Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
17/06/2024, 09:52
Static task
static1
Behavioral task
behavioral1
Sample
b7ff233b10adbbd871dd02373b585daf_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b7ff233b10adbbd871dd02373b585daf_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b7ff233b10adbbd871dd02373b585daf_JaffaCakes118.html
-
Size
125KB
-
MD5
b7ff233b10adbbd871dd02373b585daf
-
SHA1
46396ea0bd448a5ebd0030652cbc9602d6e8bd06
-
SHA256
215fb39142b51462f1774115a30ae8cebd3fbad223cae2e9ad2fd0eff5aeb5c5
-
SHA512
30fa02c2d5d870e4e9033d0a210eaab99938c430f52383d02d6e527b75f8d2f6074f49cbfe4e9851c683837b1259072f208c2e53c128a0d5230393db7de46101
-
SSDEEP
3072:TzF2SF3VKUP13G4k5QhLpOatV+nZTMLD/KljcV22wOoS/0Ib+b+FmKgMx3uf9zS9:TpHt3G4k5QhL8atVz22wOoS/0Ib+b+FJ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4888 msedge.exe 4888 msedge.exe 456 msedge.exe 456 msedge.exe 1020 identity_helper.exe 1020 identity_helper.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 456 wrote to memory of 372 456 msedge.exe 81 PID 456 wrote to memory of 372 456 msedge.exe 81 PID 456 wrote to memory of 1308 456 msedge.exe 82 PID 456 wrote to memory of 1308 456 msedge.exe 82 PID 456 wrote to memory of 1308 456 msedge.exe 82 PID 456 wrote to memory of 1308 456 msedge.exe 82 PID 456 wrote to memory of 1308 456 msedge.exe 82 PID 456 wrote to memory of 1308 456 msedge.exe 82 PID 456 wrote to memory of 1308 456 msedge.exe 82 PID 456 wrote to memory of 1308 456 msedge.exe 82 PID 456 wrote to memory of 1308 456 msedge.exe 82 PID 456 wrote to memory of 1308 456 msedge.exe 82 PID 456 wrote to memory of 1308 456 msedge.exe 82 PID 456 wrote to memory of 1308 456 msedge.exe 82 PID 456 wrote to memory of 1308 456 msedge.exe 82 PID 456 wrote to memory of 1308 456 msedge.exe 82 PID 456 wrote to memory of 1308 456 msedge.exe 82 PID 456 wrote to memory of 1308 456 msedge.exe 82 PID 456 wrote to memory of 1308 456 msedge.exe 82 PID 456 wrote to memory of 1308 456 msedge.exe 82 PID 456 wrote to memory of 1308 456 msedge.exe 82 PID 456 wrote to memory of 1308 456 msedge.exe 82 PID 456 wrote to memory of 1308 456 msedge.exe 82 PID 456 wrote to memory of 1308 456 msedge.exe 82 PID 456 wrote to memory of 1308 456 msedge.exe 82 PID 456 wrote to memory of 1308 456 msedge.exe 82 PID 456 wrote to memory of 1308 456 msedge.exe 82 PID 456 wrote to memory of 1308 456 msedge.exe 82 PID 456 wrote to memory of 1308 456 msedge.exe 82 PID 456 wrote to memory of 1308 456 msedge.exe 82 PID 456 wrote to memory of 1308 456 msedge.exe 82 PID 456 wrote to memory of 1308 456 msedge.exe 82 PID 456 wrote to memory of 1308 456 msedge.exe 82 PID 456 wrote to memory of 1308 456 msedge.exe 82 PID 456 wrote to memory of 1308 456 msedge.exe 82 PID 456 wrote to memory of 1308 456 msedge.exe 82 PID 456 wrote to memory of 1308 456 msedge.exe 82 PID 456 wrote to memory of 1308 456 msedge.exe 82 PID 456 wrote to memory of 1308 456 msedge.exe 82 PID 456 wrote to memory of 1308 456 msedge.exe 82 PID 456 wrote to memory of 1308 456 msedge.exe 82 PID 456 wrote to memory of 1308 456 msedge.exe 82 PID 456 wrote to memory of 4888 456 msedge.exe 83 PID 456 wrote to memory of 4888 456 msedge.exe 83 PID 456 wrote to memory of 4936 456 msedge.exe 84 PID 456 wrote to memory of 4936 456 msedge.exe 84 PID 456 wrote to memory of 4936 456 msedge.exe 84 PID 456 wrote to memory of 4936 456 msedge.exe 84 PID 456 wrote to memory of 4936 456 msedge.exe 84 PID 456 wrote to memory of 4936 456 msedge.exe 84 PID 456 wrote to memory of 4936 456 msedge.exe 84 PID 456 wrote to memory of 4936 456 msedge.exe 84 PID 456 wrote to memory of 4936 456 msedge.exe 84 PID 456 wrote to memory of 4936 456 msedge.exe 84 PID 456 wrote to memory of 4936 456 msedge.exe 84 PID 456 wrote to memory of 4936 456 msedge.exe 84 PID 456 wrote to memory of 4936 456 msedge.exe 84 PID 456 wrote to memory of 4936 456 msedge.exe 84 PID 456 wrote to memory of 4936 456 msedge.exe 84 PID 456 wrote to memory