5KB
MD58fbaaed11f19c6b29148d9f168ac5645
SHA1ef3153196937b9f06f85177810c5b7cd37b6ca01
SHA2566d129921e1a024bf99788b499ce1b04a47a9529de1ff5a27c37d57aa2662355f
SHA5120788fecb6d23406a1ee3c5fac69df50e65ed1a563504d3f766809dd0688b3fe55d7ec8b51f69e9bd8b170339aa9fb6a5b7c9e6d4c2b429deb7ad6fe17d8021b3
-
Filesize
24KB
MD595cd1581c30a5c26f698a8210bcab430
SHA15e8e551a47dd682ec51a7d6808fe8e0f2af39e86
SHA256d58162c5ae5e18fc06604c285e024c01686093d70994dc93b4ae9d85b4c3f7b9
SHA512e49403df10177053634c431203a91d26df5dfb23cbbb88847459ecdf4b6107040d0944a3e84ee6bb26cb4e8017a35c8c31b658387cd1b6938ba4cb9f59606ece
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD56f750ec9888813bd85f8521af9e70c3c
SHA1cd61297b7dbe3539fa816c3fd880c0393ddfdce2
SHA256e0737d853dff6a553522fe11fc8c7e8e2c0dd9fe14a5881a412ea77c06e1bf9f
SHA512ccc45efda3517fbcbd43ae3ba6780587dcaaea6a4b73a83ad8f7bb47fc50a03ff5a577a950b416bc067015cc37d7d7dd4f6874b1df94dd253e9fc2f20cf705d2