of 4936 456 msedge.exe 84 PID 456 wrote to memory of 4936 456 msedge.exe 84 PID 456 wrote to memory of 4936 456 msedge.exe 84 PID 456 wrote to memory of 4936 456 msedge.exe 84 PID 456 wrote to memory of 4936 456 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b7ff233b10adbbd871dd02373b585daf_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff82fef46f8,0x7ff82fef4708,0x7ff82fef47182⤵PID:372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,9439564949743548391,9324939361556392204,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:1308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,9439564949743548391,9324939361556392204,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,9439564949743548391,9324939361556392204,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9439564949743548391,9324939361556392204,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:3424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9439564949743548391,9324939361556392204,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9439564949743548391,9324939361556392204,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4636 /prefetch:12⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,9439564949743548391,9324939361556392204,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 /prefetch:82⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,9439564949743548391,9324939361556392204,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9439564949743548391,9324939361556392204,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:12⤵PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9439564949743548391,9324939361556392204,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:12⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9439564949743548391,9324939361556392204,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,9439564949743548391,9324939361556392204,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5588 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4964
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1176
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dabfafd78687947a9de64dd5b776d25f
SHA116084c74980dbad713f9d332091985808b436dea
SHA256c7658f407cbe799282ef202e78319e489ed4e48e23f6d056b505bc0d73e34201
SHA512dae1de5245cd9b72117c430250aa2029eb8df1b85dc414ac50152d8eba4d100bcf0320ac18446f865dc96949f8b06a5b9e7a0c84f9c1b0eada318e80f99f9d2b
-
Filesize
152B
MD5c39b3aa574c0c938c80eb263bb450311
SHA1f4d11275b63f4f906be7a55ec6ca050c62c18c88
SHA25666f8d413a30451055d4b6fa40e007197a4bb93a66a28ca4112967ec417ffab6c
SHA512eeca2e21cd4d66835beb9812e26344c8695584253af397b06f378536ca797c3906a670ed239631729c96ebb93acfb16327cf58d517e83fb8923881c5fdb6d232
-
Filesize
995B
MD588c997de1447e6165a872e08d7115ac2
SHA1d64bc3d952bc8dbb0a85cc698c9a4673d9cf9b52
SHA256634c7cb40a0c6179cd1c1f5f343869f8d2485563ed21cf7eb51a39551c03722c
SHA5124dddc975b6611cd84b30aab2d55e51faa64380df286e01ad875e5dda0c4982d3475451a14ce9fa7998b5669a08ad54c2dfbc056655e9c69f4d78a4ea5f1e8213
-
Filesize
6KB
MD565e1db01f8ef7614f25c95e2a406558a
SHA168b5f13648be8d3021a0ea10cf612972b3d170f9
SHA256d60488c8cad9dda5852078ab0ea1d1864de811d63285103ae7c7e95a16096b9c
SHA51278e45ea2403a97ee1234192dc3dfa2b8f02822e17b4607dcd752bb6099bff8cd5bfa3b8e1986672416ce51335f21b6826a39d41aa5c080556b91961f53f3b445
-
Filesize
6KB
MD5b49f58eb7619f13683df5c3e9cd95c32
SHA15d45109ce4b6e06b979cfe66f45b9941b3a23582
SHA2565cfcfd507c7e242c655ff8dde46196985acf170ec9cc8d73a22f914f29dcaade
SHA512e6e25a0e13a6c60e43a0b3a441ca3ff5ff5ab342b12fd94d3b824833047f9aa0b5d611e424ab870a2a6a9ae36bfa692d5adf64d02ab6d81bd6212620b49cc626
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD510d746f35f4b20840c637a3e13f39885
SHA1aeb9273916811aef09aad747592b898ff7d9080b
SHA2567a341197471f3acd51c64e5c92fd64ae3d56a4ab8fbc29fdd88b078a9948d277
SHA51204bef573d2233bded4e77ebc28ec8e7c75c889221bd30671db7a05f346f4048fefb7dab94cc9987141947189309e87a7d4076a22723be13c22adef754e4acd23